WLAN Card User Manual Version: 0.
FCC Class B Radio Frequency Interference Statement FEDERAL COMMUNICATIONS COMMISSION This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:(1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules.
Table of Contents 1. Introduction.......................................................................................................................3 2. Installation.........................................................................................................................3 2.1 OVERVIEW...................................................................................................................3 2.1.1 INSTALL THE WLAN UTILITY/DRIVER...................................................
1. Introduction WLAN Management Utility supports the following: ‧ 802.11b WLAN Configuration ‧ Windows 98SE / ME / 2000 (In Windows XP, we use its default WLAN Utility) 2. Installation 2.1 Overview To establish your wireless network connection, the following steps should be executed. 1. Install the software using the installation CD. 2. Insert the Wireless LAN card. This product is designed for Windows 98SE, Millennium, 2000, and XP. The installation procedure for each platform is similar.
2.1.1 WLAN Driver/Utility Installation 1. Insert the installation CD into your CD-ROM drive. The setup program will start automatically. 2. Click “Next” to go to next screen. 3. Select the destination folder. To install to the default folder as shown below, click “Next” to go to the next screen. 4. During installation, Driver and Utility files will be copied to your system directory. 5. Select “No” and then click “Finish” to complete the installation (It is recommended to select “Yes” for Windows 98).
2.2 Utility Startup Configuration Details WLAN Card has its own management software. Users can control all functions provided by the application named WLAN Utility. The Utility icon will appear on the working bar by double clicking the WLAN Utility shortcut on your desktop. Three colors are used to describe the status of connection and it is shown on the right of working bar. Green indicates excellent connection. Yellow indicates the connection has poor quality (Yellow) and Red means no connection.
parameter will not be active. Infrastructure Client nodes will always go to the same channel as their AP. Wired Equivalent Privacy • If you would like to enable WEP, click the encryption button. • You may desire additional measure of security in your wireless network, which can be achieved by using the Wired Equivalent Privacy (WEP). Follow the steps below to set your WEP: Select the data privacy algorithm you want (64 or 128 bit WEP type).
field can be the following: Associated - Normal flow of operation between stations in Ad-Hoc mode MAC address of the access point - normal flow of network operation between the access point and stations in the infrastructure mode. Not Associated - means the node cannot detect any ad-hoc station or access point within the range. Scanning - Searching for available access point or active node. Driver Not Loaded – means the driver of wireless adapter is not currently loaded on the system.
Figure Status indication area There are two modes in the status indication area. One is Access Point and the other is Peer-to-Peer. At the same time, each mode allows users to opt the WEP enable or WEP disable. When encryption is enabling, wireless client shall offer the matched WEP key for key verification to connect the access point; otherwise, the connecting will fail.
The receiver can not receive any AP’s signal. Encryption is enabled and matched each other.
2. Profile Tab The Profile tab is used to configure the various profiles available to you for wireless connections. The Profile tab contains some of the same fields as the Status tab, but unlike the Status tab, all of the fields in the Profile tab are alterable. Figure 2 shows the screen layout of the profile tab. Profile Name Allow to give a name to the profile. Any user can add 9 different profiles at most if he wishes.
Power Saving Mode The field allows you to set enable or disable the power saving mode. Power saving mode can reduce power usage by temporarily disconnecting wireless connections when the connection is idle. The default value is “Disabled”. 2.1 Advanced RTS Threshold The field allows you to set enable or disable. When the field is set to Enabled, you can adjust the value between 0 to 3000. RTS threshold is a mechanism implemented to prevent the “Hidden Node” problem.
WEP Key You can choose “Create Keys Manually” or “Create Keys with Pass-phrase” method to enter encryption keys. It allows the entry of four keys for 64-bit and 128-bit key according to WEP function select. To be written to the driver and registry, each key must consists of correct digits and letters allowed. The detailed descriptions will be shown as below for these two kinds of methods: Create Key Manually For 64-bits encryption: - Five alphanumeric characters in the range of “a-z”, “A-Z” and “0-9”. (e.
3. Survey Tab The Survey tab supports powerful Site-Survey tool to discovery all active wireless devices in the radio range. While selecting this wireless device displayed on the screen, users can press “Connect” button to quick connect the wireless device chosen by users and simultaneously modify the “Default” profile automatically. If users want to update the survey result, they can press “Rescan” button again.
4. Statistics Tab The Statistics tab is used to monitor TX and RX traffic of the wireless network. It also offers the detailed information on error wireless packets that the other wireless LAN device transmits and receives. Each time users switch to this page will trigger the statistics to start counting from zero. Users can press “Reset” button if they want to restart the counter again. If users want to temporarily freeze the current showing counters, they can press “Pause” button to do that easily.
RX Count Bytes The total bytes number of any kind of wireless packets. Fragments The total number of successfully delivered/received MPDUs of type Data or Management. Unicast Packets The number of wireless unicast (point to point) RX packets WEP Undercryptable The number of received MPDUs, with the WEP subfield in the Frame Control field set to one, that were discarded because either it should not have been encrypted, or due to the receiving station not implementing the privacy option.
Primary Firmware Version Primary Firmware version and file name. Secondary Firmware Version Secondary Firmware version and file name. Network Card Serial Number NIC serial number Network Card MAC Address NIC MAC address 2.3 Uninstall the WLAN Utility / Driver 1. To exit the WLAN Utility, you should click the right bottom on the Utility icon in the working bar and select “Close”. 2.
If there are yellow signs on network card, please check the followings: 1) Check if your notebook supports 3.3V Card. 2) Check that you have inserted the right card and have installed the proper driver. 3) Check if your notebook has installed some other wireless LAN card driver. If you do not know the reason why, please contact agency that provide you WLAN card. b. Plug device first and then install the driver/ Utility 1. When you plug device in USB port, operating system will detect automatically. 2.