54Mbps Wireless Network PCI Adapter USER’S MANUAL Model Name: Version: Date: GL2454VP-1A 1.
Contents 1. Introduction............................................................................................................3 1.1 Product Feature ..........................................................................................3 1.2 System Requirement ..................................................................................3 2. Getting Start ...........................................................................................................3 2.1 LED Indicators..............
1. Introduction 1.1 Product Feature Compliance with IEEE 802.11g and 802.11b standards Highly efficient design mechanism to provide unbeatable performance Achieving data rate up to 54Mbps for 802.11g and 11Mps for 802.11b with wide range coverage Strong network security with WEP and WPA support Auto-switch between the two standards, IEEE 802.11b and 802.11g Driver/Utility support most commonly used operating systems including Windows 98SE/ME/200/XP. 1.
Utility Program first. Make sure that the 54Mbps wireless Network PCI Adapter is NOT inserted into the cardbus slot. NOTE: all the snapped images of installation mentioned in this manual are based on Windows XP. For other windows operating system, all the procedures are the same but the screens are not the exactly same. 2. Turn on the computer. Insert the CD into the CD-ROM Drive. “PC Card/ PCI Card” and then click the “Install”. 3. InstallShield Wizard will automatically start.
4. Please click “Finish” 5.
your PC. Open the computer case and then please insert the 54Mbps Wireless PCI Adapter into the empty PCI slot of your computer system. Once the 54Mbps Wireless PCI Adapter is installed, place the computer case back. Turn ON your computer. 2.2.2 Driver Installation 1. Please select the second option and click “Next”. 2.
3. Please click “Finish” 4. To make sure if the installation is successful, you could check it through the device management.
5. Once the installation is successful, a utility program icon will show on your desktop. To lunch the utility, just double click the icon. 3. Configuration 3.1 Link Information The default page is as below after you launch the Utility program.
Status: Shows the BSSID associated, which can be used to identify the wireless network. SSID: Shows current SSID, which must be the same for the wireless client and AP in order for communication to be established. Frequency: Shows the current frequency used for wireless network. Wireless Mode: Shows the current wireless mode used for wireless communication. Encryption: Shows the current encryption mode used for wireless network. TxRate: Shows the current data rate used for transmitting.
minimum amount of effort to implement a secure wireless network environment. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in the wireless network. Wireless Mode: There are two types available for selection ●Infrastructure – to establish wireless communication with LAN and other wireless clients through the use the Access Points.
Preamble: Select Long or Short Preamble type. Preamble is a sequence of bits transmitted at 1Mbps that allows the PHY circuitry to reach steady-state demodulation and synchronization of bit clock and frame start. Two different preambles and headers are defined: the mandatory supported Long Preamble and header, which interoperates with the 1 Mbit/s and 2 Mbit/s DSSS specification (as described in IEEE Std 802.11), and an optional Short Preamble and header (as described in IEEE Std 802.11b).
Encryption: Select Enable or Disable data encryption feature. Aut. Mode: There are three modes available to choose. Open Authentication – the sender and receiver do not share secret Key for communication. Instead, each party generates its own key-pairs and asks the other party to accept it. The key is regenerated when the connection is established every time. Shared Authentication – the sender and receiver shares the common key for data communication, and the key is used for extended length of time.
Available Network – displays the wireless networks (wireless clients and Access Points) that are in your signal range. Select any one of them to establish communications by simply mouse double-click or click on the “Connect” button. Click “Refresh” button to start scanning for available network again. Profile – You can create and manage the created profiles for Home, offices or public areas.
3.5 About US This page displays some information about the 54Mpbs PCI Adapter utility, which includes the version numbers for Driver, Firmware and Utility. When there is new version of software available for upgrade, you will be able to identify by version numbers.
4. Glossary Access Point: An internetworking device that seamlessly connects wired and wireless networks. Ad-Hoc: An independent wireless LAN network formed by a group of computers, each with a network adapter. AP Client: One of the additional AP operating modes offered by 54Mbps Access Point, which allows the Access Point to act as an Ethernet-to-Wireless Bridge, thus a LAN or a single computer station can join a wireless ESS network through it.
2. Shared Key: Shared Key authentication supports authentication of stations as either a member of those who knows a shared secret key or a member of those who does not. Backbone: The core infrastructure of a network, which transports information from one central location to another where the information is unloaded into a local system. Bandwidth: The transmission capacity of a device, which is calculated by how much data the device can transmit in a fixed amount of time expressed in bits per second (bps).
assign the IP from a central location and each computer receives an IP address upon plugged with the Ethernet cable everywhere on the network. DSSS: Direct Sequence Spread Spectrum. DSSS generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered.
the profession. The IEEE fosters the development of standards that often become national and international standards. Infrastructure: An infrastructure network is a wireless network or other small network in which the wireless network devices are made a part of the network through the Access Point which connects them to the rest of the network. ISM Band: The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band.
enabled. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in the wireless network. Subnet Mask: The method used for splitting IP networks into a series of sub-groups, or subnets. The mask is a binary pattern that is matched up with the IP address to turn part of the host ID address field into a field for subnets. TCP/IP: Transmission Control Protocol/ Internet Protocol.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.