08Mbps Wireless Network PCI Adapter USER MANUAL
Contents 1. Introduction............................................................................................................3 1.1 Product Feature ..........................................................................................3 1.2 System Requirement ..................................................................................3 2. Getting Start ...........................................................................................................3 2.1 LED Indicators..............
1. Introduction 1.1 Product Feature ● ● ● Compliance with IEEE 802.11g and 802.11b standards Highly efficient design mechanism to provide unbeatable performance Achieving data rate up to 54Mbps for 802.11g and 11Mps for 802.11b with wide range coverage ● ● ● Strong network security with WEP and WPA support Auto-switch between the two standards, IEEE 802.11b and 802.11g Driver/Utility support most commonly used operating systems including Windows 98SE/ME/200/XP. 1.
Utility Program first. Make sure that the 108Mbps wireless Network PCI Adapter is NOT inserted into the PCI slot. NOTE: all the snapped images of installation mentioned in this manual are based on Windows XP. For other windows operating system, all the procedures are the same but the screens are not the exactly same. 2. Turn on the computer. Insert the CD into the CD-ROM Drive. “PC Card/ PCI Card” and then click the “Install”.
3. InstallShield Wizard will automatically start. 5 Please click “Next” to continue.
4. Please click “Finish” 5.
your PC. Open the computer case and then please insert the Wireless PCI Adapter into the empty PCI slot of your computer system. Once the Wireless PCI Adapter is installed, place the computer case back. Turn ON your computer. 2.2.2 Driver Installation 1. Please select the second option and click “Next”. 2.
3. Please click “Finish” 4. To make sure if the installation is successful, you could check it through the device management.
5. Once the installation is successful, a utility program icon will show on your desktop. To lunch the utility, just double click the icon. 3. Configuration 3.1 Link Information The default page is as below after you launch the Utility program.
Status: Shows the BSSID associated, which can be used to identify the wireless network. SSID: Shows current SSID, which must be the same for the wireless client and AP in order for communication to be established. Frequency: Shows the current frequency used for wireless network. Wireless Mode: Shows the current wireless mode used for wireless communication. Encryption: Shows the current encryption mode used for wireless network. TxRate: Shows the current data rate used for transmitting.
minimum amount of effort to implement a secure wireless network environment. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in the wireless network. Wireless Mode: There are two types available for selection ●Infrastructure – to establish wireless communication with LAN and other wireless clients through the use the Access Points.
Preamble: Select Long or Short Preamble type. Preamble is a sequence of bits transmitted at 1Mbps that allows the PHY circuitry to reach steady-state demodulation and synchronization of bit clock and frame start. Two different preambles and headers are defined: the mandatory supported Long Preamble and header, which interoperates with the 1 Mbit/s and 2 Mbit/s DSSS specification (as described in IEEE Std 802.11), and an optional Short Preamble and header (as described in IEEE Std 802.11b).
Encryption: 4 options are available: Disable, Enable, WPA and WPA-PSK. Select Enable or Disable for WEP data encryption feature. If one of the two options is selected, it is required to select the Authentication mode from the next dropping list. If WPA is selected, configuration is enabled. Please click the configuration. The below window is pop up. Then, please select the certificate that you like to use and enter the server name and login name If WPA-PSK is selected, click the configuration button.
data communication, and the key is used for extended length of time. Auto – depend on the communication to establish, and automatically use the proper authentication mode. The following will only be activated to allow for configuration when Encryption is enabled. Default Key: select one of the 4 keys to use. Network Key: enter values to these fields, either in HEX or ASCII formats.
Select any one of them to establish communications by simply mouse double-click or click on the “Connect” button. Click “Refresh” button to start scanning for available network again. Profile – You can create and manage the created profiles for Home, offices or public areas. By double-clicking on one of the created profile, the setting will adapt to the configuration such as SSID, channel, and WEP settings saved by that particular profile.
3.5 About US This page displays some information about the 54Mpbs PCI Adapter utility, which includes the version numbers for Driver, Firmware and Utility. When there is new version of software available for upgrade, you will be able to identify by version numbers. 4. Glossary Access Point: An internetworking device that seamlessly connects wired and wireless networks. Ad-Hoc: An independent wireless LAN network formed by a group of computers, each with a network adapter.
English letters as numbers from 0 to 127. Authentication Type: Indication of an authentication algorithm which can be supported by the Access Point: 1. Open System: Open System authentication is the simplest of the available authentication algorithms. Essentially it is a null authentication algorithm. Any station that requests authentication with this algorithm may become authenticated if 802.11 Authentication Type at the recipient station is set to Open System authentication. 2.
at exactly the same time, their signals collide. When the collision is detected, they both back off and wait a random amount of time before retrying. DHCP: Dynamic Host Configuration Protocol, which is a protocol that lets network administrators manage and allocate Internet Protocol (IP) addresses in a network. Every computer has to have an IP address in order to communicate with each other in a TCP/IP based infrastructure network. Without DHCP, each computer must be entered in manually the IP address.
is too small, it will create the overhead during the transmission. Gateway: a device that interconnects networks with different, incompatible communication protocols. HEX: Hexadecimal, HEX, consists of numbers from 0 – 9 and letters from A – F. IEEE: The Institute of Electrical and Electronics Engineers, which is the largest technical professional society that promotes the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession.
Roaming: A LAN mobile user moves around an ESS and enjoys a continuous connection to an Infrastructure network. RTS: Request To Send. An RS-232 signal sent from the transmitting station to the receiving station requesting permission to transmit. RTS Threshold: Transmitters contending for the medium may not be aware of each other. RTS/CTS mechanism can solve this “Hidden Node Problem”. If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.