WLAN 802.11 b/g Embedded Module User Manual (DRCM-81) Version: 1.0 Nov.
Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise without the prior writing of the publisher. Windows™ 98SE/2000/ME/XP are trademarks of Microsoft® Corp. Pentium is trademark of Intel. All copyright reserved.
Contents FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT .3 FOR OEM INTEGRATORS..........................................................................................4 HARDWARE INSTALLATION & ANTENNA INFORMATION ...............................5 1. INTRODUCTION .....................................................................................................8 1.1 THE WLAN 802.11G ...............................................................................................8 1.2 FEATURES ......
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
For OEM integrators This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna. As long as the 2 conditions above are met, further transmitter testing will not be required.
Hardware Installation & Antenna Information Module is installed in the Personal Computer, located on the bottom side of the Personal Computer. Antennas are embedded in the two sides (see the two antennas shown below) Only the antenna types listed below can be used: Antenna 1: Dipole (Model: F1B-204406-52, made by Long-Chu Co.) Antenna 2: Dipole (model: C478-510028-A, made by Wha Yu Co.) Important Note: This module is restricted to mobile configuration.
*Caution !! (1). This module cannot be bound in a tablet computer for RF exposure issues. (See label 1) (2). Due to the RF exposure issues, this module can be used in a laptop computer in normal operation, but cannot be used when it is put above the lap and the LCD screen is in the closed position.
(3). This module must be labeled with FCC ID. (See label 3) Label 3 (4). If the FCC ID is not visible when the module is installed inside another device, then the outside of device must also display a label referring to the enclosed module. The exterior label can be “ Contains Transmitter Module FCC ID:NKRDRCM ” or similar wording. (See label 4) Contains Transmitter Module DRCM-81 FCC ID: NKRDRCM Label 4 Please put Label 3 & Label 4 to the enclosure of end product to note the end user.
1. Introduction 1.1 The WLAN 802.11g 802.11g is a 54Mbps wireless networking standard that's almost five times faster than the widely deployed 802.11b products found in homes, businesses, and public wireless hotspots. Because both 802.11b and 802.11g share the same 2.4GHz radio band, 802.11g devices can also work with existing 11Mbps 802.11b equipment.
2. Planning Your Wireless Network 2.1 WLAN A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name for wireless devices. 2.2 Ad-Hoc and Infrastructure Unlike wired networks, wireless networks have two different modes: Ad-Hoc and Infrastructure.
Figure 2-2.) Ad-Hoc mode allows computers equipped with wireless transmitters and receivers to communicate directly with each other, eliminating the need for an access point. The drawback of this mode is that, in Ad- Hoc mode, wireless-equipped computers are not able to communicate with computers on a wired network.
3. Software Installation and Uninstallation Note! The Installation Section in this Manual describes the first-time installation for Windows. To re-install the driver, please first uninstall the previously installed driver. See Chapter “3.4 Uninstallation” in this Manual. 3.1 Setup Wizard Installation Follow the steps below to complete the driver/utility installation: 1. Insert the Installation Software CD into the CD-Rom Drive. 2. Click “Next” button. WLAN 802.
3. Read the License Agreement and click “Yes” button. WLAN 802.11g miniPCI Setup 4. Click “Next” button to continue or click “Browse” button to choose a destination folder. WLAN 802.
5. Click “Next” button. WLAN 802.11g miniPCI Setup miniPCI 6. Click “Yes” button.
7. Click “Finish” button. Restart your computer if necessary. WLAN 802.11g miniPCI Setup miniPCI 8. You may now see the WLAN 802.11g Utility shortcut icon on the desktop.
3.2 Additional Setup Processes During software installation procedure, each operating system may prompt different specific options. Mostly, you will be asked to add some necessary protocols and to edit some networking settings. Please contact the network administrator for details. 1. Windows 98SE: The system may request the original Windows CD during the installation process. When the installation is finished, you’ll have to restart your computer. 2.
3.3 Uninstallation Note! Before uninstallation, please close all running programs. 1. Click Start>Programs>WLAN 802.11g miniPCI Utility>UnInstall WLAN 802.11g miniPCI. 2. Choose “Remove-Remove all installed features” and click “Next” button. 3. Click “OK” button to reconfirm. 4. Click “Finish” and restart your computer to complete Uninstallation steps.
4. Using IEEE802.11g WLAN Utility 4.1 Overview Use IEEE802.11g WLAN Utility to search for available wireless networks, connect to wireless network, or check the link status. 4.2 Accessing the Configuration Utility 1. After software installation, the WLAN 802.11g Utility icon will appear on your desktop. Double click the icon. 2. The WLAN 802.11g Utility will appear and automatically link with the available network that has the best signal strength and is not WEP encrypted.
4.3 Link Status The Link Status tab shows the link status, including SSID, channel, Mac Address, IP address, Link Quality and Signal Strength.
4.4 Configure Profile The Configure Profile tab is for you to create and configure the profile (Network) that you frequently use to link per your requirement. The profile records the system Configuration, Authentication and Security. 4.4.1 To create a profile 1. Click “Add” button. 2. Add Profile window pops up. Enter a Profile Name and choose a SSID. 3.
Infrastructure Network Type. For 802.11 Ad Hoc Network Type, please activate PSM (Power Saving Mode). 4. In Authentication & Security tab, please contact the network administrator for WEP Key setting if the chosen AP (SSID) is WEP encrypted. Authentication Type Four options are available: None, Shared, WPA and WPA-PSK. 802.1x If choose to use 802.1x, please click “802.1x Setting” button to open 802.1x Setting window. Contact the network administrator for the value of each setting.
5. Click “OK”. The newly created profile is now listed in Configure Profile tab. S D 105 4.4.2 To edit a profile 1. In Configure Profile tab, choose the profile (by clicking the profile name from the list) and then click “Edit” button. S D 105 2. Add Profile window pops up. Authentication & Security tab. Edit the settings in Configuration tab and Click “OK” button to save the new settings.
4.4.3 To delete a profile 1. In Configure Profile tab, choose the profile (by clicking the profile name from the list). 2. Click “Delete” button. 4.4.4 To activate a profile 1. In Configure Profile tab, choose the profile (by clicking the profile name from the list). 2. Click “Activate” button. 3. An activate icon will appear in front of the profile name. indicates connected, and red one indicates disconnected.
4.5 Site Survey This tab gives you the information of all the available networks in vicinity, such as SSID, BSSID, Signal, Channel, Encryption, Authentication and Network Type, so that you can select a network with better signal for better performance. 4.5.1 To rescan available networks Click “Rescan” button to find all available networks in vicinity. 4.5.2 To join a network 1. Choose a network (by clicking the SSID from the list). 2. Click “Connect” button. 3.
Appendix A: Glossary 802.11b – One of the IEEE standards of wireless networking hardware. Products that adhere to a specific IEEE standard will work with each other, even if they are manufactured by different companies. The 802.11b standard specifies a maximum data transfer rate of 11Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks. 802.11g – Refers to the proposed extension of the IEEE 802.
DHCP uses the concept of a “lease” or amount of time that a given IP address will be valid for a computer. The lease time can vary depending on how long a user is likely to require the Internet connection at a particular location. It’s especially useful in education and other environments where users change frequently. Using very short lease, DHCP can dynamically reconfigure networks in which there are more computers than there are available IP address.
international standards. The organization publishes a number of journals, has many local chapters, and several large societies in special areas, such as the IEEE Computer Society. Infrastructure Network – An Infrastructure network is a group of computers or other devices, each with a wireless adapter, connected as an 802.11 wireless LAN. In infrastructure mode, the wireless devices communicate with each other and to a wired network by first going through an access point.
unique hardware number. mIRC – mIRC runs under Windows and provides a graphical interface for logging onto IRC servers and listing, joining and leaving channels. Network Mask – also known as the “Subnet Mask”. OFDM – Developed for wireless applications, Orthogonal Frequency Division Multiplexing (OFDM) technology offers superior performance-increased data rates and more reliable transmissions- than previous technologies, such as DSSS.
or subnets. The mask is a binary pattern that is matched up with the IP address to turn part of the host ID address field into a field for subnets. TCP (Transmission Control Protocol) - A method (protocol) used along with the IP (Internet Protocol) to send data in the form of message units (data gram) between network devices over a LAN or WAN.