LP-7694(100mW) 802.11 B/G/N Wireless PCI-E Card(2T2R) User Manual 1.
Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction............................................................................................................3 1.1 Welcome.................................................................................................3 1.2 Contents of Package...............................................................................3 Designing Your PCI Adapter..................................................................................3 Installation.........
1. Introduction 1.1 Welcome PCI Adapter connects you with IEEE802.11n networks at receiving rate up to an incredible 300Mbps! By using the reflection signal, 802.11n technology increases the range and reduces "dead spots” in the wireless coverage area. Unlike ordinary wireless networking of 802.11b/g standards that are confused by wireless reflections, 802.11n can actually use these reflections to increase four times transmission range of 802.11g products.
3.2 Install Driver and Utility NOTE: Snap-shot screens of the following installation procedure are based on Windows 7 Installation procedures will be similar for other windows operating systems. 1. Insert Installation CD to your CD-ROM drive. And click Driver Installation. The wizard will run and install all necessary files to your computer automatically. 2. Click Next to accept the Agreement.
3.
4. Select Ralink Configuration Tool or Microsoft Zero Configuration Tool then click Next. a. It’s recommended to select Ralink Configuration Tool, which provides fully access to all function of PCI Adapter. b.
5. Click Finish to complete the software installation.
4. Windows Wireless Utility 4.1 Windows AutoConfig Service for Win 7 4.1.1 Ralink Wireless Utility and Windows AutoConfig Service Notes: The following installation was operated under Windows 7. (Procedures are similar for Windows XP /vista) In Windows 7, the AutoConfig service provides basic wireless configuration functions for the Ralink Wireless Network Interface Controller. In order to perform these functions, the AutoConfig service should first be enabled (Refer to Section 1-2-2).
Figure 1-4 Ralink Utility in full mode 4.1.2 Windows AutoConfig Service The following steps outline the procedure for starting/stopping the Windows AutoConfig service.
Double-click the "System and Security" icon Double-click the "Administrative Tools" icon 10
Double-click "Services" Double-click "WLAN AutoConfig" Manage the AutoConfig properties in the dialog box 11
Windows profile manager can be accessed via control panel or network connection icon in the task bar. 1.
Right-click the network to bring up the profile managing menu 13
2.
Select "Manage wireless networks" from the tasks list Right-click the network to bring up the profile managing menu 16
5. Ralink Wireless Utility (RaUI) 5.1 Start 5.1.1 Start RaUI When starting RaUI, the system will connect to the AP with best signal strength without setting a profile or matching a profile setting. When starting RaUI, it will issue a scan command to a wireless NIC. After two seconds, the AP list will be updated with the results of a BSS list scan. The AP list includes most used fields, such as SSID, network type, channel used, wireless mode, security status and the signal percentage.
Figure 2-1-3 Link Information page Figure 2-1-4 Profile page Figure 2-1-5 Network page 18
Figure 2-1-6 Advance page Figure 2-1-7 About page When starting RaUI, a small Ralink icon appears in the notifications area of the taskbar, as shown in Figure 2-1-15. You can double click it to maximize the dialog box if you selected to close it earlier. You may also use the mouse's right button to close RaUI utility.
Additionally, the small icon will change color to reflect current wireless network connection status. The status is shown as follows: : Indicates the connected and signal strength is good. : Indicates the connected and signal strength is normal. : Indicates that it is not yet connected. : Indicates that a wireless NIC can not be detected. : Indicates that the connection and signal strength is weak. 5.2 Profile 5.2.
the bar or key in the value directly. Icons and buttons: : Indicates if a connection made from the currently activated profile. : Indicates if the connection has failed on a currently activated profile. : Indicates the network type is infrastructure mode. : Indicates the network type is in Ad-hoc mode. : Indicates if the network is security-enabled. : Click to add a new profile. : Click to edit an existing profile. : Deletes an existing profile. : Import an existing profile. : Export an existing profile.
Figure 2-2-2 Profile Name, SSID, Network Configuration Profile Name: The user can chose any name for this profile, or use the default name defined by system. SSID: The user can key in the intended SSID name or select one of the available APs from the drop-down list. Power Save Mode: Choose CAM (Constantly Awake Mode) or Power Saving Mode. Network Type: There are two types, infrastructure and 802.11 Ad-hoc modes. Under Ad-hoc mode, user can also choose the preamble type.
Figure 2-2-4 WEP Key Configuration WEP Key: Only valid when using WEP encryption algorithms. The key must be identical to the AP's key. There are several formats to enter the keys. 1. Hexadecimal - 40bits: 10 Hex characters. 2. Hexadecimal - 128bits: 26 Hex characters. 3. ASCII - 40bits: 5 ASCII characters. 4. ASCII - 128bits: 13 ASCII characters. Figure 2-2-5 Pre-shared Key Configuration Pre-shared Key: This is the key shared between the AP and STA.
802.1x Setting: This is introduced in the topic of “Section 3-2 : 802.1x Setting” Figure 2-2-7 Advanced Configuration Power Save Mode: Choose CAM (Constantly Awake Mode) or Power Saving Mode. Channel: Only available for setting under Ad-hoc mode. Users can choose the channel frequency to start their Ad-Hoc network. 5.2.3 Pre-logon Connect The Pre-logon Connect configuration page as shown in Figure 2-2-4.
Figure 2-3-1-1 Network function Definition of each field: SSID: Name of BSS or IBSS network. Network Type: Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network Channel: Channel in use. Wireless Mode: AP support wireless mode. It may support 802.11a, 802.11b, 802.11g or 802.11n wireless mode. Security-Enable: Indicates if the AP provides a security-enabled wireless network. Signal: Receive signal strength of the specified network.
: Indicate that the AP list is sorted by SSID, Channel or Signal. : Button to connect to the selected network. : Issues a rescan command to the wireless NIC to update information on the surrounding wireless network. : Adds the selected AP to the Profile setting. It will bring up a profile page and save the user's setting to a new profile. Connected network: When RaUI first runs, it will select the best AP to connect to automatically.
5.4 Advanced 5.4.1 Advanced Figure 2-4 Advance function Wireless mode: Select wireless mode. 2.4G, 5G and 2.4+5G are supported.(2.4G/5GHz options are depend on different products) Wireless Protection: Users can choose from Auto, on, and off. (This is not supported by 802.11n adapters.) Auto: STA will dynamically change as AP announcement. On: The frames are always sent with protection. Off: The frames are always sent without protection. TX Rate: Manually select the transfer rate.
5.4.2 Certificate Management The Certificate Management configuration page as shown in Figure 2-4-2. Figure 2-4-2 Certificate Management function 5.5 Link Information 5.5.1 Link Status The link status page displays detailed information about the current connection as shown in Figure 2-5-1. Figure 2-5-1 Link Status function Status: Current connection status. If no connection, if will show Disconnected. Otherwise, the SSID and BSSID will show here. Extra Info: Display link status in use.
Encryption: Encryption type in use. Network Type: Network type in use. IP Address: IP address about current connection. 5.5.2 Throughput The throughput page displays detailed information about the current connection as shown in Figure 2-5-2. Figure 2-5-2 Throughput function Link Speed: Show current transmit rate and receive rate. Throughout: Display transmits and receive throughput in unit of Mbps.
Transmit Statistics: Frames Transmitted Successfully: Frames successfully sent. Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting retry limit. RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RTS frame. RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS. Frames Retransmitted Successfully: Successfully retransmitted frames numbers. Reset counters to zero.
Figure 2-10 About function Connect to Ralink's website: Ralink Technology, Corp. Display Configuration Utility, Driver, and EEPROM version information. Display Wireless NIC MAC address. 5.7 WPS 5.7.1 WPS Figure 2-7-1 illustrates the RaUI WPS functions. Figure 2-7-1 WPS function WPS Configuration: The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks.
Figure 2-7-1-1 WPS Profile PIN Code: The user is required to enter an 8-digit PIN Code into Registrar. When an STA is the Enrollee, you can click "Renew" to re-generate a new PIN Code. Config Mode: The station serving as an Enrollee or an external Registrar. Figure 2-7-1-2 WPS PIN function After the user clicks PIN or PBC, please do not rescan within two-minutes of the connection. If you want to abort this setup within the interval, restart PIN/PBC or click "Disconnect" to stop WPS action.
6. Security 6.1 Auth.\ Encry. Setting – WEP/TKIP/AES Figure 3-1 Auth.\Encry. Settings in the Profile Page Authentication Type: There are 7 authentication modes supported by RaUI. They are Open, Shared, WPA and WPA-PSK, WPA2 and WPA2-PSK, 802.1x, WAPI-PSK and WAPI-CA. Encryption Type: For open and shared authentication mode, the available encryption types are none and WEP. For Shared and 802.1x authentication mode, the selection of available encryption is WEP.
Figure 3-1-3 Pre-shared Key Configuration Pre-shared Key: This is the shared key between the AP and STA. If operating in WPA-PSK and WPA2-PSK authentication mode, this field must be filled with a key between 8 and 32 characters in length. Figure 3-1-4 WEP Key Configuration WEP Key: Only valid when using WEP encryption algorithm. The key must match the AP's key. There are several formats to enter the keys. 1. Hexadecimal - 40bits: 10 Hex characters. 2. Hexadecimal - 128bits: 32Hex characters. 3.
Authentication type: PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authenticates data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. TLS/Smart Card: Transport Layer Security. Provides for certificate-based and mutual authentication of the client and the network.
Tunnel Password: Password for tunnel. ID \ PASSWORD Authentication ID/Password: The identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain names can be keyed in the blank space. Tunnel ID/Password: Identity and Password for the server.. Client Certification Use Client certificate: Client certificate for server authentication.
Certificate issuer: Select the server that issues the certificate. Allow intermediate certificates: It must be in the server certificate chain between the server certificate and the server specified in the "certificate issuer must be" field. Server name: Enter an authentication sever root.
7. Trouble Shooting This chapter provides solutions to problems that may occur during the installation and operation of PCI Adapter. Read the descriptions below to solve your problems. 1. The PCI Adapter does not work properly. Reinsert PCI Adapter into your PC’s PCI slot. Right click on My Computer and select Properties. Select the device manager and click on the Network Adapter. You will find PCI Adapter if it is installed successfully.
8. Warnings Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.