NWH3050 802.
TRADEMARKS All names mentioned in this document are trademarks or registered trademarks of their respective owners. DISCLAIMER This document is provided “as is,” without warranty of any kind, either expressed or implied, including, but not limited to, warranties of merchantability or fitness for a particular purpose. The manufacturer may release improved or modified versions of this manual or any product or program described in this manual at any time.
Packing List Your NWH3050 802.11g+ MiniPCI Module package should contain the following items: • One NWH3050 802.
Contents Introduction 1 1 1.1 1.2 System Requirements 2 Hardware Requirements 2 Software Requirements 2 2 Terminology Used in this Guide 3 3 3.1 3.2 Familiarization and Installation The Parts of the Adapter 5 Adapter Installation 5 4 4.1 4.2 4.4 Driver Installation and Operation 9 Installation Preview 錯誤! 尚未定義書籤。 Installation Details 錯誤! 尚未定義書籤。 Driver Operation and Adapter Removal 錯誤! 尚 未定義書籤。 Uninstalling the Driver 12 5 5.1 5.
Introduction Congratulations on choosing an outstanding wireless networking product, and thank you for taking the time to read this user’s guide. About the NWH3050 Your NWH3050 802.11g+ MiniPCI Module has standards-based and enhanced features. Standards-based features: The adapter conforms fully to Institute of Electrical and Electronics Engineers (IEEE) standards 802.11b and 802.11g. IEEE 802.
1 System Requirements Before installing the adapter and related software, make sure the computer system meets the minimum requirements described below. 1. Open the task bar’s Start menu, go to Settings, and click Control Panel. 2. Double-click the System icon. The System Properties window will appear. 3. Find and click the Device Manager tab or button. If there is no Device Manager tab in the System Properties window, click the Hardware tab.
2 Terminology Used in this Guide Ad-hoc Network An ad-hoc network is a wireless local-area network (WLAN) made up of stations communicating directly with each other through their wireless interfaces. There is no central relay point, and normally no connection to a wired network. Ad-hoc mode is sometimes referred to as peer-to-peer, computer-to-computer, or Independent Basic Service Set (IBSS) mode. Figure 1 shows a typical ad-hoc network. Figure 1.
they automatically select the MAC address of one BSS member as an identifier for the group; this is the BSSID. It has become customary to refer to a wireless device’s MAC address as its BSSID even when the address is not being used to identify an active BSS. A BSS that includes an access point is often referred to as a cell.
4 Software Installation You must install the driver and utility from the adapter CD-ROM before inserting the adapter in the computer for the first time. To install the driver and utility, insert the CD-ROM and wait for the window shown below to appear. This may take 20 to 30 seconds on a laptop or notebook computer. Click Install Driver, and then click Next in each window that appears. In the final window, click Finish. This process is illustrated below.
6
The original window will reappear. Click Install Utility. Then, as before, click Next in each window that appears, and at the end click Finish. This process is illustrated below.
The original window will reappear. Click Exit and remove the CD-ROM. Commands for starting the utility, and for uninstalling the utility and the driver, will be added to the Start menu, and a shortcut icon for starting the utility will be added to your desktop display, as shown below.
5 Adapter Installation Before inserting the adapter in the computer for the first time, be sure to install the driver and utility as described above. Also take note of the following tips and cautions: • If the adapter is inserted or removed while the computer is running, the operating system may beep very loudly even if the sound control has been set to Mute or Muted.
In Windows XP, click Next until a message about “Windows logo testing” appears. Indicate that you wish to continue with installation. Click the Finish button when it appears. In Windows 98, click Next until you are prompted to insert your Windows CD-ROM. Follow the on-screen instructions. Click the Finish button when it appears. You will be prompted to restart the computer. Allow the system to restart. In Windows 2000, you must make sure a certain option is unchecked.
Click Next. A message about a “digital signature” will appear. Click Yes, and then click Finish in the window shown below.
6 Driver Operation and Adapter Removal The driver is automatically loaded into the computer’s memory whenever the system detects the adapter. When the adapter is not present, the driver is not loaded. The “removable device” icon in the system tray (also known as the “PC Card” or “Unplug/Eject” icon) lets you unload the driver and deactivate the adapter for safe removal.
7 Utility Startup and Shutdown The Wireless Adapter Utility is used to connect to wireless networks and use the adapter’s special features. Figure 9. Utility icons in the Start menu and on the desktop 7.1 Controlling the Utility The Wireless Adapter Utility behaves slightly differently from most programs with icons on the desktop and in the Start menu.
OK button: Clicking OK applies (sends to the adapter) any changes you have made in the adapter settings shown in the utility window. It also hides the window, whether you have made changes or not. Pressing the Enter key is the same as clicking OK. Cancel button: Clicking Cancel discards any unapplied changes you have made in the adapter settings shown in the utility window. It also hides the window, whether you have made changes or not. Pressing the Esc key is the same as clicking Cancel. Figure 11.
8 Operation This chapter explains how to establish wireless connections using your adapter and the Wireless Adapter Utility. It is assumed here that — • you have completed installation of the driver, utility, and adapter; • you know how to start the utility, hide and redisplay its window, and shut it down (see section 5.2, “Controlling the Utility”); and • you are within range of at least one wireless device that will accept a connection from you.
The utility’s panels are explained briefly below. The order of the explanations matches the order in which the right and left arrow keys take you through the panels. The Information panel shows if you are connected to a WLAN. When you have a connection, information about it appears here. This panel can also display important error messages. A Rescan button, present only when this panel appears, is for attempting to reconnect if the radio link has gone down.
This process is described in greater detail below. 1. Start up the Wireless Adapter Utility. The utility’s Information panel will appear. In most cases, the first time you run the utility, this panel will show that you have not joined a WLAN. If the WLAN you want to join allows automatic detection, the utility can create a profile containing all or most of the settings required for joining. You will need little or no information from the network operator.
• If WEP is disabled on the WLAN, go straight to step 4. • If WEP is enabled on the WLAN, go to the New Profile window’s Security panel. To enable WEP in this profile, pull down the Method list and select 64-Bit, 128-Bit, or 256-Bit. Controls for selecting the “key input method” (that is, key format) and for entering keys will appear. If you are unsure of how to set the Method and Key Input Method controls, you can determine the correct settings from the length and contents of the WLAN’s key or keys.
7 Utility Reference This chapter explains all the indicators and controls in each of the Wireless Adapter Utility’s panels. The panels are explained in the order in which the right arrow key takes you through them when the program has just been started up: Information, Configuration, Security, Site Survey, Profiles, and About. Note: The Configuration and Security panels in the Profile and New Profile dialog boxes contain all the same controls as those in the utility’s main window.
The SSID, a human-assigned name, defines the WLAN. It is sometimes called the network (or domain) name (or ID). Groups of devices using different SSIDs in the same area are considered to make up different WLANs. Your computer must be set to use the same SSID as all other machines on the WLAN. A “detectable” WLAN is one that broadcasts its SSID.
If your computer is set to obtain IP (Internet Protocol) settings automatically, the IP Address and Subnet Mask boxes will contain 0.0.0.0, and the Default Gateway box will be blank, before you join a WLAN. After you join a WLAN and receive IP settings from a server on the network, the settings will appear in these boxes. This is a way of letting you know that you are “fully connected” and can access e-mail, the World Wide Web, and other Internetbased resources.
SSID control: The SSID is a name that a wireless device uses to indicate which WLAN it is on or wants to join. It is case-sensitive, can be up to 32 characters long, and can contain letters, numbers, and symbols. All devices on a WLAN must have exactly the same SSID setting. Other terms often used for SSID are Extended Service Set Identifier (ESSID), domain ID, net ID, network name, extended network ID, and wireless network (or domain) name.
Channel control: This control is enabled only when the network mode (see above) is set to ad-hoc (either 802.11 or high-speed). An infrastructure WLAN can include many access points using different channels, and to allow roaming, the adapter must be able to switch channels automatically. An ad-hoc WLAN uses a single fixed channel, and the adapter must be set to that channel to join the WLAN.
7.3 The Security Panel The descriptions in this section apply to the Security panels in the main window, the New Profile dialog box, and the Profile dialog box. These panels all contain the same controls. Use the main window’s Security panel (shown below, without its initially blank lower part) to view the adapter’s current security settings, and to make experimental or temporary changes. Figure 16.
unencrypted (“open” authentication) or that they be encrypted (“shared” authentication), or it may allow stations to try both methods (“auto” determination of the authentication mode). The default setting of the Auth. Mode control is Open. If WEP is enabled on the WLAN, the operator has a responsibility to tell you if you need to set this control to Shared or Auto.
7.4 The Site Survey Panel The Site Survey panel shows the results of searches for WLANs. A search is carried out automatically when the utility starts up and whenever necessary to establish or maintain a connection. You can start a search manually by clicking the Search button. Figure 17. The Site Survey panel Each WLAN found in a search appears on a line of its own in the Site Survey listing.
ad-hoc mode, wireless stations communicate directly with each other. Only networking devices from the same product family as your adapter can operate in high-speed ad-hoc mode. Ch. (Channel) column: A channel is one of 14 groups of adjacent frequencies in the band used for wireless networking. Not all channels are available in all countries. A station operating in infrastructure mode automatically finds the channel used by any access point it is within range of.
7.5 The Profiles Panel The Profiles panel lists existing profiles. The list is initially in order of creation, with the oldest profiles at the top. After you have created profiles for a number of WLANs, you will probably use this panel more than any other. When you are within range of a WLAN that you have a profile for, just (1) start the utility, (2) click the Profiles tab, (3) double-click the profile, and (4) confirm that you want to apply the profile and join the WLAN.
The actions you can take in the Profiles panel are described below. • To change the order in which profiles are listed, click a column heading. For example, you can click the SSID column heading to have the list arranged in alphabetical order of the SSIDs. Click the heading again for reverse alphabetical order. • To see all of a profile name or SSID that exceeds the width of its column, let the pointer rest on it for at least half a second. The full name will usually appear in a pop-up description box.
7.6 The About Panel The About panel contains a copyright statement; gives hardware, software, and firmware version information; and shows the “regulatory domain” for the which the adapter was made. The regulatory domain is the country or region whose laws regarding radio transmissions the adapter’s capabilities conform to. Figure 19. The About panel This information can be helpful in the event that you require service or have an opportunity to upgrade the software.
Appendix A: Technical Support If you encounter a problem that cannot be solved by following the steps in the troubleshooting section, call your networking equipment supplier for help.
Appendix B: Limited Warranty Hardware The manufacturer warrants its products to be free of defects in workmanship and materials, under normal use and service, for a period of 12 months from the date of purchase from the manufacturer or its authorized reseller, and for the period of time specified in the documentation supplied with each product.
Charges: Usually, RMA (Returned Material Authorization) items will be returned to the purchaser via airmail, prepaid by the manufacturer. If any item is returned by another carrier, the purchaser will pay the difference. A return freight and handling fee will be charged to the purchaser if the manufacturer determines that the product is not defective or that the damage was caused by the user.
Appendix C: Specifications Standards compliance IEEE 802.11b, IEEE 802.11g, MiniPCI Regulatory compliance USA: FCC Part 15 Class B Frequency band 2400.0 to 2497.0 MHz (Japan) 2400.0 to 2483.5 MHz (North America and Europe) 2445.0 to 2475.0 MHz (Spain) 2446.5 to 2483.
Appendix E: Channels and Regulations The following table lists the IEEE 802.11b transmission channels and provides important notes on regulations regarding channel use.
FCC STATEMEMT: This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna. As long as 2 conditions above are met, further transmitter test will not be required.