IEEE802.11n draft 2.
FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communication.
IMPORTANT NOTE: In the event that these conditions cannot be met (for example certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID cannot be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization.
Contents 1. Introduction ................................................................... 4 1.1 Features ................................................................. 4 1.2 LED Indicator ......................................................... 4 1.3 Package Contents ................................................... 5 1.4 Before you start...................................................... 5 2. Installation Procedure .................................................... 5 2.
1. Introduction This is a mini-PCI interfaced WLAN card that fully complies with IEEE802.11n draft 2.0 and IEEE802.11 b/g standards and operate in 2.4GHz bands. Its maximum data transfer rate up to 300 Mbps. It delivers unrivaled wireless performance for your Notebook or Wireless gateway (Wireless ADSL router, Wireless broadband router or Access point) and also provides peer-to-peer communication among any compatible wireless users and no Access Point required.
1.3 Package Contents ‧ One Wireless Cardbus adapter ‧ One CD includes driver and user’s manual 1.4 Before you start You must have the requirements as follow, ‧ A laptop computer with an available 32-bit Cardbus slot ‧ At least a 300MHz processor and 32MB memory ‧ Windows 98SE/ME/2000/XP/XP-64bit/Vista 32bit/Vista 64bit support ‧ A CD-ROM drive ‧ Cardbus controller properly installed ‧ An IEEE802.11g or IEEE802.11b Access Point (for Infrastructure mode) or another IEEE802.11g or IEEE802.
STEP2: Insert Installation CD into CD-ROM drive then windows below will appear. Click Install Driver to begin device driver installation. STEP3: Please read the following license agreement. Use the scroll bar to view the rest of this agreement. Click Yes to accept the agreement.
STEP4: In Windows XP, there is a Windows Zero Configuration Tool for you to setup wireless adapter. You can choose to configure the adapter through the Microsoft Zero Configuration Tool or the Ralink Configuration Tool. It is recommended to choose the Ralink Configuration Tool for the adapter. Click Next to continue. STEP5: If you need the adapter to operate with better performance, place choose Optimize for performance mode to enable the Tx Burst mode.
STEP6: Please wait for a while during the adapter is configuring your new software installation. STEP7: When the adapter is installed properly, the configuration utility will be displayed automatically.
STEP8: Click Finish button to exit the setup wizard. To check if the adapter is properly installed, you can right-click My Computer Æ choose Properties Æ click Device Manager.
The Configuration Utility appears as an icon on the system tray of Windows while the adapter is running. You can open the utility by double-click on the icon. Right-click the icon, there are some items for you to operate the configuration utility, z Launch Config Utilities Æ Select this option to open the Configuration Utility tool.
STEP2: Click “Advanced” as below, STEP3: Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter and then click OK to continue. Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the adapter.
3.1 Profile In the “Profile”, you can view and manage the current using Available Point(s). You can Add, Delete, Edit, or Activate the current Available Point(s). Also you can duplicate the AP or set current AP as Default. Profiles Name: The Profiles List displays all the profiles and the relative settings of the profiles including Profile Name, SSID, and Channel…etc; preset to PROF* (* indicate 1,2,3,…) SSID: AP to Ad-hoc name. Channel: Channel in use for Ad-Hoc mode. Authentication: Authentication mode.
3.2 Link Status In this section, you can immediately monitor the current connected link status, such as Link Speed, Throughput, Link Quality, Signal Strength, Noise Level …etc. Status: Current connection status. If no connection, it will show Disconnected. Otherwise, the SSID and BSSID will show here. Extra Info: Display the link status in use. Channel: Display the number of the radio channel and the frequency used for the networking.
3.3 Site Survey When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the network nearby will be listed. You can change the connection to another network or add one of the networks to your own profile list. SSID: Name of BBS of IBSS network.
Add to Profile: Add the selected AP to Profile setting. It will bring up profile page and save user’s setting to a new profile. [Connected Network] (1) When Raconfig first ran, it will select the best AP to connect automatically. (2) If user wants to connect to other AP, he can double-click mouse on the intended AP to make connection. (3) If the intended network has encryption other than “Not Use”, Raconfig will bring up the security page and let use input the appropriate information to make the connection.
Network Type: Infrastructure – This operation mode requires the presence of a wireless Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless station in the Wireless LAN network without through an Access Point or Router. Tx Power: If you want to lower the transmit power of the adapter for saving the power of the system, you can select the lower percentages from the list.
3.3.2 Authentication and Security Authentication Type: This setting has to be consistent with the wireless networks that the adapter intends to connect. Open: No authentication is needed among the wireless devices. Shared: Only Wireless device using a shared key (WEP Key identified) is allowed to connecting each other. Setup the same key as the wireless device that the adapter intends to connect. LEAP: LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols.
WPA2 – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required to the corporate user or government users. The different between WPA and WPA2 is that WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WPA2-PSK – WPA2-PSK is also for home and small business.
64-bit – Input 10-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 5-digit ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example: “0123456aef” or “test1” 128-bit – Input 26-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 13-digit ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example: “01234567890123456789abcdef” or “administrator” 3.3.3 802.1x Setting-Certification The IEEE 802.
Authentication Type: The EAP authentication protocols this adapter has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP and TTLS: PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, including CHAP, MS-CHAP, MS-CHAPv2, PAP and EAP-MD5.
Tunneled Authentication: -- Protocol: When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. -- Identity: This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of @. The user’s home realm is optional and indicates the routing domain.
Domain name must end in specified name: When selected, the server name field identifies a domain. The certificate must use a server name belonging to this domain or to one of its sub-domains (e.g. zeelans.com, where the server is blueberry.zeelans.com) but it may be any name used in the certificate name field. 3.4 Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates the MIB counters into a format easier for user to understand.
3.5 Advanced In the “Advanced”, you can configure more advanced settings, for example: wireless Mode, B/G Protection, Tx Rate, Country Region Code…etc. Wireless Mode: Select wireless mode. 802.11 B only, 802.11 B/G mix, 802.11 B/G/N mix, 802.11 B/G mix, and 802.11 B/G/N mix modes are supported Select Your Country Region Code: The available channel differs from different countries. For example: USA (FCC) is channel 1-11, Europe (ETSI) is channel 1-13.
Tx BURST: The Burst enables the adapter to deliver the better throughput in the same period and environment. Enable TCP Window Size: The TCP Window is the amount of data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it. When the Router or AP card is connecting to have set up the TCP Window, you can enable the parameter to meet the data size for the Router or AP connection. The larger TCP Window the better performance.
3.6 QoS The QoS Page of RaConfig. It involves “WMM Enable”, “WMM – Power Save Enable” and DLS setup. 3.6.1 Configure to enable Wi-Fi Multi-Media If you want to use “WMM – Power Save” or “Direct Link”, you must enable WMM. The setting method of enabling WMM indicates as follows: Step1: Click “WMM Enable” Step2: Click “Apply”.
Step3: Change to “Site Survey Page”. And add an AP that supports WMM features to a Profile. The result will look like the below figure in Profile page. 3.6.2 Enable WMM – Power Save Enable Step1: Click “WMM – Power Save Enable”. And Click “Setting…” button.
Step2: After clicking “Setting…” button, show “Power Save Setting” dialog. Please select which ACs you want to enable. Then click “Apply” button. The setting of enabling WMM – Power Save is successfully. 3.6.3 Enable DLS (Direct Link Setup) Step1: Click “Direct Link Setup Enable”. And Click “Apply” button Step2: Change to “Site Survey Page”. And add an AP that supports DLS features to a Profile. The result will look like the below figure in Profile page.
The Setting of DLS indicates as follow: 1. Fill in the blanks of Direct Link with MAC Address of STA. The STA must conform to two conditions as follow: Step1: Connect with the same AP that support DLS features. Step2: Have to enable DLS.
2. Timeout Value represents that it disconnect automatically after some seconds. The value is integer. The integer must be between 0~65535. It represents that it always connects if the value is zero. Default value of Timeout Value is 60 seconds 3. Click “Apply” button. The result will look like the below figure. Describe “DLS Status” as follow: 1. As the up figure, after configuring DLS successfully, show MAC address of the opposite side and Timeout Value of setting in “DLS Status”.
it shows MAC address of myself and Timeout Value of setting. 2. Display the values of “DLS Status” to “Direct Link Setup” as follow: Step1: In “DLS Status”, select a direct link STA what you want to show it’s values in “Direct Link Setup”. Step2: Double click. And the result will look like the below figure.
3. Disconnect Direct Link Setup as follow: Step1: Select a direct link STA. Step2: Click “Tear Down” button. The result will look like the below figure.
3.7 WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simply the security setup and management of Wi-Fi Networks. WPS Site Survey: Display the information of surrounding APs with WPS IE from last scan result. List information’s include SSID, BSSID, Channel, ID (Device Password ID), Authentication Type and Encryption Type. Rescan: Issue a rescan command to wireless NIC to update information on surrounding wireless network.
empty credential, the driver will select and non-security AP. PIN: Start to add to AP using PIN configuration Method. PBC: Start to add to AP using PBC configuration Method. PS: When you click PIN or PBC, please don’t do any rescan within 2-minute connection. If you want to abort this setup within the interval, restart PIN/PBC or press Disconnect to stop WPS action. WPS associate IE: Send the association request with WPS IE during WPS setup. It is option for STA. 3.7.
Step2: Select an AP(SSID/BSSID) that STA will join to. Step3: Click “PIN” to start PIN connection. Step4: Enter PIN Code of STA into the Registrar when prompted by the Registrar. *Allow of an exchange between Step3 and Step4. *If you use Microsoft Window Connection Now as an External Registrar, you must start PIN connection at STA first. After that, search out your WPS Device Name and MAC address at Microsoft Registrar. Add a new device and enter PIN code of STA at Microsoft Registrar when prompted.
Step5: The result will look like the below figure. Step6: Configured and got one or multiple credential(s).
Step7: The connection is successfully. The result will look like the below figure.
Step9: The Detail screen will look like the below figure. *If Credential#1 is reliable and present, system will connect with Credential#1. On the contrary, system will auto rotate to the next exist credential. *Also you can click “Rotate” button. Command to rotate to the next credential you want to use. 3.7.2 To Add to AP using PBC Method The PBC method requires the user to press a PBC button on both the Enrollee and the Registrar within a 2-minute interval called the WALK TIME.
Step3: Then it can be shown “Scanning AP” as the below figure. Step4: When finding only one AP, join it.
Step5: Click WPS information on available WPS APs. Step6: Configured and got one or multiple credential(s).
Step7: Then connect successfully. The result will look like the below figure. 3.8 About In the “About”, you can click the hyperlink to connect the website for the information of the wireless chipset vendor and review basic information about the Utility such as the RaConfig Version, Driver Version, EEPROM Version, IP Address, Sub Mask, and Default Gateway.
4. Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. Symptom: The LED is Off. Possible Remedy: Make sure the Wireless adapter is inserted properly. Otherwise, please contact your vendor. 2. Symptom: The LED is always on not blinking. Possible Remedy: Make sure that you have installed the driver from the attached CD. 3. Symptom: The LED is blinking but the Wireless adapter icon does not appear in your icon tray.
Possible Remedy: Move the antennas of the access point or wireless router into an L shape (one vertically, and one horizontally). Click on the Refresh button on the Site Survey screen. If the computer still does not see the Access Point, and then try to move your Access Point closer to the computer. Then click on the Refresh button again. If the computer still does not see the Access Point, move all things that may cause interference with the wireless signal. 8.
10. What does IEEE 802.11 feature support? The product supports the following IEEE 802.11 functions: -- CSMA/CA Plus Acknowledge Protocol -- Multi-Channel Roaming -- Automatic Rate Selection -- RTS/CTS Feature -- Fragmentation -- Power Management 11. What is Ad-Hoc? An Ad-Hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, Connected as an independent wireless LAN. Ad-Hoc wireless LAN is applicable at a departmental scale for a branch or SOHO ope ration. 12.
software than previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level. 17. Would the information be intercepted while transmitting on air? WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling.