MB8000G User’s Guide 802.
FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna. As long as 2 conditions above are met, further transmitter test will not be required.
installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. Table of Contents Introduction… … … … … … … … … … … … … … … … … ..1 Hardware Installation… … … … … … … … … … … … … .2 TopGlobal declares that MB8000G ( FCC ID: SUMMB8000G Software Installation… … … ..… … … … … … … … … … .3 ) is limited in CH1~CH11 for 2.4GHz by specified firmware controlled in U.S.A.
Introduction While Orthogonal Frequency Division Multiplexing (OFDM) is adopted by 802.11g for the high-speed transfer rate in a 2.4GHz range. TopGlobal’s MB8000G fully utilizes the benefits of 802.11g standard on the proven compatibility between two transfer modes and the high speed bit transfer that is desirable for multimedia application in Wireless environment. The internal Wireless LAN module allows your system (for example, your notebook) to connect wirelessly to other 802.
Congratulations! You have just completed the Wireless LAN hardware installation. When you boot up the computer, you should expect to see the wireless LAN connection capacity. IMPORTANT NOTE: To comply with FCC RF exposure Trouble Shooting If the wireless LAN card does not function: 1. Make sure you have properly installed the driver for the card. 2. Consult the card’s manual or contact the vendor for installation information.
Step 4 A Wireless Network Properties window will appear. Key (PSK) authentication method is used. Step 5 Enter the Network name (SSID) of no more than 32 alphanumeric characters. This SSID is a network name that identifies the wireless devices in the network. All workstations and access points must use the same SSID to be able to communicate with one another. The SSID is a 32-character field, and the value is case sensitive.
l l l Disabled: No encryption. WEP: Deselect Network Key is provided for me automatically and enter the Key provided by the network. Available only with Open and Shared Authentication. TKIP: Available with WPA and WPA-PSK Authentication. TKIP (Temporal Key Integrity Protocol) includes four algorithms: MIC (message integrity check), to protect packets from tampering; PPK (Per-Packet Key) hashing, to prevent weak key Key index There are four Keys (1, 2, 3, 4) that can be selected for WEP.
If the blue bubble does not appear, click Refresh. If it still does not appear, double-check that the wireless settings match the configuration of the wireless network. Step 10 Click OK to save your changes. Congratulation! You have successfully setup your wireless connection. Visit our website at www.topglobal.com.