2.4GHz Wireless 802.11n (DRAFT 2.0) PCI Adapter User's Guide Version 0.
Copyright This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Copyright 2006 Version 1.0 (June, 2006) Disclaimer The information in this document is subject to change without notice.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
CE Mark Warning This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
Table of Contents Federal Communications Commission Interference statement CE Mark Warning 3 4 Chapter 1 - Getting Started with the WPC-370L L 6 Chapter 2 - Wireless LAN Networking Transmission Rate (Transfer Rate) Type of Wireless Networks Wireless LAN Security 7 7 7 11 Chapter 3 - Hardware and Wireless Utility About Your 11n (Draft) Wireless PCI Adapter Package Content System Requirement LED Definition Hardware and Wireless Utility Installation Using the Utility to Configure Your Network 13 13 13 1
Chapter 1 - Getting Started with the WPC-370L Congratulations on purchasing the WPC-370L! This manual provides information for setting up and configuring the WPC-370L. This manual is intended for both home users and professionals. It is not required to read some of the more technical information in this manual (such as in “Wireless LAN Networking” and “Configuring Wireless Security”) to operate and enjoy the WPC-370L. It is included for your reference only.
Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technology. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WPC-370L provides various transmission (data) rate options for you to select. In most networking scenarios, the factory default Fully Auto setting proves the most efficient.
Independent Basic Service Set (IBSS). To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel for each station.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WPC-370L automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram Wireless LAN Security Because wireless networks are not as secure as wired networks, its vital that security settings are clearly understood and applied.
D ATA E NCRYPTION WITH W E P The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted between the WPC-370L and the access point or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. There are two ways to create WEP keys in your WPC-370L.
Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your 11n (Draft) Wireless PCI Adapter With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Card. Automatic rate selection. Data rate up to 300Mbps. Offers 64-bit, 128-bit WEP (Wired Equivalent Privacy) data encryption for network security. Supports IEEE802.
Hardware and Wireless Utility Installation Follow the instructions below to install the PCI Card and Wireless Utility. 1. Turn off your computer‚ unplug the power cord and remove the computer's cover. 2. Pick a free PCI expansion slot and remover the protective bracket. Insert the Card into the slot until it is fully seated. 3. Secure the Card bracket with the screw from step 2. Replace the computer’s cover. 4. Connect the external antenna to the Card from the SMA connector.
10. In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Next. 11. The wizard is ready to begin installation. Click Install on it. 12. At the Software Installation menu click Continue Anyway.
13. Click Finish to complete the client utility installation. Please reboot your computer. 14. After rebooting, The Client Utility icon resides on the Desktop at the System Tray automatically. 15. The OS detects the PCI Card after rebooting; the Found New Hardware Wizard window appears, click Next to continue. 16. Choose “Install the software automatically” , and click Next.
. At the hardware installation menu click Continue Anyway. (Our product has been tested under Windows XP and found to be fully compatible click Continue Anyway.) 18. The Windows has finished installing driver for the device. Click Finish to finish the installation.
Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and double click the left mouse button to open the Wireless Client Utility. The Wireless Client Utility window as shown below will appear. The user can now use any of the management functions available in the IEEE 802.
The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile tab. SSID Displays the wireless network name. Link Status Shows whether the station is associated to the wireless network. Network Type The type of network the station is connected to. The options include: Infrastructure (access point) Ad Hoc Wireless Mode Displays the wireless mode. 802.
Channel Width 20MHz only or 40/20MHz channel support Security Status Security Shows the security type – Disable, WEP, WPA/WPA2, WAP-PSK/WAP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP Status IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway address DNS Server Display DNS server address Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks.
Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network. Follow the procedures to create profile for that network. Profile To add a new configuration profile, click Add on the Profile tab. To modify a configuration profile, select the configuration from the Profile list and click the Edit button.
Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
Click Next to continue the profile setting. To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WEP This card support three modes of WEP, include: 64 Bits 128 Bits 152 Bits Except 152-Bit ode, both 64-Bit & 128-Bit modes support Passphrase. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen.
tunnel between the client and the authentication server. The tunnel then protects the subsequent user authentication exchange. PEAP (EAP-MSCHAP V2) (Protected Extensible Authentication Protocol) To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set.
The following table describes the items found on the Advanced Settings screen. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. The options include: Continuous Access Mode Maximum Power Saving Fast Power Saving 802.11b Preamble Displays the 802.11b preamble format. The options include: Long Short Auto RTS Threshold Value from 0 ~ 2347 FRAG Threshold Value from 256 ~ 2346 Wireless Mode Enable or disable 802.11n mode.
Chapter 4 - Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. Uninstall the Driver Follow the steps below to remove (or uninstall) the Card driver from your computer. Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click System Step 3. Under Hardware tab, click Device Manager. Step 4. Double-click Network Card Step 5. Right-click mouse button on “802.11n Wireless LAN Card”, and choose Uninstall Step 6.
Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. A D-H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). C HANNEL A radio frequency used by a wireless device is called a channel.
SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. T E M PO R AL K EY I NT EG RIT Y P ROTO CO L (TKIP) Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. U SE R A UT H E NT I C AT I O N WPA applies IEEE 802.
48