2.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning Chapter 1 – Wireless LAN Networking Transmission Rate Type of Wireless Networks Ad-Hoc (IBSS) Network Infrastructure (BSS) Network Wireless LAN Security Data Encryption with WEP Chapter 2 - Getting Started About Your 2.
Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The adapter provides various transmission (data) rate options for you to select. Options include Fully Auto, 1 Mbps, 2 Mbps, 5.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the adapter automatically switches to the channel used in BSS (2).
W IRELESS LAN S ECURITY Because wireless networks are not as secure as wired networks, it’s vital that security settings are clearly understood and applied. 1. The list below shows the possible wireless security levels on your adapter starting with the most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange.
Chapter 2 - Getting Started This chapter introduces the Adapter and prepares you to use the Wireless Utility. 2.1 About Your 2.4GHz/5GHz Wireless USB Adapter The Adapter is an 802.11a, 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Adapter. 2.4GHz / 5GHz Dual-band design Compliant to IEEE 802.11a, 802.11g & 802.11b standards Compliant to IEEE 802.
2.5 Wireless Utility & Adapter Hardware Installation NOTE: If you have connected the USB Adapter to your computer, please remove it first. Follow the instructions below to install the USB Adapter and Utility. STEP 1 Please insert your USB Adapter to your Laptop, and auto-install the driver and utility. 2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program.
The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile tab. SSID Displays the wireless network name. Link Status Shows whether the station is associated to the wireless network. The type of network the station is connected to. The options include: Network Type Infrastructure (access point) Ad Hoc Wireless Mode Displays the wireless mode.
2.6.2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click Refresh to refresh the list at any time. Connecting to a different network Hold your mouse pointer over the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network.
To add a new configuration profile, click Add on the Profile tab. To modify a configuration profile, select the configuration from the Profile list and click the Edit button. Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
Click Next to continue the profile setting. To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen. The options include: TLS (Transport Layer Security) is a Point-to-Point Protocol (PPP) extension supporting additional authentication methods within PPP.
WPA-PSK/WPA2-PSK Enables WPA/WPA2 Passphrase security. Fill in the WPA/WPA2 Passphrase on Security Settings screen. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x Security Settings screen. The options include: TLS PEAP TTLS LEAP Advanced Settings After Security Settings finished, the Advanced Settings screen will be shown as following. The following table describes the items found on the Advanced Settings screen.
After advance settings are finished, the following screen showed as below. You can activate the profile now or later.
Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. 3.1 Uninstall the Driver & Utilty Follow the steps below to remove (or uninstall) the USB Adapter driver from your computer. Step 1. To remove the driver from the OS, go to Start Æ Programs Æ Wireless Client Utility Step 2. Double-click Uninstall Step 3.
Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). CHANNEL A radio frequency used by a wireless device is called a channel.
ROAMING In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network. This is roaming. As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors.