Sercomm UB801RV3 USB Wireless-G Adapter User Manual UB801Rv3

Sercomm Corporation USB Wireless-G Adapter UB801Rv3

manual

Download: Sercomm UB801RV3 USB Wireless-G Adapter User Manual UB801Rv3
Mirror Download [FCC.gov]Sercomm UB801RV3 USB Wireless-G Adapter User Manual UB801Rv3
Document ID1077516
Application ID5o3HyPQOqhR4WL5tU2USCg==
Document Descriptionmanual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize57.86kB (723261 bits)
Date Submitted2009-03-06 00:00:00
Date Available2009-03-06 00:00:00
Creation Date2009-03-05 15:47:16
Producing SoftwareAcrobat Distiller 7.0 (Windows)
Document Lastmod2009-03-06 10:06:18
Document TitleMicrosoft Word - UB801Rv3_User Manual
Document CreatorPScript5.dll Version 5.2.2
Document Author: clioh

UB801R v3
USB Wireless-G Adapter
User Guide
ii
Table of Contents
CHAPTER 1 INTRODUCTION ............................................................................................. 1
Package Contents .............................................................................................................. 1
Features .............................................................................................................................. 1
LEDs ................................................................................................................................... 1
Operation ........................................................................................................................... 2
CHAPTER 2 INITIAL INSTALLATION .............................................................................. 3
Requirements ..................................................................................................................... 3
Procedure ........................................................................................................................... 3
CHAPTER 3 USING THE WINDOWS UTILITY ................................................................ 7
Overview ............................................................................................................................ 7
System Tray Icon ............................................................................................................... 7
Network Screen ................................................................................................................. 8
Link Status Screen .......................................................................................................... 11
Profile Screen ................................................................................................................... 12
Advanced Screen ............................................................................................................. 17
Statistics Screen ............................................................................................................... 19
WMM Screen ................................................................................................................... 21
WPS Screen ...................................................................................................................... 23
Radio on/off Screen ......................................................................................................... 25
About Screen .................................................................................................................... 26
APPENDIX A SPECIFICATIONS ....................................................................................... 27
Wireless USB Dongle....................................................................................................... 27
APPENDIX B ABOUT WIRELESS LANS .......................................................................... 28
Modes ............................................................................................................................... 28
BSS/ESS............................................................................................................................ 28
Channels ........................................................................................................................... 29
WEP & WPA-PSK .......................................................................................................... 29
WPA2-PSK ...................................................................................................................... 29
Wireless LAN Configuration .......................................................................................... 30
P/N: 956YMJ0030
Copyright © 2008. All Rights Reserved.
Document Version: 1.0 (2008)
All trademarks and trade names are the properties of their respective owners.
Chapter 1
Introduction
This Chapter provides an overview of the Wireless USB Dongle's features and
capabilities.
Congratulations on the purchase of your new Wireless USB Dongle. The Wireless USB
Dongle provides a wireless network interface for your Notebook or PC.
Package Contents
The following items should be included:
•
The Wireless USB Dongle Unit
•
Quick Start Guide
•
CD-ROM containing the on-line manual.
If any of the above items are damaged or missing, please contact your dealer immediately.
Features
•
Compatible with IEEE 802.11b and 802.11g 2.4GHz
•
Data transmission rate is up to 54Mbps
•
Supports Turbo Mode which can enhance the data transmission rate within the specific
wireless network
•
Supports WMM (Wi-Fi Multimedia) function (IEEE 802.11e QoS standard) and can meet
the requirement of the multi-media data bandwidth
•
Supports 64/128-bit WEP, WPA (TKIP with IEEE802.1x) and WPA2 (AES with IEEE
802.1x) functions for high level security
•
Supports CCS (Cisco Compatible Extensions) for the radio monitoring and fast roaming
•
Automatic fallback which increases the data security and reliability
•
Supports USB 2.0 interface
LED
Wireless USB Dongle
The Wireless USB Dongle has a single Link/Activity LED.
Link/Act LED
(Blue)
•
On - Associated with the network.
•
Off - Not associated with the network.
•
Blinking - Data being transferred.
USB Wireless-G Adapter User Guide
Operation
You should install the supplied software on the CD-ROM before inserting the Wireless
USB Dongle.
If you have any form of the wireless utility beforehand, please uninstall it.
Chapter 2
Initial Installation
This Chapter covers the software installation of the Wireless USB Dongle.
Requirements
•
Windows 2000/XP/Vista.
•
Available USB port.
•
CD-ROM drive.
•
IEEE802.11b and IEEE802.11g wireless LAN.
Procedure
You should install the supplied software BEFORE inserting the Wireless USB Dongle.
1. Insert the CD-ROM into the drive on your PC.
2. The installation program should start automatically. If it does not, run the Setup.exe
program.
Figure 1: Start Installation
3. On the License Agreement screen, select I accept the terms of the license agreement. Click
Next.
USB Wireless-G Adapter User Guide
Figure 2: License Agreement Screen
4. Choose Install driver and Allnet WLAN Utility to install both the driver and Allnet utility
software, or Install driver only.
Figure 3: Setup Type Screen
5. Select either Allnet Configuration Tool or Microsoft Zero configuration Tool on the
following screen.
Initial Installation
Figure 4: Windows New Hardware Screen
6.
On the following screen, click Install.
7.
8.
9.
Click Finish to exit the Wizard.
Insert the Wireless USB Dongle firmly into USB port of the PC.
If the Wireless USB Dongle was installed properly, you will now have a new icon in your
system tray, as shown below.
Figure 5: System Tray Icon
USB Wireless-G Adapter User Guide
Wireless USB Dongle Icon Table
Connection to the Wireless USB Dongle is established. The length of
green color indicates the signal strength.
No connection to the Wireless USB Dongle.
The Wireless USB Dongle is unplugged.
10. You can double- click this icon to configure the Wireless interface. See the following
chapter for details.
Chapter 3
Using the Windows Utility
This Chapter provides Setup details for the AP mode of the Wireless USB
Dongle.
Overview
If using Windows, you can use the supplied utility to configure the Wireless interface.
To Use the supplied Windows utility for Configuration
•
Double-click the Wireless Utility icon in the desktop.
•
Click Start - Programs - Allnet-All0233 - Wireless Utility.
This Chapter assumes you are using the supplied Wireless utility.
System Tray Icon
If the Wireless Utility program is running, you can double-click the icon in the System Tray or
right-click the icon and select "Launch Config Utility" to open the application.
Status Information
The menu options available from the System Tray icon are:
•
Launch Config Utility - This will display the main screen of the Utility.
•
Use Zero Configuration as configuration Utility - Wireless Zero Configuration (WZC),
is a service of Microsoft Windows which dynamically selects a wireless network to connect.
•
Exit - Terminate the connection to the Wireless USB Dongle.
Figure 6: Wireless USB Dongle menu
USB Wireless-G Adapter User Guide
Connecting to a Wireless Network
Double-click the Icon to open the Network screen, where you can select the Wireless network
you wish to join.
Network Screen
This screen is displayed when you double-click the system tray icon. You can also click the
Network tab in the screen.
When you open the utility program, it will scan all the channels to find all the access
points/stations within the accessible range and automatically connect to one of the wireless
devices which have the highest signal strength.
Figure 7: Network Screen
Data - Network Screen
SSID
The SSID (up to 32 printable ASCII characters) is a unique name
identified in a WLAN.
Network Type
It displays the Network type in use, Infrastructure for BSS, Ad-Hoc
for IBSS network.
Channel
The channel used by the Wireless network.
Wireless Mode
AP support wireless mode. It may support 802.11a, 802.11b or
802.11g wireless mode
Using the Windows Utility
Security-Enable
Whether AP provides security-enabled wireless network.
Signal
This is displayed as percentage (0 ~ 100%) of specified network.
Rescan
Click this button to rescan for all Wireless networks.
Add to File
Click this button to add the selected AP to Profile setting. It will bring
up profile page and save user's setting to a new profile.
Connect
Click this button to connect the Wireless network.
Wireless Network Sequence (order)
You can click the radio buttons in the Sort by >> section (ex. SSID, Channel or Signal) to
arrange the Wireless network in the desired order.
To Connect to a Wireless Network
•
Click the name of the wireless network to which you want to connect, and then click
Connect.
Note that once you are connected to a Wireless network, the Network screen will identify the
current wireless network with a blue arrow icon, as shown below.
Figure 8: Network Screen – Connected
USB Wireless-G Adapter User Guide
Icons
It indicates network type is infrastructure mode.
It indicates network type is Ad-hoc mode.
802.11b wireless mode
802.11g wireless mode
802.11n wireless mode
It indicates security-enabled wireless network.
It shows the information of Link Status Section.
It hides the information of Link Status Section.
10
Using the Windows Utility
Link Status Screen
The Link Status section displays the detailed information of the current connection. Click
button to show the status screen.
Figure 10: Link Status
Data - Link Status
Link Information
Status
It will indicate the current link status.
Extra Info
It shows the link status.
Channel
It displays the current channel in use.
Authentication
It will indicate the current authentication mode in use.
Encryption
It shows the wireless security that the wireless network is using.
Network Type
This will indicate "Infrastructure" or "Ad-hoc".
IP Address
It shows the current IP address on the wireless interface.
Subnet Mask
Subnet mask for the current IP address.
Default Gateway
Gateway IP address associated with the current IP address.
HT
It displays current HT status in use (802.11n wireless card
only).
Link Quality
It displays connection quality based on signal strength and
TX/RX packet error rate.
Signal Strength (1~3)
It receives signal strength (1~3), user can choose to display as
percentage or dBm format.
Noise Strength
It displays noise signal strength.
Link Speed
It will show current transmit rate and receive rate.
Throughout
It displays transmits and receive throughput in unit of Mbps.
11
USB Wireless-G Adapter User Guide
Profile Screen
Click Add to Profile button on the Network tab, or you can choose Profile tab of the utility,
then click Add, the Add Profile window will pop up. Users can setup the general settings,
encryption and authentication settings and so on. If you want to do the general settings, please
follow the instructions below.
Figure 10: Profile Screen
Data - Profile Screen
System Config
Profile Name
Enter or select a suitable name for this profile. Each profile must
have a unique name.
SSID
If the desired wireless network is currently available, you can
select its SSID. Otherwise, type in the SSID of the desired wireless network.
Power Save Mode
Select either CAM (Constantly Awake Mode) or PSM (Power
Saving Mode).
RTS Threshold
Select a value within the range of 0 to 2347 bytes
Fragment Threshold
Select the value from 256 to 2346 bytes. The default value is
2346.
12
Using the Windows Utility
Network Type
Select the desired option:
•
Infrastructure - Select this to connect to an Access point.
•
Ad-Hoc - Select this if you are connecting directly to another
computer.
Tx Power
Select the Tx (transmission) power according to the real environment.
Preamble
The preamble defines the length of the CRC (cyclic redundancy
check). Select either Auto or Long Preamble.
OK button
Click this button to save the settings and close the page.
Cancel button
The "Cancel" button will discard any data you have entered and
exit the page.
Auth./Encyp.
Authentication
You MUST select the option to match the Wireless LAN you
wish to join. The available options are:
•
Open - Broadcast signals are not encrypted. This method can
be used only with no encryption or with WEP.
•
Shared - Broadcast signals are encrypted using WEP. This
method can only be used with WEP.
•
LEAP - Light Extensible Authentication Protocol is a preEAP, Cisco-proprietary protocol. If selected, you have to enter the identity, password and domain name of your
computer.
•
WPA - This version of WPA requires a Radius Server on
your LAN to provide the client authentication according to
the 802.1x standard. Data transmissions are encrypted using
the WPA standard.
•
WPA-PSK - PSK means "Pre-shared Key". You must enter
this Passphrase value; it is used for both authentication and
encryption.
•
WPA2 - This version of WPA2 requires a Radius Server on
your LAN to provide the client authentication according to
the 802.1x standard. Data transmissions are encrypted using
the WPA2 standard.
•
WPA2-PSK - This is a further development of WPA-PSK,
and offers even greater security. You must enter this Passphrase value; it is used for both authentication and
encryption.
•
WPA None - If selected, you can only set encryption and
WPA-Preshared Key settings.
13
USB Wireless-G Adapter User Guide
Encryption
The available options depend on the Authentication method
selected above. The possible options are:
•
None - No data encryption is used.
•
WEP - If selected, you must enter the WEP data shown
below. This WEP data must match the Access Point or other
Wireless stations.
•
AES, TKIP - These options are available with WPA-PSK,
WPA2-PSK, WPA and WPA2. Select the correct option.
Use 802.1x
This setting only takes effect when using Open, Shared, WPA or
WPA2 mode. If enabled, click the 802.1x tab to configure the
related settings.
WPA Preshared Key
For WPA-PSK and WPA2-PSK modes, you need to enter the
desired value (8~63 characters). Data is encrypted using a 256Bit
key derived from this key. Other Wireless Stations must use the
same key.
WEP Key (1~4)
This setting is only available for Open or Shared mode.
There are 2 modes:
•
Hex - Only "A~F", "a~f", and "0~9" are allowed to be
entered.
•
ASCII - Numerical values, characters or signs are all allowed to be entered.
14
Using the Windows Utility
802.1x
EAP Method
There are 5 methods in the drop-down list.
•
PEAP - Protect Extensible Authentication Protocol. PEAP
transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can
authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and
administration of a secure wireless LAN.
•
TLS-Smart Card - Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and
the network. It relies on client-side and server-side certificates to perform authentication and can be used to
dynamically generate user-based and session-based WEP
keys to secure subsequent communications between the
WLAN client and the access point.
•
TTLS - Tunneled Transport Layer Security. This security
method provides for certificate-based, mutual authentication
of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
•
EAP-FAST - Flexible Authentication via Secure Tunneling.
It was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected
Access Credential) which can be managed dynamically by
the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the client
via disk or a secured network distribution method. Automatic
provisioning is an in-band, over the air, distribution.
•
MD5-Challenge - Message Digest Challenge. Challenge is
an EAP authentication type that provides base-level EAP
support. It provides for only one-way authentication - there is
no mutual authentication of wireless client and the network.
Tunnel Authentication
Select the desired option from the drop-down list.
Session Resumption
After reconnecting the signal which broke up, you can enable the
session resumption to reduce the transferring packet to accelerate
the speed.
Authentication ID /
Password
Enter the required data into the fields.
Tunnel ID / Password
Enter the ID and Password for the tunnel.
Use Client certificate
Click the checkbox to enable certificate authority server function.
Use certificate chain
When the EAP authentication type such as TLS, TTLS or PEAP
is selected and required a certification to tell the client what
server credentials to accept from the authentication server in
order to verify the server, you have to enable this function and
enter the required data in the related fields.
15
USB Wireless-G Adapter User Guide
To add a profile
1.
2.
3.
On the Profile tab, click Add button.
Complete and verify the settings on this screen are correct.
Click OK.
To delete a profile
1.
2.
On the Profile tab, select the profile that you want to delete.
Click Delete.
To edit a profile
1.
2.
3.
4.
On the Profile tab, select the profile that you want to edit.
Click Edit button.
Change the profile settings as necessary.
Click OK.
To enable a profile
1.
2.
In the list of available profiles, click the profile that you want to enable.
Click Activate.
16
Using the Windows Utility
Advanced Screen
Click Advanced tab of the utility, you can configure the detailed settings in this page.
Figure 9: Advanced Screen
Data - Advanced Screen
Advanced
Wireless Mode
Select the desired wireless mode.
Enable Tx Burst
Tx Burst enables the adapter to deliver better throughput during a
period of time but the function only takes effect when connecting
with the AP which also supports Tx Burst.
Enable TCP
Window Size
The TCP Window is the amount of data which a sender can send
on a particular connection before it gets an acknowledgement back
from the receiver that it has gotten some of it. When the router or
AP which the adapter is connecting to has set up the TCP Window,
you can enable the parameter to meet the data size for the router or
AP connection. The larger TCP Window the better performance.
Fast Roaming at..
When you want to fast roaming to the network nearby without
intercepting the wireless connection especially the adapter is
applied to the multimedia application or a voice call, you can
enable this function.
17
USB Wireless-G Adapter User Guide
Show Authentication Status Dialog
When connecting to an AP with authentication, if enabling this
function, it will display dialogs about 802.1x authentication during
the process.
Select Your Country Region Code
There are 8 kinds of Country Region Codes to choose from.
Enable CCX (Cisco
Compatible
eXtensions)
CCX (Cisco Compatible Extensions) is developed by Cisco for the
radio monitoring and fast roaming.
Apply
•
Turn on CCKM: During normal operation, LEAP-enabled
client devices mutually authenticate with a new access point by
performing a complete LEAP authentication, including communication with the main RADIUS server. When you
configure your wireless LAN for fast re-association, however,
LEAP-enabled client devices roam from one access point to
another without involving the main server. Using Cisco Centralized Key Management (CCKM), an access point configured
to provide Wireless Domain Services (WDS) takes the place of
the RADIUS server and authenticates the client so quickly that
there is no perceptible delay in voice or other time-sensitive
applications.
•
Enable Radio Measurement: When this parameter is enabled,
the Cisco AP can run the radio monitoring through the associated CCX-compliant clients to continuously monitor the
WLAN radio environment and discover any new Aps that are
transmitting beacons.
Click this button to save the changes you made.
18
Using the Windows Utility
Statistics Screen
Click Statistics tab of the utility, the page will display the transmitted and received results.
Figure 10: Statistics Screen
Data - Statistics Screen
Transmit
Frames Transmitted
Successfully
Frames successfully sent.
Frames Retransmitted successfully
Frames successfully sent with one or more reties.
Frames Fail To
Receive ACK After
All Retries
Frames failed to transmit after hitting retry limit.
RTS Frames Successfully Receive
CTS
Successfully receive CTS (Clear To Send) after sending RTS
(Request To Send) frame.
RTS Frames Fail To
Receive CTS
Failed to receive CTS (Request To Send) after sending RTS (Clear
To Send).
19
USB Wireless-G Adapter User Guide
Receive
Frames Receive
Successfully
Frames received successfully.
Frames Receive
With CRC Error
Frames received with CRC error.
Frames Dropped
Due To Out-ofResource
Frames dropped due to resource problem.
Duplicate Frames
Received
Frames received more than twice.
Reset Counter
Click the button to reset counters to zero.
20
Using the Windows Utility
WMM Screen
Click WMM tab of the utility, and you will see the following screen:
Figure 11: WMM Screen
Data - WMM Screen
WMM Enable
WMM is short for Wi-Fi Multimedia. It is a standard created to
define quality of service (QoS) in Wi-Fi networks. It is a precursor
to the upcoming IEEE802.11e WLAN QoS draft standard, which is
meant to improve audio, video and voice applications transmitted
over Wi-Fi. WMM adds prioritized capabilities to Wi-Fi networks
and optimizes their performance when multiple concurring applications, each with different latency and throughput requirements,
compete for network resources. Click the check box and then click
"Apply" button to apply this function to the system.
WMM - Power Save
Enable
Click the check box, and select the desired type of power saving
mode.
Direct Link Setup
Enable
Enable the check box and you may start to set MAC Address,
Timeout Value and check the DLS Status. Click "Apply" and this
setting will be applied to the system.
21
USB Wireless-G Adapter User Guide
MAC Address
Enter the remote system which you want to connect with. When
you want to enable this function, you have to make sure that your
wireless network supports WMM function and then enter the MAC
address of the adapter which wants to connect with the remote
system.
Timeout Value
The utility performs time-outs so that the program does not sit idle
waiting for input that may never come. Set a value to apply to the
system with WMM.
Apply
Click this button to save the changes you made.
Tear Down
Click this button will disconnect the selected Direct Link Setup.
22
Using the Windows Utility
WPS Screen
WPS (Wi-Fi Protected Setup) can simplify the process of connecting any device to the wireless network by using the push button configuration (PBC) on the Wireless Access Point, or
entering a PIN code.
You will use the WPS screen when you try to connect the wireless network with the WPS
function.
Figure 12: WPS Screen
Data - WPS Screen
WPS
WPS AP List
It displays the information of surrounding APs with WPS IE from
last scan result. List information includes SSID, BSSID, Channel,
ID (Device Password ID) and Security-Enabled.
Rescan
Click this button to update information on surrounding wireless
network.
Information
Display the information about WPS on the selected network. List
information includes Authentication Type, Encryption Type,
Config Methods, Device Password ID, Selected Registrar, State,
Version, AP Setup Locked, UUID-E and RF Bands.
23
USB Wireless-G Adapter User Guide
PIN Code
Enter the PIN code displayed in the following field to the WPS
screen of the access point. When STA is Enrollee, you can use
"Renew" button to re-generate new PIN Code.
Config Mode
Our station role-playing as an Enrollee or an external Registrar.
Detail
Information about Security and Key in the credential.
Connect
Click this button to connect to the selected network inside credentials.
Rotate
Click this button to rotate to connect to the next network inside
credentials.
Disconnect
Click this to stop WPS action and disconnect this active link. And
then select the last profile at the Profile Page of utility if exist. If
there is an empty profile page, the driver will select any nonsecurity AP.
Export Profile
Export all credentials to Profile.
Delete
Click to Delete an existing credential. And then select the next
credential if exist. If there is an empty credential, the driver will
select any non-security AP.
PIN
Start to add to Registrar using PIN configuration method. If STA
Registrar, remember that enter PIN Code read from your Enrollee
before starting PIN.
PBC
Start to add to AP using PBC configuration method.
WPS associate IE
Send the association request with WPS IE during WPS setup. It is
optional for STA.
WPS Probe IE
Send the probe request with WPS IE during WPS setup. It is
optional for STA.
Progress Bar
Display rate of progress from Start to Connected status.
Status Bar
Display currently WPS Status.
24
Using the Windows Utility
Radio on/off Screen
Yu can turn the radio signal on/off by clicking this button.
Figure 13: Radio on/off
The radio signal is on.
The radio signal is off.
25
USB Wireless-G Adapter User Guide
About Screen
This screen displays details of the traffic sent or received on the current Wireless network.
Figure 14: About Screen
This tab shows the following information:
•
RaConfig Version
•
Driver Version
•
EEPROM Version
•
Phy_ Address
•
Date
•
Firmware Version
26
Appendix A
Specifications
Wireless USB Dongle
Model:
UB801Rv3
Standards:
IEEE 802.11b, IEEE 802.11g
Computer Slot Type:
USB
Chipset:
Ralink RT2070(MAC/BB/RF)
Tx:
Rx:
54, 48, 36, 24, 18, 12, 9, and 6 Mbps (802.11g)
Date Rates:
11, 5.5, 2, 1 Mbps (802.11b)
Operating Channels:
11 for North America, 13 for Europe and Japan
Operating Frequency:
2.4 ~ 2.4835 GHz
Modulation Technique:
802.11g: OFDM
802.11b: CCK,QPSK,BPSK
Media Access Protocol:
CSMA/CA
Operating Voltage:
5V +/- 5%
Transmit Power:
802.11g: 13.5 +/- 1 dBm
802.11b: 17 +/- 1 dBm
Security:
WPA/WPA2; 128-bit TKIP/AES encryption, 40/64-, 128-bit
WEP shared-key encryption
802.1x, and EAP-TLS, and PEAP authentication
OS Requirements:
Windows Vista/XP/2000
27
Appendix B
About Wireless LANs
This Appendix provides some background information about using Wireless
LANs (WLANs).
Modes
Wireless LANs can work in either of two (2) modes:
•
Ad-hoc
•
Infrastructure
Ad-hoc Mode
Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Stations (e.g. notebook PCs with wireless cards) communicate directly with each other.
Infrastructure Mode
In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations
(e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations
can then access all LAN resources.
Access Points can only function in "Infrastructure" mode,
and can communicate only with Wireless Stations which are
set to "Infrastructure" mode.
BSS/ESS
BSS
A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a
Basic Service Set (BSS).
Using the same SSID is essential. Devices with different SSIDs are unable to communicate
with each other.
ESS
A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form
an Extended Service Set (ESS).
Different Access Points within an ESS can use different Channels. In fact, to reduce interference, it is recommended that adjacent Access Points SHOULD use different channels.
As Wireless Stations are physically moved through the area covered by an ESS, they will
automatically change to the Access Point which has the least interference or best performance.
This capability is called Roaming. (Access Points do not have or require Roaming capabilities.)
28
Appendix B - About Wireless LANs
Channels
The Wireless Channel sets the radio frequency used for communication.
•
Access Points use a fixed Channel. You can select the Channel used. This allows you to
choose a Channel which provides the least interference and best performance. In the USA
and Canada, 11 channels are available. If using multiple Access Points, it is better if adjacent Access Points use different Channels to reduce interference.
•
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an
Access Point. If more than one Access Point can be used, the one with the strongest signal
is used. (This can only happen within an ESS.)
•
If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the
same Channel. However, most Wireless stations will still scan all Channels to see if there
is an existing "Ad-hoc" group they can join.
WEP & WPA-PSK
Both WEP and WPA-PSK are standards for encrypting data before it is transmitted.
This is desirable because it is impossible to prevent snoopers from receiving any data which is
transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless
unless the receiver can decrypt it.
WPA-PSK is a later standard than WEP, and is more secure.
WPA2-PSK
This is a later version of WPA (WPA-PSK). The major change is the use of AES (Advanced
Encryption System) for protecting data. AES is very secure, considered to be unbreakable. The
PSK (Pre-shared Key) must be entered on each Wireless station.
If WPA2-PSK is used, the Wireless Stations and the Access Point must have the same
settings for each of the following:
WPA2 PSK
(Pre-shared Key)
Enter the same value on every station and the AP. The PSK
must be from 8 to 63 characters in length. The 256Bit key
used for the actual encryption is derived from this key.
Encryption
The same encryption method must be used. The most
common encryption method is TKIP. Another widelysupported method is AES.
29
USB Wireless-G Adapter User Guide
Wireless LAN Configuration
To allow Wireless Stations to use the Access Point, the Wireless Stations and the Access Point
must use the same settings, as follows:
Mode
On client Wireless Stations, the mode must be set to "Infrastructure".
(The Access Point is always in "Infrastructure" mode.)
SSID (ESSID)
Wireless Stations should use the same SSID (ESSID) as the Access
Point they wish to connect to. Alternatively, the SSID can be set to "any"
or null (blank) to allow connection to any Access Point.
Security
The Wireless Stations and the Access Point must use the same settings
for Wireless security (Disabled, WEP, WPA-PSK, WPA2-PSK, WPA,
WPA2)
•
If Wireless security remains disabled on the Access Point, all
stations must have wireless security disabled.
•
If Wireless security is enabled on the Access Point, each station
must use the same settings.
30
Appendix B - About Wireless LANs
Germering, October 2008
EC – Declaration of conformity
for
ALL0233 USB Wireless-G Adapter
This equipment conforms with the requirements of the Council
Directive
Applicable to R&TTE Directive 1999/5/EC (The Radio and
Telecommumications Terminal Equipment Directive)
and the mutual recognition of their conformity.
The safety advice in the documentation accompanying the products shall be obeyed.
The conformity to the above directive is indicated by the CE sign on the device.
The ALLNET ALL0233 Wireless USB Dongle conform to the European
Directives R&TTE 1999/5/EC, and EC Low Voltage Directive, 2006/95/EC.
This equipment meets the following conformance standards:
EN 301 489-1 V1.6.1 : (2005-09)
EN 301 489-17 V1.2.1 : (2002-08)
EN 300 328 V1.6.1 (2004-11)
AS/NZS CISPR 22 Class B and AS/NZS 4268 :2003
EN 300 328 V1.7.1 : (2006-10)
IEC 60950-1: 2001
EN 60950-1: 2001+A11 :2004
31
USB Wireless-G Adapter User Guide
FCC Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference to radio communica-tions. However, there is no guarantee that interference will
not occur in a particular installation. If this equipment does cause harmful interference
to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following
measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
IMPORTANT NOTE
To comply with RF exposure limits, user must not simultaneously operate wirelessproducts in adjacent USB-ports or cardbus slots.
This device has been SAR-evaluated for use with Laptop/Notebook computers and
meets the FCC RF exposure guidelines for an uncontrolled environment.
The maximum reported SAR value is 0.335W/kg (Body).
This equipment is intended to be operated in all countries.
This declaration is made by
ALLNET Computersysteme GmbH
Maistr. 2
82110 Germering
and can be downloaded from http://www.allnet.de/ce-certificates/ .
32

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
XMP Toolkit                     : 3.1-702
Producer                        : Acrobat Distiller 7.0 (Windows)
Creator Tool                    : PScript5.dll Version 5.2.2
Modify Date                     : 2009:03:06 10:06:18+01:00
Create Date                     : 2009:03:05 15:47:16+08:00
Metadata Date                   : 2009:03:06 10:06:18+01:00
Format                          : application/pdf
Title                           : Microsoft Word - UB801Rv3_User Manual
Creator                         : clioh
Document ID                     : uuid:349a9e9b-23c3-4e63-bbcc-c65dc61b7efd
Instance ID                     : uuid:f005489e-b199-42c1-8cfc-696fa34a5d66
Has XFA                         : No
Page Count                      : 36
Author                          : clioh
EXIF Metadata provided by EXIF.tools
FCC ID Filing: P27UB801RV3

Navigation menu