Abocom Systems WCP5102 802.11 b/g Wireless LAN PCI Card User Manual

Abocom Systems Inc 802.11 b/g Wireless LAN PCI Card

User Manual

Download: Abocom Systems WCP5102 802.11 b/g Wireless LAN PCI Card User Manual
Mirror Download [FCC.gov]Abocom Systems WCP5102 802.11 b/g Wireless LAN PCI Card User Manual
Document ID642718
Application IDBZYODp+fjh0lMgFj9UtfMw==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize41.82kB (522704 bits)
Date Submitted2006-03-31 00:00:00
Date Available2006-03-31 00:00:00
Creation Date2006-03-30 14:16:01
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2006-03-30 14:16:01
Document TitleUser Manual

802.11g
Wireless LAN PCI Card
User’s Manual
REGULATORY STATEMENTS
FCC Certification
The United States Federal Communication Commission (FCC) and the
Canadian Department of Communications have established certain rules
governing the use of electronic equipment.
Part15, Class B
Warning: Changes or modifications to this unit not expressly approved by
the party responsible for compliance could void the user authority to operate
the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions:
(1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference
that may cause undesired operation.
The users manual or instruction manual for an intentional or unintentional
radiator shall caution the user that changes or modifications not expressly
approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and
can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by
turning off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
•
Reorient or relocate the receiving antenna.
•
Increase the distance between the equipment and receiver.
•
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
CAUTION:
1) To comply with FCC RF exposure compliance requirements, a separation
distance of at least 20 cm must be maintained between the antenna of this
device and all persons.
2)
This transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
Table of Contents
INTRODUCTION ...................................................................................................1
WIRELESS NETWORK OPTIONS ...............................................................................1
The Peer-to-Peer Network .........................................................................1
The Access Point Network ........................................................................2
INSTALLATION ....................................................................................................3
INSTALL THE DEVICE ..............................................................................................3
INSTALL THE DRIVER & UTILITY ............................................................................3
Verify Device Installation..........................................................................5
CONFIGURATION ................................................................................................6
ACCESSING THE CONFIGURATION UTILITY ..............................................................6
PROFILE TAB ..........................................................................................................7
LINK STATUS........................................................................................................12
SITE SURVEY ........................................................................................................12
STATISTICS ...........................................................................................................14
ADVANCED ..........................................................................................................14
ABOUT .................................................................................................................15
UNINSTALLATION.............................................................................................17
INTRODUCTION
The 802.11g Wireless LAN PCI Card is a device that allows you connect your
computer to a wireless local area network (LAN). A wireless LAN allows your
system to use wireless Radio Frequency (RF) technology to transmit and receive
data without physically attaching to the network. The Wireless protocols that
come with this product ensure data security and isolation from interference
generated by other radio frequencies.
This card also allows you to take full advantage of your computer’s mobility with
access to real-time information and online services anytime and anywhere. In
addition, this device eliminates the bother of pulling cable through walls and
under furniture. It even allows you to place your system in locations where
cabling is impossible. Modifying and augmenting networks has never been so
easy.
Wireless Network Options
The Peer-to-Peer Network
This network installation lets you set a small wireless workgroup easily and
quickly. Equipped with wireless PC Cards or wireless PCI, you can share files
and printers between each PC and laptop.
-1-
You can also use one computer as an Internet Server to connect to a wired global
network and share files and information with other computers via a wireless LAN.
The Access Point Network
The network installation allows you to share files, printers, and Internet access
much more conveniently. With Wireless LAN Cards, you can connect wireless
LAN to a wired global network via an Access Point.
-2-
INSTALLATION
Install the device
1.
Make sure the computer is turned off. Remove the expansion
slot cover from the computer.
2. Carefully slide the Wireless PCI Card into the PCI slot. Push
evenly and slowly and ensure it is properly seated, you may
have to use the mounting screw to have the card screwed
securely in place.
3. After the device has been connected to your computer, turn on
your computer. Windows will detect the new hardware and then
automatically copy all of the files needed for networking.
Note for Windows 98 users:
Before installation of the device, make sure you have your operating
system CD-ROM at hand. You may be asked to insert the OS CD-ROM
in order to download specific drivers.
Install the Driver & Utility
1.
Exit all Windows programs. Insert the CD-ROM into the CD-ROM
drive of your computer.
If the CD-ROM is not launched automatically, go to your CD-ROM drive
(e.g. drive D) and double-click on Setup.exe.
2.
The main screen of the CD-ROM opens. Click Install Driver & Utility to
start the installation.
-3-
3. When the License Agreement screen appears, view the contents and
then click Yes to continue.
4.
Click Finish to complete the software installation.
-4-
Verify Device Installation
To verify that the device has been properly installed in your computer and is
enabled, go to Start
Settings
Control Panel
System ( Hardware)
Device Manager. Expand the Network adapters item. If the Wireless LAN
Card-PCI-MIMO is listed, it means that your device is properly installed and
enabled.
-5-
CONFIGURATION
After successful installation of the Wireless LAN Card’s driver, the utility icon
will display in the task bar. You will be able to access the Configuration Utility
through the Network Status icon.
If the icon doesn’t appear automatically, go to Start
Programs
Utility Wireless Utility, it will appear in the task bar.
Accessing the Configuration Utility
All settings are categorized into Six Tabs:
Profile Tab
Link Status Tab
Site Survey Tab
-6-
Wireless
Statistics Tab
Advanced Tab
About Tab
Profile Tab
Profiles can bookkeeping your favourite wireless settings among your home,
office, and other public hotspots. You may save multiple profiles, and activate the
correct one by your preference.
Profile
Profile Name
Show the profile names that are saved in your profile page.
The default profile name is PROF1, PROF2
SSID
The SSID for the current profile
Channel
The channel that is currently used.
Authentication
Shows the network authentication in use.
Encryption
Shows the encryption type of the profile.
Network Type
Shows the Network type of the profile.
-7-
Add
Click the Add button to add up a new profile into the list
and configure your profile settings.
Configuration Tab-
Profile Name: The default profile name is PROF1, you
can modify it at will.
SSID: The SSID is the unique name shared among all
points in your wireless network.
The name must be identical for all devices and points
attempting to connect to the same network.
PSM:
•
CAM (Constantly Awake Mode) - When this mode
is selected, the power supply will be normally
provided even when there is no throughput.
•
PSM (Power Saving Mode) - When this mode is
selected, this device will stay in power saving mode
even when there is high volume of throughput.
Network Type:
•
The infrastructure is intended for the connection
between wireless network cards and an Access Point.
With the wireless adapter, you can connect wireless
LAN to a wired global network via an Access Point
•
The Ad-hoc lets you set a small wireless workgroup
easily and quickly. Equipped with the wireless
adapter, you can share files and printers between each
PC and laptop.
Tx Power: Select the Tx Power percentage from the
pull-down menu, including 100%, 75% and 50%
Preamble: A preamble is a signal used in wireless
-8-
environment to synchronize the transmitting timing
including Synchronization and Start frame delimiter. Select
from the pull-down menu to change the Preamble type into
Long or Short.
RTS Threshold: The minimum packet length for sending
an RTS frame, in bytes. The value must be greater than 0
(default is 2347)
Fragment Threshold: The maximum fragment length, in
bytes. The value is an even number from 256 to 2346
(default is 2346).
OK: Click to save and exit the current page.
Cancel: Click to exit the current page.
Apply: Click to apply and save the current settings.
Authentication and Security Tab-
Authentication Type: Select an Authentication Type from
the pull-down menu, including Open, Shared, LEAP,
WPA, WPA-PSK, WPA2 and WPA2-PSK.
• Shared- Shared Key is when both the sender and the
recipient share a secret key.
• Open- If your access point/wireless router is using
"Open " authentication, then the wireless adapter will
need to be set to the same authentication type.
• LEAP- (only with CCX mode enabled)
• WPA-PSK- WPA-PSK offers two encryption methods,
TKIP and AES. Select the type of algorithm, TKIP or
AES and then enter a WPA Shared Key of 8-63
characters in the WPA Preshared Key field.
• WPA/WPA2-9-
Use 802.1x: Click to enable 802.1x function, to configure
the RADIUS Server setting, click the 802.1x Setting
button to enter the configuration screen.
Certificate Tab-
Authentication type:
• PEAP: Protect Extensible Authentication Protocol.
PEAP transport securely authentication data by using
tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients
using only server-side certificates, thus simplifying the
implementation and administration of a secure wireless
LAN.
• TLS Smart Card: Transport Layer Security. Provides
for certificate-based and mutual authentication of the
client and the network. It relies on client-side and
server-side certificates to perform authentication and can
be used to dynamically generate user-based and
session-based WEP keys to secure subsequent
communications between the WLAN client and the
access point.
• TTLS: Tunneled Transport Layer Security. This
security method provides for certificate-based, mutual
authentication of the client and network through an
encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
Session Resumption: you can choose Disable,
Reauthentication, Roaming, SameSsid or Always.
- 10 -
Identity: Enter the given identity in this column.
Password: Enter the given password in this column.
Use Client Certificate: Check to enable this authentication
function.
Protocol: Select a protocol from the pull-down menu,
including EAP-MSCHAP v2, EAP-MSCHAP v2,
EAP-TLS/Smart card Generic Token Card.
(Tunnel)Identity: Enter the identity for tunnel.
( Tunnel)Password: Enter the password for tunnel.
CA Server TabIt is the Certificate Authority Server, each certificate is
signed or issued by it.
Use certificate chain: Check to enable the certificate
function.
Certificate issuer: Check to enable the certificate issuer
function.
Allow intimidate certificates: It must be in the server
certificate chain between the server certificate and the
server specified in the certificate issuer must be field.
Server name: Enter an authentication sever root.
Delete
Select a profile and click Delete to delete it.
Edit
Click to edit your existing profiles.
Activate
Click to activate your existing profiles.
OK
Click to exit this page.
- 11 -
Link Status
The Link Status page displays the current connection status.
Link Status
Status
Shows the current connection status.
Extra Info
Shows the extra information of the current status.
Channel
Shows the channel in use.
Link Speed
Shows the current link speed.
Throughput
Shows the current throughput.
Link Quality
Shows the current link quality.
Signal Strength2
Shows the current signal strength percentage.
Noise level
Shows the current noise level.
OK
Click to exit this page.
Site Survey
The Site Survey screen displays a list of infrastructure and ad-hoc networks
available for connection.
- 12 -
Site Survey
SSID
The SSID is the unique name shared among all points in
your wireless network.
The name must be identical for all devices and points
attempting to connect to the same network.
BSSID
BSSID displays the ID of current BSS, which uniquely
identifies each BSS. The displayed value is the MAC
address of the Access Point or station.
Signal
Shows the current signal strength percentage.
Channel
Shows the channel in use.
Encryption
Shows the encryption type.
Authentication
Shows the current authentication type.
Network Type
Shows the current network type.
Rescan
Click to refresh the current site survey list.
Connect
Select an item and Click to make a connection.
Add to Profile
Select an item and click to add it up into your profile list.
OK
Click to exit the current page.
- 13 -
Statistics
The Statistics screen displays the statistics on your current network settings.
Advanced
The Advanced tab lets you configure the advanced wireless settings including
wireless security settings.
- 14 -
Advanced
Wireless mode
Select wireless mode. 802.11B only, 802.11 B/G
mixed 802.11A only, 802.11 A/B/G mixed and
802.11G only modes are supported.
Select your Country Region
Code
Select a country region from the pull-down list.
B/G Protection
ERP protection mode of 802.11G definition. You
can choose one from the pull-down list, including
Auto, On and Off.
Tx Rate
Manually force the Transmit using selected rate.
Dafault is auto.
Tx BURST
Check to enable the Tx BURST mode.
Enable TCP Window Size
Check to enable TCP Window Size function.
Fast Roaming at
Check to set the
CCX2.0
Check to enable the CCX2.0 function.
Turn off RF
Click to disable the RF function.
Apply
Click to apply the current settings.
OK
Click to save and exit the current page.
About
Click on the About tab to view basic version information about the Configure
Version, Driver Version, EEPROM Version, Firmware Version.
- 15 -
- 16 -
UNINSTALLATION
In case you need to uninstall the Utility and driver, please refer to below steps.
(As you uninstall the utility, the driver will be uninstalled as well.)
1. Go to Start
Uninstall-Utility
(All)
Programs
Wireless
2. Click OK to continue.
3. Click Finish to complete the uninstalled procedure.
- 17 -
Utility

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Create Date                     : 2006:03:30 14:16:01+08:00
Modify Date                     : 2006:03:30 14:16:01+08:00
Page Count                      : 21
Creation Date                   : 2006:03:30 06:16:01Z
Mod Date                        : 2006:03:30 06:16:01Z
Producer                        : Acrobat Distiller 5.0 (Windows)
Metadata Date                   : 2006:03:30 06:16:01Z
EXIF Metadata provided by EXIF.tools
FCC ID Filing: MQ4WCP5102

Navigation menu