Advance Multimedia Internet Technology WL581UAM 802.11n USB Dongle User Manual

Advance Multimedia Internet Technology Inc. 802.11n USB Dongle

User Manual

802.11n Wireless USB AdapterManual802.11n USB Dongle
FCC InformationThis device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. this device may not cause harmful interference, and 2. this device must accept any interference received; including interference that may cause  undesired operation. Federal Communications Commission (FCC) Statement. This Equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance   with   the   instructions,   may  cause   harmful   interference  to   radio communications.   However,  there   is   no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: - Reorient or relocate the receiving antenna.- Increase the separation between the equipment and receiver.- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.- Consult the dealer or an experienced radio/TV technician for help. FCC RF Radiation Exposure Statement:         This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible.  - 1 -Hereby, AMIT, declares that this device is in compliance with the essential requirement and other relevantIMPORTANT NOTE: Federal Communication Commission (FCC) Radiation Exposure Statement This EUT iscompliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had beentested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C.provisions of the R&TTE Driective 1999/5/EC.
IntroductionThe 802.11n wireless USB Dongle, USB 2.0 compatible, allows you to connect to your wireless networking. It provides more   throughput   rate   on   data   communication   than   traditional   802.11g  wireless  Dongle.  With   the   built   advanced wireless configuration utility, it let it more easily for you to surf your  wireless LAN.Features and BenefitsSystem- Standard: IEEE 802.11b/g/n.- Host Interface: USB 2.0 standard.- Data rate: 1, 2, 5.5, 11Mbps for 802.11b;6, 9, 12, 18, 24, 36, 48, 54Mbps for 802.11g;6, 6.5, 13, 19.5, 26, 39, 52, 58.5, 65, 78, 104, 117, 130Mbps for 802.11n.- Operating range: Indoor, 30-100m; outdoor, 100-400m (depends on surrounding environment).RF- Frequency band: 2.400 ~ 2.4835 GHz (subject to local regulation).- Modulation: OFDM(Orthogonal Frequency Division Multiplexing) for 802.11g/n; DSSS(Direct Sequence   Spread Spectrum) for 802.11b.- RF radiated output power: 17.89dBm for 802.11g/n; 17.61dBm for 802.11b. (±1dBm).Software- Driver: Microsoft Windows 2000, XP, XP64, and Vista.- Operation mode: Infrastructure mode (Seamless roaming supported), Ad-Hoc mode (peer to peer connection).- Security: 64/128 bit WEP encryption, WPA, WPA-PSK, WPA2, WPA2-PSK, and 802.1x.LEDs and Physical connections- Link: Always on, Green, after linked up to remote wireless.- Activity: Blinking, Green, for data communication.- Antenna: Embedded.Package Contents- USB wireless Dongle.- Manual- Quick installation guide- CD: includes Dongle drivers, manual, and quick installation guide.** If any of the above items are missing, please contact your reseller.- 2 -
System RequirementsBefore installing the Dongle and related software, make sure your system meets the minimum requirements described below.IBM compatible desktop or notebook PC with available USB slot.- CPU level: no restricted.- Memory size: no restricted.- CDROM drive: no restricted.- USB Host: USB 2.0 suggested. USB 1.0/1.1 leads low data communication rate.- Operation system: Microsoft Windows 2000, XP, XP64, or Vista.- 3 -
Installation- Insert the Product CD into the CD-ROM drive. - Execute “Setup.exe” in the root directory of the CD, it will guide you to install the Driver and Utility. - Insert the wireless Dongle into the USB slot.- 4 -
ManagementLoad up utilityAfter the installation, one utility will be run and minimized on Windows system tray bar.:Indicate wireless adapter detected, and connected to one site.:Indicated wireless adapter not detected, or not connected to one site. You may double click it to bring up the main menu. You may also use mouse right button to launch or to close it. For Windows XP, the utility provides one option to manage the wireless adapter with Windows Zero Configuration.Site Survey PageUnder the site survey page, system will display the information of surrounding APs from last scan result. List information include SSID, BSSID, Signal, Channel, Encryption algorithm, and Network type.- 5 -
Definition of each field- SSID: Name of BSS of IBSS network.- BSSID: MAC address of AP or randomly generated of IBSS.- Signal: Receive signal strength of specified network.- Channel: Channel in use.- Encryption: Encryption algorithm used within than BSS or IBSS. Valid value includes WEP, TKIP, AES, and             Not Use.- Authentication: Authentication mode used within the network, including Unknown, WPA-PSK, WPA2-PSK,             WPA and WPA2.- Network Type: Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.Connected networkWhen utility first ran, it will select the best AP to connect automatically. It is available to connect to other site by double click the intended item. If the intended network has encryption other than '' Not Use '' or “Unknown”, the security page will pop up for you to setup the appropriate information to make the connection.: This icon indicates the change is successful.- Connection box: Indicate connection status, the connected network SSID will show up here.- Rescan: Issue an rescan command to wireless NIC to update information on surrounding wireless network.- Connect: Command to connect to the selected network.- Add to Profile: Add the selected AP to profile setting. It will bring up profile page and save the setting to a new             profile. Add/Edit ProfileSystem Configuration- 6 -
- Profile Name: User chose name for this profile.- SSID: User can key in the intended SSID name or use pull down menu to select from available APs. - Power Save Mode: Choose from CAM (Constantly Awake Mode) or Power Saving Mode. There is a check box             for CAM when AC power. When this is checked, the wireless NIC will stay full power when AC power cord is             plug into power outlet.- Network Type:  There are two types, infrastructure and 802.11 ad-hoc modes. Under ad-hoc mode, user can also            choose the preamble type; the available preamble type includes short and long. In addition to that, the channel            and Ad hoc wireless mode field will be available for setup in ad-hoc mode.- TX Power: Transmit power, the amount of power used by a radio transceiver to send the signal out. User can             choose power value by sliding the bar.- Preamble: There are three types, Auto, Long and Short are supported.- Ad hoc wireless mode:  802.11b only, 802.11b/g mixed and 802.11g only modes are supported.- RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly. The             default value is 2347.- Fragment Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly.             The default value is 2346. - Channel: Only available for setting under ad-hoc mode. User can choose the channel frequency to start their ad-            hoc network. Profile function is based on the needs to set up the most linkable AP in order to record the system configuration and to - 7 -
set up the authentication security. The function of each session is shown belowAuthentication & SecurityWhen the Encryption feature is enabled, the other setups are same as the WEP setting.- Authentication Type: There are three type of authentication modes supported. They are open, Shared, WPA-PSK             and WPA system.- 802.1x Setting: It will display to set when user use radius server to authenticate client certificate for WPA             authentication mode.- Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP.             For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and             AES.- WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK             authentication mode, this field must be filled with character longer than 8 and less than 32 length. - WEP Key: Only valid when using WEP encryption algorithm. The key must matched AP key. There are several             formats to enter the keys.-- Hexadecimal、40bits:10 Hex characters.-- Hexadecimal、128bits:32Hex characters.-- ASCII、40bits:5 ASCII characters.-- ASCII、128bits:13 ASCII characters.- 8 -
 802.1x Setting802.1x is a authentication for 『WPA』and 『WPA2』certificate to server.- Authentication type:i. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.ii. TLS/Smart Card: Transport Layer Security. Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.iii. TTLS: Tunneled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.iv. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication.v. MD5-Challenge: Message Digest Challenge. Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network.- 9 -
- Session Resumption: user can choose “ Disable ”, “ Reauthentication ”, “ Roaming ”, “ SameSsid ” and “             Always ”.- Identity and Password: Identity and password for server.- Use Client Certicate:  Client Certicate for server authentication.- Tunnel AuthenticationProtocol: Tunnel protocol, List information include “ EAP-MSCHAP ”, “ EAP-MSCHAP v2 ”, “ CAHAP ”                                    and “ MD5 ”Tunnel Identity: Identity for tunnel.Tunnel Password: Password for tunnel.- CA Server: Certificate Authority Server. Each certificate is signed or issued by it.CA ServerDepending  on  the  EAP  in  use,   only the  server  or  both  the  server  and client   may be   authenticated   and  require  a certificate. Server certificates identify a server, usually an authentication or RADIUS server to clients. Most EAPs require a certificate issued by a root authority or a trusted commercial CA. Show as the figure.1. Certificate issuer: Choose use server that issuer of certificates. 2. Allow intimidate certificates: It must be in the server certificate chain between the server certificate and the server specified in the certificate issuer must be field.3. Server name: Enter an authentication sever root.- 10 -
Profile PageProfile can book keeping your favorite wireless setting among your home, office, and other public hot spot. You may save multiple profiles, and activate the correct one at your preference. Definition of each field- Profile: Name of profile, preset to PROF* (* indicate 1, 2, 3,).- SSID: AP or Ad-hoc name. - Channel: Channel in use for Ad-Hoc mode.- Authentication: Authentication mode.- Encryption: Security algorithm in use.- Network Type: including infrastructure and Ad-Hoc.Connection statusIndicate connection is successful on currently activated profile.Indicate connection is failed on currently activated profile.Note: When use site survey to make the connection. None of the profile will have the connection status icon. - Add: Add a new profile.- Delete: Delete an existing profile.- Edit: Edit profile content.- Activate: Activate selected profile.- 11 -
 Link Status PageThe page displays the detailed information of the current connection.- Status: Current connection status. If no connection, if will show Disconnected. Otherwise, the SSID and BSSID             will show here.- Extra Info: Display link status and current channel in use.- Link Speed: Show current transmit rate and receive rate.- Throughout: Display transmits and receive throughput in unit of K bits/sec.- Link Quality: Display connection quality based on signal strength and Tx/Rx packet error rate.- Signal Strength: Receive signal strength, user can choose to display as percentage or dBm format.- Noise Level: Display noise signal strength.- 12 -
Statistics PageStatistics page displays the detail counter information based on 802.11 MIB counters. This page translates that MIB counters into a format easier for user to understand.Transmit Statistics- Frames Transmitted Successfully: Frames successfully sent.- Frames Transmitted Successfully Without Retry: Frames successfully sent without any retry. - Frames Transmitted Successfully After Retry: Frames successfully sent with one or more reties. - Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting retry limit.- RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RTS frame. - RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS. Receive Statistics- Frames Received Successfully: Frames received successfully.- Frames Received With CRC Error: Frames received with CRC error. - Frames Dropped Due To Out-of-Resource: Frames dropped due to resource issue.- Duplicate Frames Received: Duplicate received frames.- Reset Counter: Reset all counters to zero.- 13 -
Advance Page1. - Wireless mode: Select wireless mode. 802.11b only, 802.11 b/g mixed and 802.11b/g/n mixed modes are supported. - 11b/g Protection: ERP protection mode of 802.11g definition.Auto: STA will dynamically change as AP announcement. On: Always send frame with protection. Off: Always send frame without protection.- Tx Rate: Manually force the Transmit using selected rate. Default is auto.- Tx Burst: Proprietary frame burst mode of this utility.- Enable TCP Window Size:.- Fast Roaming at: fast to roaming, setup by transmit power.- 11b/g/n Country Region Code: country to choose. Country channel list: Country channel list- CCX2.0: support Cisco Compatible Extensions function:LEAP turn on CCKMEnable Radio Measurement: can channel measurement every 0~2000 milliseconds.- Radio On: To turn on radio.- Radio Off: To turn off radio.- Apply: Apply the above changes.- 14 -
About PageAbout page display the utility and driver version information of the wireless adapter.- 15 -

Navigation menu