Advance Multimedia Internet Technology WL581UAM 802.11n USB Dongle User Manual

Advance Multimedia Internet Technology Inc. 802.11n USB Dongle

User Manual

Download: Advance Multimedia Internet Technology WL581UAM 802.11n USB Dongle User Manual
Mirror Download [FCC.gov]Advance Multimedia Internet Technology WL581UAM 802.11n USB Dongle User Manual
Document ID840745
Application IDza9p+0La4743j/uEvyGJLg==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize60.3kB (753733 bits)
Date Submitted2007-09-09 00:00:00
Date Available2007-09-09 00:00:00
Creation Date2007-08-14 16:04:55
Producing SoftwareOpenOffice.org 2.0
Document Lastmod2007-09-06 17:12:59
Document TitleUser Manual
Document CreatorWriter
Document Author: Tidy

802.11n Wireless
Adapter
802.11n
USBUSB
Dongle
Manual
FCC Information
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1.
this device may not cause harmful interference, and
2.
this device must accept any interference received; including interference that may cause undesired operation.
Federal Communications Commission (FCC) Statement.
This Equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference
to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to
try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC RF Radiation Exposure Statement:
This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's
authority to operate this equipment.
For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels
is not possible.
IMPORTANT NOTE: Federal Communication Commission (FCC) Radiation Exposure Statement This EUT is
compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been
tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C.
Hereby, AMIT, declares that this device is in compliance with the essential requirement and other relevant
provisions of the R&TTE Driective 1999/5/EC.
-1-
Introduction
The 802.11n wireless USB Dongle, USB 2.0 compatible, allows you to connect to your wireless networking. It provides
more throughput rate on data communication than traditional 802.11g wireless Dongle. With the built advanced
wireless configuration utility, it let it more easily for you to surf your wireless LAN.
Features and Benefits
System
- Standard: IEEE 802.11b/g/n.
- Host Interface: USB 2.0 standard.
- Data rate: 1, 2, 5.5, 11Mbps for 802.11b;
6, 9, 12, 18, 24, 36, 48, 54Mbps for 802.11g;
6, 6.5, 13, 19.5, 26, 39, 52, 58.5, 65, 78, 104, 117, 130Mbps for 802.11n.
- Operating range: Indoor, 30-100m; outdoor, 100-400m (depends on surrounding environment).
RF
- Frequency band: 2.400 ~ 2.4835 GHz (subject to local regulation).
- Modulation: OFDM(Orthogonal Frequency Division Multiplexing) for 802.11g/n; DSSS(Direct Sequence
Spread Spectrum) for 802.11b.
- RF radiated output power: 17.89dBm for 802.11g/n; 17.61dBm for 802.11b. (±1dBm).
Software
- Driver: Microsoft Windows 2000, XP, XP64, and Vista.
- Operation mode: Infrastructure mode (Seamless roaming supported), Ad-Hoc mode (peer to peer connection).
- Security: 64/128 bit WEP encryption, WPA, WPA-PSK, WPA2, WPA2-PSK, and 802.1x.
LEDs and Physical connections
- Link: Always on, Green, after linked up to remote wireless.
- Activity: Blinking, Green, for data communication.
- Antenna: Embedded.
Package Contents
- USB wireless Dongle.
- Manual
- Quick installation guide
- CD: includes Dongle drivers, manual, and quick installation guide.
** If any of the above items are missing, please contact your reseller.
-2-
System Requirements
Before installing the Dongle and related software, make sure your system meets the minimum requirements described
below.
IBM compatible desktop or notebook PC with available USB slot.
- CPU level: no restricted.
- Memory size: no restricted.
- CDROM drive: no restricted.
- USB Host: USB 2.0 suggested. USB 1.0/1.1 leads low data communication rate.
- Operation system: Microsoft Windows 2000, XP, XP64, or Vista.
-3-
Installation
- Insert the Product CD into the CD-ROM drive.
- Execute “Setup.exe” in the root directory of the CD, it will guide you to install the Driver and Utility.
- Insert the wireless Dongle into the USB slot.
-4-
Management
Load up utility
After the installation, one utility will be run and minimized on Windows system tray bar.
:Indicate wireless adapter detected, and connected to one site.
:Indicated wireless adapter not detected, or not connected to one site.
You may double click it to bring up the main menu. You may also use mouse right button to launch or to close it. For
Windows XP, the utility provides one option to manage the wireless adapter with Windows Zero Configuration.
Site Survey Page
Under the site survey page, system will display the information of surrounding APs from last scan result. List
information include SSID, BSSID, Signal, Channel, Encryption algorithm, and Network type.
-5-
Definition of each field
- SSID: Name of BSS of IBSS network.
- BSSID: MAC address of AP or randomly generated of IBSS.
- Signal: Receive signal strength of specified network.
- Channel: Channel in use.
- Encryption: Encryption algorithm used within than BSS or IBSS. Valid value includes WEP, TKIP, AES, and
Not Use.
- Authentication: Authentication mode used within the network, including Unknown, WPA-PSK, WPA2-PSK,
WPA and WPA2.
- Network Type: Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.
Connected network
When utility first ran, it will select the best AP to connect automatically. It is available to connect to other site by double
click the intended item. If the intended network has encryption other than '' Not Use '' or “Unknown”, the security page
will pop up for you to setup the appropriate information to make the connection.
: This icon indicates the change is successful.
- Connection box: Indicate connection status, the connected network SSID will show up here.
- Rescan: Issue an rescan command to wireless NIC to update information on surrounding wireless network.
- Connect: Command to connect to the selected network.
- Add to Profile: Add the selected AP to profile setting. It will bring up profile page and save the setting to a new
profile.
Add/Edit Profile
System Configuration
-6-
- Profile Name: User chose name for this profile.
- SSID: User can key in the intended SSID name or use pull down menu to select from available APs.
- Power Save Mode: Choose from CAM (Constantly Awake Mode) or Power Saving Mode. There is a check box
for CAM when AC power. When this is checked, the wireless NIC will stay full power when AC power cord is
plug into power outlet.
- Network Type: There are two types, infrastructure and 802.11 ad-hoc modes. Under ad-hoc mode, user can also
choose the preamble type; the available preamble type includes short and long. In addition to that, the channel
and Ad hoc wireless mode field will be available for setup in ad-hoc mode.
- TX Power: Transmit power, the amount of power used by a radio transceiver to send the signal out. User can
choose power value by sliding the bar.
- Preamble: There are three types, Auto, Long and Short are supported.
- Ad hoc wireless mode: 802.11b only, 802.11b/g mixed and 802.11g only modes are supported.
- RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly. The
default value is 2347.
- Fragment Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly.
The default value is 2346.
- Channel: Only available for setting under ad-hoc mode. User can choose the channel frequency to start their adhoc network.
Profile function is based on the needs to set up the most linkable AP in order to record the system configuration and to
-7-
set up the authentication security. The function of each session is shown below
Authentication & Security
When the Encryption feature is enabled, the other setups are same as the WEP setting.
- Authentication Type: There are three type of authentication modes supported. They are open, Shared, WPA-PSK
and WPA system.
- 802.1x Setting: It will display to set when user use radius server to authenticate client certificate for WPA
authentication mode.
- Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP.
For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and
AES.
- WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK
authentication mode, this field must be filled with character longer than 8 and less than 32 length.
- WEP Key: Only valid when using WEP encryption algorithm. The key must matched AP key. There are several
formats to enter the keys.
-- Hexadecimal、40bits:10 Hex characters.
-- Hexadecimal、128bits:32Hex characters.
-- ASCII、40bits:5 ASCII characters.
-- ASCII、128bits:13 ASCII characters.
-8-
802.1x Setting
802.1x is a authentication for 『WPA』and 『WPA2』certificate to server.
- Authentication type:
i.
PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by
using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless
LAN clients using only server-side certificates, thus simplifying the implementation and
administration of a secure wireless LAN.
ii.
TLS/Smart Card: Transport Layer Security. Provides for certificate-based and mutual authentication
of the client and the network. It relies on client-side and server-side certificates to perform
authentication and can be used to dynamically generate user-based and session-based WEP keys to
secure subsequent communications between the WLAN client and the access point.
iii.
TTLS: Tunneled Transport Layer Security. This security method provides for certificate-based,
mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS,
EAP-TTLS requires only server-side certificates.
iv.
LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in
Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and
supports mutual authentication.
v.
MD5-Challenge: Message Digest Challenge. Challenge is an EAP authentication type that provides
base-level EAP support. It provides for only one-way authentication - there is no mutual
authentication of wireless client and the network.
-9-
- Session Resumption: user can choose “ Disable ”, “ Reauthentication ”, “ Roaming ”, “ SameSsid ” and “
Always ”.
- Identity and Password: Identity and password for server.
- Use Client Certicate: Client Certicate for server authentication.
- Tunnel Authentication
Protocol: Tunnel protocol, List information include “ EAP-MSCHAP ”, “ EAP-MSCHAP v2 ”, “ CAHAP ”
and “ MD5 ”
Tunnel Identity: Identity for tunnel.
Tunnel Password: Password for tunnel.
- CA Server: Certificate Authority Server. Each certificate is signed or issued by it.
CA Server
Depending on the EAP in use, only the server or both the server and client may be authenticated and require a
certificate. Server certificates identify a server, usually an authentication or RADIUS server to clients. Most EAPs
require a certificate issued by a root authority or a trusted commercial CA. Show as the figure.
1.
Certificate issuer: Choose use server that issuer of certificates.
2.
Allow intimidate certificates: It must be in the server certificate chain between the server certificate and the server
specified in the certificate issuer must be field.
3.
Server name: Enter an authentication sever root.
- 10 -
Profile Page
Profile can book keeping your favorite wireless setting among your home, office, and other public hot spot. You may
save multiple profiles, and activate the correct one at your preference.
Definition of each field
- Profile: Name of profile, preset to PROF* (* indicate 1, 2, 3,).
- SSID: AP or Ad-hoc name.
- Channel: Channel in use for Ad-Hoc mode.
- Authentication: Authentication mode.
- Encryption: Security algorithm in use.
- Network Type: including infrastructure and Ad-Hoc.
Connection status
Indicate connection is successful on currently activated profile.
Indicate connection is failed on currently activated profile.
Note: When use site survey to make the connection. None of the profile will have the connection status icon.
- Add: Add a new profile.
- Delete: Delete an existing profile.
- Edit: Edit profile content.
- Activate: Activate selected profile.
- 11 -
Link Status Page
The page displays the detailed information of the current connection.
- Status: Current connection status. If no connection, if will show Disconnected. Otherwise, the SSID and BSSID
will show here.
- Extra Info: Display link status and current channel in use.
- Link Speed: Show current transmit rate and receive rate.
- Throughout: Display transmits and receive throughput in unit of K bits/sec.
- Link Quality: Display connection quality based on signal strength and Tx/Rx packet error rate.
- Signal Strength: Receive signal strength, user can choose to display as percentage or dBm format.
- Noise Level: Display noise signal strength.
- 12 -
Statistics Page
Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates that MIB
counters into a format easier for user to understand.
Transmit Statistics
- Frames Transmitted Successfully: Frames successfully sent.
- Frames Transmitted Successfully Without Retry: Frames successfully sent without any retry.
- Frames Transmitted Successfully After Retry: Frames successfully sent with one or more reties.
- Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting retry limit.
- RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RTS frame.
- RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS.
Receive Statistics
- Frames Received Successfully: Frames received successfully.
- Frames Received With CRC Error: Frames received with CRC error.
- Frames Dropped Due To Out-of-Resource: Frames dropped due to resource issue.
- Duplicate Frames Received: Duplicate received frames.
- Reset Counter: Reset all counters to zero.
- 13 -
Advance Page
1.
- Wireless mode: Select wireless mode. 802.11b only, 802.11 b/g mixed and 802.11b/g/n mixed modes are supported.
- 11b/g Protection: ERP protection mode of 802.11g definition.
Auto: STA will dynamically change as AP announcement.
On: Always send frame with protection.
Off: Always send frame without protection.
- Tx Rate: Manually force the Transmit using selected rate. Default is auto.
- Tx Burst: Proprietary frame burst mode of this utility.
- Enable TCP Window Size:.
- Fast Roaming at: fast to roaming, setup by transmit power.
- 11b/g/n Country Region Code: country to choose. Country channel list: Country channel list
- CCX2.0: support Cisco Compatible Extensions function:
LEAP turn on CCKM
Enable Radio Measurement: can channel measurement every 0~2000 milliseconds.
- Radio On: To turn on radio.
- Radio Off: To turn off radio.
- Apply: Apply the above changes.
- 14 -
About Page
About page display the utility and driver version information of the wireless adapter.
- 15 -

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract, Print high-res
XMP Toolkit                     : 3.1-701
Create Date                     : 2007:08:14 16:04:55+08:00
Creator Tool                    : Writer
Modify Date                     : 2007:09:06 17:12:59+08:00
Metadata Date                   : 2007:09:06 17:12:59+08:00
Format                          : application/pdf
Creator                         : Tidy
Producer                        : OpenOffice.org 2.0
Document ID                     : uuid:1452ecdc-7efa-4fd3-a30e-fc47ede79d1a
Instance ID                     : uuid:aaa7e8ee-4979-44ff-8172-7e9a08d8c7da
Has XFA                         : No
Page Count                      : 17
Author                          : Tidy
EXIF Metadata provided by EXIF.tools
FCC ID Filing: PBLWL581UAM

Navigation menu