Billionton Systems USBWLZ USB Wireless LAN Dangle User Manual USBWLZ Manual

Billionton Systems, Inc. USB Wireless LAN Dangle USBWLZ Manual

Users Manual

USB WIRELESS LAN ADAPTER
User’s Manual
1.0
Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following
measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
FCC Caution
This equipment must be installed and operated in accordance with provided instructions
and a minimum 5 cm spacing must be provided between computer mounted antenna and
person’s body (excluding extremities of hands, wrist and feet) during wireless modes of
operation.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) this device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired
operation.
Any changes or modifications not expressly approved by the party responsible for
compliance could void the authority to operate equipment.
Federal Communication Commission (FCC) Radiation
Exposure Statement
1. The equipment complies with FCC RF radiation exposure limits set forth for an
uncontrolled environment, under 47 CFR 2.1093 paragraph (d)(2).
2. This Transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
The 11b WLAN USB Dangle has been tested to the FCC exposure requirements
(Specific Absorption Rate).
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE
EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment
and telecommunication terminal Equipment and the mutual recognition of their conformity
(R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC
(Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of
April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and
use it. However, special attention must be paid to the dangers of electric shock and static
electricity when working with electrical equipment. All guidelines of this and of the
computer manufacture must therefore be allowed at all times to ensure the safe use of the
equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria, Belgium,
Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, the Netherlands,
Portugal, Spain, Sweden, and the United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states: Iceland,
Liechtenstein, Norway, and Switzerland.
EU Countries Not intended for use
None.
Index
Introduction 1
CHAPTER1
Specifications 2
CHAPTER2
Install driver and utility for Windows
98/ME/2000 4
CHAPTER3
Install for Windows XP 9
CHAPTER4
Configuration Utility 11
CHAPTER5
Troubleshooting 19
1
Introduction
Thank you for purchasing this USB Wireless LAN Adapter. This product is a Wireless
LAN USB Adapter. It can work with your notebook or desktop PC as a wireless
Ethernet Network Adapter. You can surf on a Local Area Network wirelessly through an
Access Point with this USB Wireless LAN Adapter.
Package contents
One USB Wireless Adapter
One CD (Driver/Utility/User’s Manual.)
Quick Start Guide
NOTE:
If any of these items are missing from the retail package, contact your supplier
immediately.
i
2
Specifications
Features
- Compatible with IEEE 802.11b Standard
- 2.4GHz spread spectrum technology
- Data rate up to 11Mbps
- External antenna
- Supports antenna diversity
- Supports 64/128-bit WEP Data Encryption function for high levels of security
- Supports TKIP and AES advanced WLAN Security
- Supports peer-to-peer communication among any wireless users, no Access Point
required.
- Plug and Play installation
Specification
1. Interface:
- USB 1.0/1.1
2. Functions:
- Main chip: Zydas ZD1201, SA2400
- Protocol: Compatible with IEEE 802.11b Standard
- Modulation Technique: DSSS (Direct Sequence Spread Spectrum) with BPSK
(1Mbps), QPSK (2Mbps), and CCK (5.5 and 11Mbps)
- Media access protocol: CSMA/CA with ACK
- Transfer data rate: 11Mbps, 5.5Mbps, 2Mbps, 1Mbps, auto-rate
- Antenna: antenna (external)
- Output Power: 15~17dBm
- RF sensitivity: @PER <0.05 ,11Mbps < -80dBm(typical)
- Security: 64/128-bit WEP Encryption
64/128-bit TKIP Data Encryption
64/128-bit AES Data Encryption
1
3
- Channel Support:
US/Canada: 11 (1 ~ 11)
Major European countries: 13 (1 ~ 13)
France: 4 (10 ~ 13)
Japan: 13 (1 ~ 13)
3. Mechanical
Dimension: 78.8 x32.3 x9.5 mm (L x W x H)
4. Certification
FCC, CE class B
5. Environmental Operating Ranges
- Operating Temperature: 0 ~70° C, Humidity 10 ~ 90%
- Storage Temperature: -20 ~90° C, Humidity 10 ~ 90%
6. Power Consumption
-Power ON : 260mA
-Traffic : 325mA (Avg) / 334.54mA (Max)
-Standby : 231mA
7. LED Indication
Blue: Traffic
Green: Link
8. Driver support
Microsoft Windows 98SE / ME / 2000 / XP
4
Install driver and utility for
Windows 98/ME/2000
Make sure your PC is powered on and that you are running the proper operating
system.
1. Click "Start" > "Run", then type "F:\Setup.exe" (where F:\ is the path of your
CD-ROM drive) in the location or you can click the "Browse" button to select it, then
click the "OK" button.
2. Please click the "NEXT" button.
2
5
3. Press [Next], to continue installation.
6
4. For Windows 2000, you may be informed the software has not passed Windows
logo testing. This is normal, and it has been verified that the software does work
with Windows 2000. Click the “Continue Anyway button to continue.
5. Then please insert the USB wireless LAN adapter in to your PC USB port.
6. For Windows 2000, then you may be informed that a digital signature has not been
found. This is normal, and it has been verified that the adapter does work with
Windows 2000. Click the “Continue Anyway” button to continue.
7
Congratulations! The installation of the USB wireless LAN adapter is complete. You will
then see an icon colored red in the taskbar for the “ZD Config” utility. For more
setting information about the “ZD Config” utility please refer to chapter 4
”Configuration Utility”.
Uninstallation
1. Make sure your PC is powered on and that you are at the Windows 98SE operating
system. Then insert the Driver CD.
2. Click "Start" > "Run", then type "F:\Setup.exe" (where F:\ is the path of your
CD-ROM drive) in the location or you can click the "Browse" button to select it, then
click the "OK" button.
8
3. You will then see the “Confirm uninstall” window, please click the "OK" button.
4. Please click the "Finish" button to complete uninstallation.
9
Install for Windows XP
1. The installation process in Windows XP is similar with the process in windows
98SE/Me/2000. Please refer to the instructions described in chapter 2. Because
Windows XP has a built-in wireless network utility you may decide to use the system’s
utility or the one provided by this USB adapter.
It is strongly recommended to using the utility of this adapter.
A. Using the Windows XP’s Utility
Click the icon marked red that is in the taskbar and you may start using the Windows
XP’s wireless utility
B. Using the Utility of this adapter
1. Once you are into the Windows XP’s Utility, click the “Advanced“ button.
2. In the “Wireless Network Connection Properties“ screen, uncheck the setting
“Use Windows to configure my wireless network settings“. Note that if you want to
change it back to the Windows XP built-in utility check the item again.
3
10
3. Execute “ZD Config” program (click “Start” button and “Program” select “USB
Wireless LAN”).
*For more setting information about “ZD Config” utility please refer to chapter 4
“Configuration Utility”.
11
Configuration Utility
4. Configuration Utility
The Configuration Utility is a powerful application that helps you configure the USB
Wireless LAN Adapter and monitor the link status during the communication process.
This utility can be used to change the following configuration parameters when the
device is active.
4
12
4.1 Wireless Connection
In the “USB Wireless LAN Configuration Tool, you can view all the information
about nearby wireless devices and also check the link status as the USB Adapter is
linking to one of the wireless devices.
Parameter Description
Network
Adapter
Displays the product information about the USB Adapter.
Available
Network
Displays all the SSID and Signal Strength of wireless devices
nearby. To re-survey the available wireless devices please click
“Refresh” button.
There are two ways to automatically make the connection between
the USB Adapter and a wireless device on the list.
1. Double-click the wireless device on the list to connect the device
directly.
2. Click the device you intend to connect to and press the “Connect
this site“ button.
Current
Network
Information
Displays the information about the wireless network this adapter is
connecting to. The information includes Channel, Type, SSID, TX
Rate and WEP settings.
More Setting
button
Press this button for more settings including disable/enable WEP
and Power Saving Mode.
Link Status Displays the status of the wireless connection.
13
Signal
Strength
This bar shows the signal strength level. The higher percentage
shown in the bar means there is a greater radio signal being
received by the adapter. This indicator helps to find the proper
position of the wireless device for optimal network operation.
Link Quality This bar indicates the quality of the link. The higher the percentage,
the better the quality.
TX Frame Displays the number of data frames that are transmitted by the
adapter successfully.
RX Frame Displays the number of data frames that are received by the
adapter successfully.
14
4.2 General Connection Setting
In the “More Setting...” screen, users are allowed to designate the wireless network
that the adapter intends to connect to, enable/disable the WEP data encryption, save
or load the setting values into/from a file, etc.
Parameter Description
Channel Select the radio channel number to be used for the network. The
channel setting of the wireless stations within a network should all
be the same.
TxRate Select the basic transmit rate to be used: 11, 5.5, 2 or 1Mbps. If
“Auto“ is selected, the adapter will automatically adjust to the
highest possible rate according to interference or obstacles.
SSID The SSID (up to 32 printable ASCII characters) is the unique
name identified in a WLAN. The ID prevents the unintentional
merging of two co-located WLANs.
You may specify a SSID for the adapter and then only devices with
the same SSID can interconnect to the adapter.
15
Any If the “Any“ check box is enabled, the adapter will survey and
connect to one of the available wireless stations without checking
the consistency of channel and SSID with the wireless station.
Network Type Infrastructure: This mode requires the presence of an AP or
Router to create a wireless network. All the communication is
processed through the AP or Router.
Ad Hoc: This mode enables wireless network adapters
interconnecting without an AP or Router. Select this mode if there is
no AP or Router in the network.
Change button Pressing the “Change“ button will enable you to setup the
parameters of “General Connection Setting“. In the meantime, the
button will change to an “Apply“ button for you to confirm your
settings.
Encryption
Setting
In the block, users may setup the WEP key for the data encryption
within the network. Please refer to Section 3.3 for more description.
Profile Name Input the profile name to write the setting values of the adapter to
a file or load the setting values from a file you designate.
Load profile
setting
Load the setting values from the file entered in the “Profile Name“.
The new settings will be activated immediately.
Write current
setting to
Profile
Write the current setting values to the file entered in the “Profile
Name“. Please record the file name of the data that’s saved.
Load factory
default setting
To restore to factory default, please press this button. The default
values are as follows.
Channel: 6
TxRate: Auto
SSID: Any
Network Type: Infrastructure
Advanced
Setting... button
For more advanced setting, please press this button. To learn
more about these settings please refer to Section 3.4.
Information
button
To view the version of the driver, firmware and the MAC Address
of the adapter, press the button.
16
4.3 WEP Encryption
WEP is an authentication algorithm, which protects unauthorized Wireless LAN users
against eavesdropping. The Authentication type and WEP key must be the same on
the wireless stations within the network. This adapter supports 64/128-bit WEP
Encryption. With this function, your data will be transmitted over the Wireless network
securely.
Parameter Description
Authentication
Mode
This setting has to be consistent with the wireless stations that the
adapter intends to connect to.
Open System – No authentication is needed among the wireless
stations.
Shared Key – Only wireless stations using a shared key (WEP
Key identified) are allowed to connect to each other. Setup the
network using the same key as the wireless stations use that the
adapter intends to connect to.
Auto – Auto switch the authentication algorithm depending on the
wireless stations that the adapter is connecting to.
Key Length You may select 64-bit or 128-bit to encrypt transmitted data. Larger
key length will provide higher level of security, but the throughput
will be lower.
Default Key ID Select one of the keys (1~4) as the encryption key.
17
Key1 ~ Key4 The keys are used to encrypt data transmitted in the wireless
network. Fill the text box by following the rules below.
64-bit – Input 10 digit Hex values (in the “A-F”, “a-f” and “0-9”
range) as the encryption keys. For example: “0123456aef“.
128-bit – Input 26 digit Hex values (in the “A-F”, “a-f” and “0-9”
range) as the encryption keys. For example:
“01234567890123456789abcdef“.
18
4.4 Advanced Setting
The “Advanced Setting” allows user to enable/disable power saving mode, setup
the fragmentation threshold and RTS/CTS threshold of the adapter.
Parameter Description
Enable auto
power saving
Check this box to enable power saving mode. You may control
the power consumption of the adapter by adjusting the save
power level from 1 to 4. The higher power save level selected, the
lower power used. Note that when lower power is supplied it may
slow down the transmission rate of the adapter.
Fragementation
Threshold
This value defines the maximum size of packets. Any packet
size larger than the value will be fragmented. If you have
decreased this value and experience high packet error rates, you
can increase it again, but it will likely decrease overall network
performance. Select a setting within a range of 256 to 2305 bytes.
Minor change is recommended.
RTS / CTS
Threshold
Minimum packet size required for an RTS/CTS (Request To
Send/Clear to Send). For packets smaller than this threshold, an
RTS/CTS is not sent and the packet is transmitted directly to the
WLAN. Select a setting within a range of 0 to 2305 bytes. Minor
change is recommended
19
Troubleshooting
This chapter provides solutions to problems usually encountered during the installation
and operation of the adapter.
1. What is the IEEE 802.11b standard
The IEEE 802.11b Wireless LAN standard subcommittee formulates the standard
for the industry. The objective is to enable wireless LAN hardware from different
manufactures the ability to communicate.
2. What does IEEE 802.11 feature support
The product supports the following IEEE 802.11 functions:
CSMA/CA plus Acknowledge Protocol
Multi-Channel Roaming
Automatic Rate Selection
RTS/CTS Feature
Fragmentation
Power Management
3. What is Ad-hoc
An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless
LAN adapter, connected as an independent wireless LAN. An Ad-hoc wireless LAN
is applicable at a departmental scale for a branch or SOHO operation.
4. What is Infrastructure
An integrated wireless and wireless/wired LAN is called an Infrastructure
configuration. Infrastructure is applicable to enterprise scale for wireless access to
central database, or wireless application for mobile workers.
5. What is BSS ID
5
20
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS
must be configured with the same BSS ID.
6. What is WEP
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit
shared key algorithm, as described in the IEEE 802 .11 standard.
7. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP
security, especially the reuse of encryption keys. TKIP is involved in the IEEE
802.11i WLAN security standard, and the specification might be officially released
in early 2003.
8. What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been developed
to ensure the highest degree of security and authenticity for digital information,
wherever and however communicated is stored, while making more efficient use of
hardware and/or software than previous encryption standards. It is also included in
the IEEE 802.11i standard. Compared with AES, TKIP is a temporary protocol for
replacing WEP security until manufacturers implement AES at the hardware level.
9. What is IEEE 802.1x?
802.1x is an IEEE standard that provides an authentication framework for
802-based LANs. 802.1x will let wireless LANs be scaled by allowing centralized
authentication of wireless users or stations. Based on the 802.1x framework, any
wireless stations try to connect to an Access Point or Router will be authenticated
by an Authentication Server.
The Authentication Server identifies the wireless station by a set of user name and
password. Only wireless stations providing a correct user name and password
can connect to the Access Point or Router and access to the network.
21
10. Can Wireless products support printer sharing
Wireless products perform the same function as LAN products. Therefore, Wireless
products can work with Netware, Windows 2000, or other LAN operating systems to
support printer or file sharing.
11. Would the information be intercepted while transmitting on air
WLAN features two-fold protection in security. On the hardware side, as with Direct
Sequence Spread Spectrum technology, it has the inherent security feature of
scrambling. On the software side, WLAN series offer the encryption function (WEP)
to enhance security and Access Control. Users can set it up according to their
needs.
12. What is DSSSWhat is FHSSAnd what are their differences
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that
changes frequency in a pattern that is known to both transmitter and receiver.
Properly synchronized, the net effect is to maintain a single logical channel. To an
unintended receiver, FHSS appears to be short-duration impulse noise.
Direct-sequence spread spectrum (DSSS) generates a redundant bit pattern for
each bit to be transmitted. This bit pattern is called a chip (or chipping code). The
longer the chip is, the greater the probability that the original data can be recovered.
Even if one or more bits in the chip are damaged during transmission, statistical
techniques embedded in the radio can recover the original data without-the need for
retransmission. To an unintended receiver, DSSS appears as low power wideband
noise and is rejected (ignored) by most narrowband receivers.
22
13. What is Spread Spectrum
Spread Spectrum technology is a wideband radio frequency technique developed
by the military for use in reliable, secure, mission-critical communication systems. It
is designed to trade off bandwidth efficiency for reliability, integrity, and security. In
other words, more bandwidth is consumed than in the case of narrowband
transmission, but the trade off produces a signal that is, in effect, louder and thus
easier to detect, provided that the receiver knows the parameters of the
spread-spectrum signal being broadcast. If a receiver is not tuned to the right
frequency, a spread –spectrum signal looks like background noise. There are two
main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency
Hopping Spread Spectrum (FHSS).

Navigation menu