Cameo Communications WLG1500C 802.11g WLAN USB Adapter User Manual M WLG 1500 Modified

Cameo Communications Inc 802.11g WLAN USB Adapter M WLG 1500 Modified

Manual

  IEEE 802.11g Pen Size Wireless USB 2.0 Adapter      User’s Guide
i Regulatory notes and statements Wireless LAN, Health and Authorization for use Radio  frequency  electromagnetic  energy  is  emitted  from  Wireless  LAN  devices. The  energy  levels  of  these  emissions  however  are  far  much  less  than  the electromagnetic  energy  emissions  from wireless devices like for example  mobile phones.  Wireless  LAN  devices  are  safe  for  use  frequency  safety  standards  and recommendations.  The  use  of  Wireless  LAN  devices  may  be  restricted  in  some situations or environments for example: ·On board of airplanes, or ·In an explosive environment, or ·In case the interference risk to other devices or services is perceived or identified as harmful In  case  the  policy  regarding  the  use  of  Wireless  LAN  devices  in  specific organizations  or environments  (e.g.  airports,  hospitals, chemical/oil/gas  industrial plants, private buildings etc.) is not clear, please ask for authorization to use these devices prior to operating the equipment. Regulatory Information/disclaimers Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in the user documentation provided with the product. Any changes or modifications made to this device that are not expressly approved by the manufacturer  may  void  the  user’s  authority  to  operate  the  equipment.  The Manufacturer is not responsible for any radio or television interference caused by unauthorized  modification  of  this  device,  of  the  substitution  or  attachment. Manufacturer and its authorized resellers or distributors will assume no liability for any damage or violation of government regulations arising from failing to comply with these guidelines. Federal Communication Commission Interference Statement  This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide  reasonable  protection  against  harmful  interference  in  a  residential installation. This equipment generates, uses and can radiate radio frequency energy and,  if  not  installed  and  used  in  accordance  with  the  instructions,  may  cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by
ii turning  the  equipment  off  and  on,  the  user  is  encouraged  to  try  to  correct  the interference by one of the following measures:  -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2)  this  device  must  accept  any  interference  received,  including  interference  that may cause undesired operation.  IMPORTANT NOTE: Radiation Exposure Statement: This  equipment  complies  with  FCC  radiation  exposure  limits  set  forth  for  an uncontrolled environment. End users must follow the specific operating instructions for  satisfying  RF  exposure  compliance.  To  maintain  compliance  with  FCC  RF exposure  compliance  requirements,  please  follow  operation  instruction  as documented in this manual.   This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.  SAR compliance has been established in typical laptop computer(s) with USB slot, and  product  could  be  used  in  typical  laptop  computer  with  USB  slot.  Other application like handheld PC or similar device has not been verified and may not compliance with related RF exposure rule and such use shall be prohibited. The availability of some specific channels and/or operational frequency bands are country  dependent  and  are  firmware  programmed  at  the  factory  to  match  the intended destination. The firmware setting is not accessible by the end user.
iii Industry Canada statement:  This  device  complies  with  RSS-210  of  the  Industry  Canada  Rules.  Operation  is subject  to  the  following  two  conditions:  (1)  This  device  may  not  cause  harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: Radiation Exposure Statement: This  equipment  complies  with  IC  radiation  exposure  limits  set  forth  for  an uncontrolled environment. End users must follow the specific operating instructions for  satisfying  RF  exposure  compliance.  To  maintain  compliance  with  IC  RF exposure  compliance  requirements,  please  follow  operation  instruction  as documented in this manual.   The  Class  [B]  digital  apparatus  meets  all  requirements  of  the  Canadian Interference-Causing  Equipment Regulation. Cet appareil numerique de la class [B] respecte toutes les exigences du Reglement sur le materiel brouilleur du Canada. Protection  requirements  for  electromagnetic  compatibility  –  Article 3.1b Testing for electromagnetic compatibility according to EN 301 489-1, EN 301 489-17 and EN 55024 has been conducted. These are considered relevant and sufficient. Effective use of the radio spectrum – Article 3.2 Testing for radio test suites according to EN 300 328-2 has been conducted. These are considered relevant and sufficient. CE in which Countries where the product may be used freely: Germany,  UK,  Italy,  Spain,  Belgium,  Netherlands,  Portugal,  Greece,  Ireland, Denmark, Luxembourg, Austria, Finland, Sweden, Norway and Iceland. France: except the channel 10 through 13, law prohibits the use of other channels.                                                                            HW.32 V2.00
iv TABLE OF CONTENT Introduction................................................................................................1 Overview of this User’s Guide.................................................................1 Product Features.........................................................................................2 Unpacking and Setup .................................................................................3 Unpacking................................................................................................3 Setup........................................................................................................3 Hardware Installation.................................................................................4 LED Indicator ..........................................................................................4 Check the installation...............................................................................4 Software Installation ..................................................................................5 Windows 98se/ME/2000/XP Utility and Driver Installation....................5 Wireless Utility Setting............................................................................6 Technical Specifications ..........................................................................17
1 INTRODUCTION Congratulations on your purchase of this IEEE 802.11g Pen Size Wireless USB 2.0 Adapter. This manual helps to get familiar with the Pen Size Wireless USB 2.0 Adapter. This manual contains detailed instructions in operation of this product. Please keep this manual for future reference. With  a  Wireless  LAN  (IEEE  802.11g)  USB  2.0  Adapter,  a  desktop  or  laptop computer can communicate with another computer in a wireless way. Easy-to-use utilities are bundled with Wireless USB Adapter for configuration, monitoring, and diagnosis purposes.  Pen  Size  Wireless  USB  2.0  Adapter  can  wirelessly  transmit  and  receive  data, minimizing the need for wired connections, at a speed of up to fifty-four megabit per second. Wireless USB 2.0 Adapter provides users with an access to real-time information anywhere  in  their  organization.  The  mobility  provides  productivity  and  service, which  are  not  available  under  wired  networks.  The  Wireless  USB  2.0  Adapter configuration  is  easy  to  change  from  peer-to-peer  networks,  suitable  for  a  small number  of  users,  to  full  infrastructure networks  of  thousands  of  users  that allow roaming around a broad area.  Overview of this User’s Guide Introduction.  Describes the Wireless USB 2.0 Adapter and its features. Unpacking  and  Setup.    Helps  you  get  started  with  the  basic  installation  of  the Wireless USB 2.0 Adapter. Hardware Installation.  Describes the LED indicators of the Adapter. Software Installation.  Tells how to setup the driver and the utility setting. Technical Specifications. Lists the technical (general, physical and environmental) specifications of the Wireless USB 2.0 Adapter.
2 PRODUCT FEATURES  Compatible with IEEE 802.11g high rate standard to provide wireless Ethernet speeds of 54Mbps data rate  Compliant with Universal Serial Bus Rev.2.0, 1.1, 1.0 specification  Pen-Size design  Dynamic data rate scaling at 54, 48, 36, 24, 18, 12, 9 and 6Mbps for 802.11g  Dynamic data rate scaling at 11, 5.5, 2 and 1Mbps for 802.11b  Maximum reliability, throughput and connectivity with automatic data rate switching  Supports WMM QoS (Wi-Fi Multimedia Quality of Service)  Supports wireless data encryption with 64/128-bit WEP standard for security  Supports WPA, WPA2, WPA-PSK, WPA2-PSK  Intuitive GUI setup software provide easy configuration  Plug-and-Play operation  Drivers support Windows 98se, 2000,ME and XP  Simple user setup & diagnostics utilities  Type approval compliant with FCC Part 15.247 for US, ETS 300 328 for Europe
3 UNPACKING AND SETUP This chapter provides unpacking and setup information for the Wireless USB 2.0 Adapter. Unpacking Open the box of the Pen Size Wireless USB 2.0 Adapter and carefully unpack it. The box should contain the following items:  One 802.11g Pen Size Wireless LAN USB 2.0 Adapter  One Driver & Utility CD-ROM If  any  item  is  found  missing  or  damaged,  please  contact  your  local  reseller  for replacement. Setup The setup of the Wireless USB 2.0 Adapter can be performed using the following steps:  Visually inspect the USB connector and make sure that it is fully plugged in to the system’s USB port.  Make sure that there is a well environment that there is no much intrusion to have a better connection.
4 HARDWARE INSTALLATION LED Indicator LNK (LINK) The LNK indicator lights green when the Wireless LAN is connected to a network successfully. Otherwise  the  LNK  indicator  blinks  green while  the  Wireless USB Adapter is scanning the wireless device. Check the installation The LEDs of the Wireless USB 2.0 Adapter are clearly visible and the status of the network link can be seen instantly: 1. When connected to the USB port and the driver was installed, the LNK LED will start blinking, it means that the device is starting to scanning a 802.11g wireless device near the Wireless USB 2.0 Adapter. 2. While the Wireless USB 2.0 Adapter linked up to the Access Point or to other Wireless LAN station, the LNK LED will always light up.
5 SOFTWARE INSTALLATION This section will lead you to install the driver and utility of the Wireless USB 2.0 Adapter. Windows 98se/ME/2000/XP Utility and Driver Installation 1. Insert  the  Wireless  LAN  USB  2.0  Adapter  Driver  &  Utility  CD-ROM  into computer’s  CD-ROM  Drive  and  it  will  automatically  run  a  setup  menu  and install the driver and the utility, for Win98se, please reboot the system to install the driver to the system properly. In some specific setting on Windows system, you  may  need  to  proceed  the  software  manually,  go  to  your  Windows  Start menu and choose Run, type “D:\Utility\Setup.exe” in the dialog box (D:\ will depend on where your CD-ROM drive is located) and click OK. 2. If  you  need  to  install  the  driver  manually,  refer  each  Windows  OS  to  the following CD-Rom directory path: D:\Drivers\<Windows OS>\SIS163U.INF. Note:  (D:\  will  depends  on  where  the  CD-ROM  drive  is  located  and  <Windows OS> will depend on the Windows Operating System you are using).  3. The Install Shield Wizard screen will appear. Click “Next” to continue.  4. The installation program will help you to setup the Wireless Utility. Be noted that the Windows XP have its own Wireless Utility; you can either use the utility of Windows XP or the provided utility.
6 5. You will see the icon on the Windows task bar when you finish the installation.  When the icon in the toolbar represents in green color, it is properly connected to the network and if it represents in red color, then it is not connected to the network. Wireless Utility Setting With the  Wireless  USB 2.0  Adapter utility, users can  configure  all the functions provided by the Wireless Monitor Utility. Double-click the utility icon that appears in the taskbar. The Wireless Monitor Utility includes seven tabs: Status, Configuration, Advanced, Profile, Network, Statistics and About. Status The Status screen shows you the status of the Wireless Adapter, it shows that where the device is connected to, the Network mode, the Channel, the transmit rate and the encryption mode.    There are two dialog boxes showing the data transmitted and the data received. The two signal lines show the Signal Strength and the Link Quality of the device.
7 Configuration The Configuration function helps you to configure the Network and the Security.  Network: the setting of the Network mode, the SSID and the Channels.  Network Mode:  If you want to connect with an Access Point, please set to “Infrastructure” mode. If you have more stations and just want to set them as local network, please set the mode to “Ad-Hoc” mode.  Network SSID: The SSID differentiates one Wireless LAN group name from another; so all access points  and  all  devices  attempting  to  connect  to  a  specific  Wireless  LAN  group name  must  use  the  same  SSID.  A  device  will  not  be  permitted  to  join  the  BSS unless it can provide the unique SSID. If the SSID parameter is “ANY”, it will detect the strongest signal of the wireless station.  Channel: It shows radio channel numbers that used for Wireless LAN networking.  The channel number can be set only under the Ad-Hoc operation mode. In Ad-Hoc mode stations, each station must have the same channel numbers and SSID.  In  Infrastructure  mode,  the  Wireless  USB  Adapter  will  automatically  detect  the channel number of the Access Point.
8 Security: the setting of the Network Encryption. This  function  is  used  to  protect  wireless  communication  from  eavesdropping.  A secondary  function  of  encryption  is  to  prevent  unauthorized  access  to  a  wireless network, and it can be achieved by using the Encryption function.  Enable Encryption:  Enable  or Disable the WLAN  encryption  on the  WLAN USB Adapter.   Authentication Mode: Auto: Will automatically adjust to the Authentication mode of the WLAN USB Adapter. Open System: with the same WEP key between the stations, the stations don’t need to be authenticated, and this algorithm was set to default. Shared  Key:  with  the  same  WEP  key  between  the  stations  in  this Authentication  algorithm,  this  type  will  use  packets  with  encryption  by transferring  a  challenge  text  which  will  be  acknowledge  by  both  side  of  the stations.  In order to  choose  which authentication algorithm will be used, you must know which one the station supports this algorithm first. WPA: WPA  (Wi-Fi  Protected  Access)  security is  selected, configuration is enabled.  Please click the “Certificate” button. The below window is pop up. Then,  please  select  the  certificate that user wants  to  use  and  enter the  server name and login name.
9 WPA-PSK: WPA-PSK (Wi-Fi Protected Access pre-shared key) is a simpler version that does not support 802.1x and requires a separate RADIUS server for mutual authentication. Enter a Passphrase in the WPA-PSK dialog box. This Passphrase must be the same on each computer that is connected to the wireless network.  WPA2: WPA2 (Wi-Fi Protected Access 2) is the second generation of WPA; providing enterprise and consumer Wi-Fi user  with a  high  level of assurance that only authorized user can access their wireless networks. WPA2 is based on the  final  IEEE802.11i  amendment  to  the  802.11  standard  and  is  eligible  for FIPS 140-2 compliant. WPA2 is select, configuration is enabled.  Please click the “Certificate” button. The below window is pop up. Then, please select the certificate that user wants to use and enter the server name and login name.
10 WPA2-PSK: WPA-PSK2 (Wi-Fi Protected Access pre-shared key) is a simpler version that does not support 802.1x and requires a separate RADIUS server for mutual authentication. Enter a Passphrase in the WPA2-PSK dialog box. This Passphrase must be the same on each computer that is connected to the wireless network.  It is recommended to select “Auto” if you are not familiar with the setting.  Encryption Mode:  There  are  two  kinds  of  encryption  mode,  WEP  encryption  and  WPA-Passphrase.. Click the Enable Encryption to activate the security of the USB Adapter. WEP-Key:  WEP  (Wired  Equivalent  Privacy)  relies  on  a  secret  key  that  is shared between a mobile station and a base station (Access Point). WEP-Passphrase: the Passphrase in the dialog box helps you to create a group of WEP key in the Key Setting.  Default Key (Key 1 ~ Key 4):  You can type the key that you want to use from Key#1 to Key #4, and the key that  you type  will  be  the  encryption between  the stations  that  you  connected with.
11  Key Length, Key Format and WEP Key: If  you  select  64bit  in  Hex  format,  you  must  type  10  values  in  the  following range (0~F, hexadecimal), or 64bit in ASCII format, you must type 5 values in the following range (0~9, A~Z and a~z Alphanumeric).  If you select 128bit in Hex format, you must type 26 values (0~F, hexadecimal), or 128bit in ASCII format, you must type 13 values in the following range (0~9, A~Z and a~z Alphanumeric). Be sure that the USB Adapter and the wireless station were set in the same key. Note: After all the settings are completed, click Apply to save the setting. Advanced The  Advanced  settings  help  you  to  control  the  Wireless  Adapter  to  adjust  with wireless devices in certain environment.   Wireless Mode: (Ad-Hoc mode only) If the USB WLAN adapter is work with Ad-Hoc mode, there are two functions for users select, including 11B and 11G. The default setting is 11B, 11G, which is interoperable with both 11B and 11G devices.  Power Saving: To  set  your  Wireless  Adapter  as  power  saving  mode,  select  “Off”,  “Normal”  or “Maximum”.
12  Preamble Type: The usage of the preamble is to limit the packet size of the data to transmit. It is recommended to choose the short preamble when the  link quality is bad, it is to prevent the wasting time of resending a long packet that is lost. The Default is Auto which access short and long preamble.  Fragment Threshold: Fragmentation  Threshold  is  a  way  of  transmitting  the  packets  that  will  be fragmented.  Choose  a  setting  within  a  range  of  256  to  2432  bytes.  It  is recommended to fragment the packet when the link quality is bad, it is to prevent the wasting time of resending a long packet that is lost.  RTS/CTS Threshold: The RTS/CTS Threshold is a station initiates the process by sending a RTS frame, the other ends receives the RTS and responds with a CTS frame, the station must receive a CTS frame before sending the data frame. This is to prevent the collisions by  each  station.  Choose  a  setting  within  a  range  of  256  to  2432  bytes.  It  is recommended  limiting  a  long  packet  to  prevent  each  station  waiting  too  long  to transmit a data.
13 Profile The  Profile  section  allows  you  to  set  values  for  all  parameters  by  selecting  a previously defined profile. Type a name in the Profile Name field to create a profile, click “Save” and then click “Apply” when a profile is done. You can click “Delete” if the profile is no longer used, to activate other profile, choose a profile name in the Profile Name field and click Activate.
14 Network The  screen  shows  all  the  Wireless  devices  around  your  Wireless  Adapter.  The information of the wireless devices includes the SSID, MAC  Address, Channels, Signal, the Security type and the Network mode. You can click the “Rescan” button to find the new wireless devices, and double-click the device to choose the wireless station that you want to connect with.
15 Statistics The  Statistics  section  shows  the  real-time  transmit  and  receive  packets  of  the Wireless Adapter.
16 About The About section shows the Device Name, Regulatory Domain, Driver Version, MAC Address and the Utility version.
17 TECHNICAL SPECIFICATIONS General Standards  IEEE 802.11g, USB 2.0, 1.1, 1.0 Radio Technology  IEEE 802.11b Direct Sequence Spread Spectrum (DSSS) IEEE 802.11g Orthogonal Frequency Division Multiplexing (OFDM) Data Transfer Rate  1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54Mbps (auto sense) *When plug the device in the USB 1.1/1.0 port, the real throughput will be up to 6Mbps only when running 11Mbps or higher speed Receiver Sensitivity  54Mbps: Typical -72dBm @ 10% PER (Packet Error Rate) 11Mbps: Typical -83dBm @ 8% PER (Packet Error Rate) 1Mbps: Typical -94dBm @ 8% PER (Packet Error Rate) Frequency Range  2412 ~ 2484 MHz ISM band (channels 1 ~ 14) Modulation Schemes  BPSK/QPSK/CCK/OFDM Channels  1 ~ 11 channels (FCC) 1 ~ 13 channels (ETSI) 1 ~ 14 channels (Japan) Media Access Protocol CSMA/CA with ACK Security  64/128-bits WEP Encryption WPA, WPA2, WPA-PSK, WPA2-PSK Diagnostic LED  LNK (Link status) Antenna  Integrated Antenna Physical and Environmental Driver Support  Windows 98se, Windows 2000, Windows ME, Windows XP Continuous Current Consumption  280mA typ. for receive mode, 380mA typ. for transmit mode Temperature  Operating: 0° ~ 40° C, Storage: -10° ~ 70° C Humidity  10% ~ 95% RH, no condensation Dimensions  77 x 26 x 12 mm (W x H x D) Certifications  FCC Part 15.247 for US, ETS 300 328 for Europe,

Navigation menu