Delta Electronics TYPEIII 802.11b/g WiFi Module User Manual TYPE III UserMan Revised 1220 p

Delta Networks, Inc. 802.11b/g WiFi Module TYPE III UserMan Revised 1220 p

Contents

Users Manual 1 of 2

ProSTIEEE802.11b/g WiFi BoardPreliminary Reference GuideRev: 1.00Date: August 31, 2005
Total Manufacturing Test Process Overview:In general the following steps are considered part of a manufacturing (test) flow: 1. PCBA assembly 2. Inspection(visual, automated visual, X-ray,    ) 3. Structural test of the digital circuitry(Boundary Scan Test (BST), or other methods) 4. Functional test of the analog circuitry (radio test). 5. Calibration of the radio (for optimal performance within legal bounds); storing the results to non-volatile memory. 6. Customization/ serialization (adding identity such as Part number to the DUT). 7. Plastics assembly. 8. Pack & ship.                          Figure 1. Manufacturing Test Process
 Manufacturing Test Plan Overview for IMT tool1. Test initialization and Product identification        PCB serial number, product part number, and MAC address are established.         A bar code scanner or the keyboard can be used to enter this information         By default the information is divided between two codes. The first (bar) code contains the PCB serial number. The second bar code contains the product part number and half the Mac address. 2. DUT insertion        Depending on the type of DUT, the software waits for the DUT to be attached to the set-up. If the DUT is not responding, the user is offered an escape by pressing the ABORT button.         Alternatively the user is asked to insert the DUT and press the NEXT button. The software then switches the DUT on, and continues with the testing. 3. System test        Properties of the operating system, including the version number, are determined and tested for compatibility. The versions of a number of DLLs and other system files are checked for compatibility as well. 4. Firmware and Driver Compatibility test         The MTFW version number is tested for compatibility. 5. Transmitter verification        A quick test is performed to verify the transmit function of the DUT. If the DUT passes this test, the following is true: the test system can communicate with the DUT firmware. The DUT can transmit RF signals with approximately the right frequency and amplitude. 6. Frequency accuracy        The carrier frequency accuracy of the DUT is determined at the center channel. The sum of the measured deviation plus the maximum instrument error must be less than the limit set by the 802.11 standard 7. Receiver verification        The capability of the receiver circuitry to receive and demodulate 802.11 packets is verified. If the DUT passes, the following is true: the receiver functions correctly and the receiver sensitivity(PER) is within limits.         As part of this test the GRT output power is measured, the RF isolation between GRT and DUT is verified, and interference from other 802.11 sources is detected.
8. RSSI calibration (linear approximation)         Linear curve fitting is performed on the result, and PDR 0x1902, 0x1905, or 0x1908 is calculated, depending on the platform type. 9. PA control loop calibration         The PA control loop behavior is measured as a function of modulation type (bit rate) and channel (frequency). Depending on the platform, PDR 0x1901 or 0Xpdr1903 and 0x1904 are calculated.         There are two implementations for this step: 1. PA Calibration 2. PA Curves and PA limits   Besides, we have max/min output power pass/fail criteria for different modulation as Figure2 in 9301A_param configured file.                     Figure2.  Power Limit
10. TX IQ Calibration      For the platforms that require it, ZIF TX IQ Calibration is performed. 11. NV initialize     By default this test will (re-)initialize and therefore erase the non-volatile memory. 12. Upload files to flash      Files can be uploaded to AP based products. These files can contain firmware images, boot loaders or custom made images. 13. Write PDAThe PDRs that were generated by the other test modules are written to the PDAthat resides in the non-volatile memory of the DUT.
802.11b/g WiFi ModuleFeaturesThe features supported by the ProST 802.11g WLAN Access Point are outlined below:Interfaces directly to 10/100Mbps IEEE 802.3 Ethernet networksSupports IEEE 802.11 WLAN functionsSupported WLAN Bridge function (WDS: Wireless Distribution System) Firmware is stored in a flash memory and can be upgraded remotely.Configurable through Web based management.Power, Ethernet and wireless activity LED indicators.One external and one internal inverted F antennas supporting diversity.Wireless Network ConfigurationAd-hoc Mode (Peer-to-Peer Workgroup)The Institute of Electrical and Electronics Engineers (IEEE) standard for wireless LANs (WLANs), 802.11, offers two methods for configuring a wireless network  —  ad hoc and infrastructure.  In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network — each node can generally communicate with any other node.  There is no access point involved in this configuration.  It enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft Networking in the various Windows operating systems.  Some vendors also refer to ad hoc networking as Peer-to-Peer group networking.In this configuration, network packets are directly sent and received by the intended transmitting and receiving stations.As long as the stations are within range of one another, this is the easiest and least expansive way to set up a wireless network.To set up an ad hoc workgroup operating with standard protocols, do the following:•Set all stations to connect in Ad-hoc mode (or Peer-to-Peer workgroup mode)•Set all stations to use the same network name (or SSID).•Set all stations to use no WEP encryption key or an identical WEP encryption key•Set all stations to use the same wireless channel for communicationInfrastructure ModeTo set up an infrastructure network operating with standard protocols, do the following:• Set all wireless stations to connect in infrastructure mode• Set all stations to use the same network name (or SSID)• Set all stations to use no WEP encryption key or an identical WEP encryption key•    Set up wireless channels used by individual access point.  (It is not necessary to set channels on the stations as the stations will automatically scan through all channels for the nearest access point.)
802.11b/g WiFi ModuleService Set Identification (SSID)The Service Set Identification (SSID) is a thirty-two alphanumeric character (maximum) string identifying the wireless local area network (WLAN).  Some vendors refer to the SSID as network name.  For stations to communicate with each other, all stations must be configured with the same SSID.Authentication and WEP EncryptionThe absence of a physical connection between nodes makes the wireless links vulnerable to information theft.  To provide certain level of security, IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key.  Open System authentication is a null algorithm.  Shared Key authentication is an algorithm where both the transmitting node and the receiving node share an authentication key to perform a checksum on the original message.  By default, IEEE 802.11 wireless devices operate in an open system network.Wired Equivalent Privacy (WEP) data encryption is utilized when the wireless nodes or access points are configured to operate in Shared Key authentication mode.  There are two shared key methods implemented in most commercially available products, 40-bit WEP data encryption and 104-bit WEP data encryption.The 40-bit WEP data encryption method allows for a five-character (forty -bit) input.  Additionally, 24 factory-set bits are added to the forty -bit input to generate a 64-bit encryption key.  (The 24 factory-set bits are not user configurable.)This encryption key will be used to encrypt/decrypt all data transmitted via the wireless interface.  Some vendors may refer to the 40-bit WEP data encryption as 64-bit WEP data encryption since the actual encryption key used in the encryption process is 64 bits wide.The 128-bit WEP data encryption method consists of 104 configurable bits.  Similar to the 40-bit WEP data encryption method, the remaining 24 bits are factory set and not user configurable.  Some vendors allow pass phrases to be entered instead of the cryptic hexadecimal characters to ease encryption key entry.Wireless Channel SelectionIEEE 802.11g wireless nodes communicate with each other using radio frequency signals in the ISM (Industrial, Scientific, and Medical) band between 2.4Ghz and 2.5Ghz.  Neighboring channels are 5Mhz apart.  However, due to spread spectrum effect of the signals, a node sending signals using a particular channel will utilize frequency spectrum12.5Mhz above and below the center channel frequency.  As a result, two separate wireless networks using neighboring channels (for example, channel 1 and channel 2) in the same general vicinity will interfere with each other.Applying two channels that allow the maximum channel separation will decrease the amount of channel cross talk, and provide a noticeable performance increase over networks with minimal channel separation.Channel Center Frequency Frequency Spread1 2412Mhz 2399.5Mhz – 2424.5Mhz2 2417Mhz 2404.5Mhz – 2429.5Mhz3 2422Mhz 2409.5Mhz –2434.5Mhz4 2427Mhz 2414.5Mhz –2439.5Mhz5 2432Mhz 2419.5Mhz – 2444.5Mhz6 2437Mhz 2424.5Mhz –2449.5Mhz7 2442Mhz 2429.5Mhz –2454.5Mhz8 2447Mhz 2434.5Mhz – 2459.5Mhz9 2452Mhz 2439.5Mhz –2464.5Mhz10 2457Mhz 2444.5Mhz –2469.5Mhz11 2462Mhz 2449.5Mhz – 2474.5Mhz12 2467Mhz 2454.5Mhz – 2479.5Mhz13 2472Mhz 2459.5Mhz – 2484.5Mhz
802.11b/g WiFi ModuleNote: The available channels supported by the wireless products in various countries are different by firmware.The preferred channel separation between the channels in neighboring wireless networks is 25 MHz (5 channels).This means that you can apply up to three different channels within your wireless network.  There are only 11 usable wireless channels in the United States.  It is recommended that you start using channel 1 and grow to use channel 6, and 11 when necessary.Changing Wireless ParametersThe following table explains each of the configurable parameters of the ProST WLAN Device.  System InformationThe System Information shows current ProST information.System Information Model ProST WLAN Access PointName Default DUT name MAC Address Displays the six-byte MAC address of the access point.  This parameter is not changeable by the user.
802.11b/g WiFi ModuleRegion Define the regulatory domain of the operation area (default: US)Firmware Version 2.6.4.0IP Address Assign Internet Protocol (IP) address to the access point.Subnet Mask Assign IP Subnet Mask to the access point.Default Gateway Assign default Gateway to the access point if neededDHCP Client Dynamic Host Configuration Protocol, it allows to request the IP from DHCP server for all wireless clie nts.Wireless Network Name (SSID) Enter a 32-character (maximum) extended service set ID in this field.  The characters are case sensitive.  With an access point, the wireless network always functions in infrastructure mode.  The SSID assigned to the wirelessnodes in the same network is required to match the access point SSID.  The default SSID is “default.Channel In infrastructure mode, the wireless node automatically searches through all available wireless channels for an access point to be associated with.  It is not necessary to select the wireless channel when operating in infrastructure mode.  The default wireless channel is 1.Encryption Type Show encryption type OFF, WEP, 802.1X, or WPA.Access Control Show Access Control Enable, Disable or Block  Setup.  IP SettingIP Settings MODEL ProST WLAN ACCESS POINTName   The default Access Point Name is located on the bottom label of the product. You may modify the default name with a unique name up to 15 characters long.DHCP client When there is DHCP Server on the network, if you will manually configure this device, check the “Disable” check box. Otherwise, check the “Enable” check box, and you need enter the next three items below correctly.IP Address Assign Internet Protocol (IP) address to the access point.IP subnet mask Assign IP Subnet Mask to the access point.Default Gateway Assign default Gateway to the access point if neededSpanning Tree Protocol Spanning-Tree Protocol is a link management protocol that provides path redundancywhile preventing undesirable loops in the network. You can enable it to gain the function.
802.11b/g WiFi ModuleApply Means once you change the parameters and save the valuesCancel Means you leave it un-changed  Wireless SettingsWireless Settings MODEL ProST WLAN DeviceWireless Network Name(SSID)Enter a 32-character  (maximum) extended service set ID in this field.  The characters are case sensitive.  With an access point, the wireless network always functions in infrastructure mode.  The SSID assigned to the wir eless nodes in the same network is required to match the access point SSID.  The default SSID is “ default” .SSID Broadcast Every Client can detect the AP if we check “Enable”,  otherwise, it can’t be detected automatically.Country/Region Define the regulatory domain of the operation area (default: None). User may need to choose one of the areas from pop up menu.Channel/Frequency In infrastructure mode, the wireless node automatically searches through all available wireless channels for an access point to be associated with.  It is not necessary to select the wireless channel when operating in infrastructure mode The default
802.11b/g WiFi Modulewireless channel is 1.Mode B or/and G mode can be selected. With “ B only” , the speed is under 11Mbps; with “ G mode”  or “ B and G mode” , the speed is up to 54Mbps.Enable Features When choose “ WMM with VLAN PassThru” , you can have this function, but you can’ t gain the function of “ Virtual AP with VLAN Aware AP” . Vice versa.Radio Off When enable it, means the radio is off and the AP won’ t be scanned. Otherwise, you can find it. User's Privacy Protection When enabled, the signal from different users won’ t be interfered.Antenna Diversity When enabled, the AP can automatically choose the more appropriate antenna for signal sending.  Security SettingSecurity SettingsAccess Control List (ACL) Grant or deny access to individual clients. Click it to make some changes.RADIUS Servers Set RADIUS server settings for your network. Click it to make changes.Existing Virtual Service Sets Change Security. Click “ Change Security”  to make changes to the corresponding SSID.
802.11b/g WiFi Module  Access Control List (ACL)Security SettingsEnable access  control list Default is disabled. Choose it to enable items below.Default Access Choose the default access policy is “ Accept”  or “ Reject”Specific Clients Configure specific clients. You can add or delete these clients. Click “ Add”  and a window will pop up. Enter the MAC address and choose the access types (accept or reject). Then click OK to add that MAC Address to the system, or Cancel it.Also, you can delete existed MAC addresses the same way as you add them.Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module  RADIUS ServersSecurity SettingsRADIUS RADIUS can enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.RADIUS  Accounting  Interim  Interval How often should the RADIUS Account function take placeRADIUS NAS Identifier Enter the IP Address of NAS, which is used for accounting.Reauthentication How often should the AP authentication againAdd Used to add RADIUS Server(s). When clicked, a window will pop up. Provide the correct IP Address for RADIUS Server and “ Secret” , then “ OK” .Delete Delete existed RADIUS Server(s).Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module  Change SecuritySecurity SettingsWired Equivalent Privacy (WEP)  Configure WEP security settings. Wired Equivalent Privacy (WEP) is a security protocol, which designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. WEP seeks to establish similar protection to that offered by the wired network's physical security measures by encrypting data transmitted over the WLAN.802.1X Security Configure 802.1X network authentication. 802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority.Wi-Fi Protected Access (WPA) WPA provides improved over-the-air encryption of wireless data. It  was designed to improve upon the security features of WEP.Wi-Fi Protected Access 2 (WPA2) WPA2 provides even more improved over-the-air encryption of wireless data.
802.11b/g WiFi ModuleWEPSecurity SettingUse WEP security  Choose it to enable the WEP function.Pre-shared Key To define the encryption strengthPassphrase Used to generate the keys. Enter a passphrase and click the "Generate Keys" button. You can also enter the keys directly. These keys must match the other wireless stations.Key 1/2/3/4 It is produced after clicking “ Generate Keys” . The stations need these keys to connect this AP.Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module802.1X SecuritySecurity SettingUse 802.1X security Choose it to enable the 802.1X function.Key Size How many bits will be provided to 802.1X. Group Key Rekey Settings Rekey means “ re-generate key” ; You can choose “ No rekeying” , or give an number for rekey by time or by packets.Back Back to the “ Wireless Security Settings” .Wi-Fi Protected Access (WPA)
802.11b/g WiFi ModuleSecurity SettingWi-Fi Protected Access (WPA) You can choose “ Disable WPA security”  or “ Use WPA with pre-shared key”  or “ Use WPA with RADIUS server” .Use WPA with pre-shared key If AP shares a key earlier with stations, enter it below. The key should between 8 and 63 characters.Use WPA with RADIUS server Rekey  means “ re-generate key” ; You can choose “ No rekeying” , or give anumber for rekey by time or by packets. If you want to update group key when station(s) leaves BSS, please choose it. WPA Unicast Encryption Both of AES, TKIP are encryption methods. You can choose to use one of them, or both.Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi ModuleWi-Fi Protected Access 2 (WPA2)Security SettingWi-Fi Protected Access 2 (WPA2) You  can  choose  “ Disable  WPA2 security” , “ Use WPA2 with pre-shared key”  , “ Use WPA2 with RADIUS server”  or “ Use WPA2 with pre-shared key and RADIUS server” .Use WPA2 with pre-shared key If AP  shares a key earlier with stations, enter it below. The key should between 8 and 63 characters.Use WPA2 with RADIUS server Rekey  means  “ re-generate  key” ; You can choose “ No rekeying” , or give anumber for rekey by time or by packets. If you want to update group key when station(s) leaves BSS, please choose it.Use WPA2 with pre-shared key and RADIUS serverIf choose it, give configurations for both of “ pre-shared key”  and “ RADIUS Server” , which is the same as above.WPA2 Unicast Encryption Both of AES, TKIP are encryption methods. You can choose to use one of them, or both.Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module  FirewallFirewallFirewall Default is “ Disable” . You should choose “ Enable”  to make it works.Default policies Accept sends the traffic through; Discard stops the traffic. Input: all traffic with the Access Point as destination; Output: all traffic with the Access Point as origin; Forward: all traffic between LAN and WAN (see Manual) that passes through the Access Point. Once you have set the default policies, you can create rules.Change Change the properties of existed rulesAdd "Chain type" is the direction of traffic. "Rule Number" will be used to identify the rule and the order in which rules are applied.Delete Delete existed rulesAfter clicked “ OK” , a pop window appears like below:
802.11b/g WiFi ModuleFirewall RuleRule Used to identify the rule and the order in which rules are applied.Chain The direction of traffic.Rule enabled Choose it to enable this firewall rule.Target This tells the firewall what to do with the traffic that meets the conditions in this rule. Accept: traffic will be allowed. Drop: traffic will be stopped, with no response to the sender. Reject: traffic will be stopped, and a response will be returned to the sender.Continue: the traffic packet will be counted, and testing will continue with the next rule. Use this if you only want to count packets.Source Address/Mask Enter the IP address for the source. You can enter an address range by giving the network (lowest) address and the net mask. Select the All radio button to choose 'all IP Addresses'.Destination Address/Mask Enter the IP address for the destination. You can enter an address range by giving the network (lowest) address and the net mask. Select the All radio button to choose 'all IP Addresses'.Protocol Select the type of traffic you want to be affected by the rule. If you select TCP or UDP, you can click Advanced to select a specific port number or port number range To set a

Navigation menu