Edgecore Networks SMCWUSBSN4 EZ Connect TM N 150 Mbps Wireless N USB Adapter User Manual SMCWUSBS N4 User maual rev1

Edgecore Networks Corporation EZ Connect TM N 150 Mbps Wireless N USB Adapter SMCWUSBS N4 User maual rev1

SMCWUSBS-N4_User maual_rev1

Download: Edgecore Networks SMCWUSBSN4 EZ Connect TM N 150 Mbps Wireless N USB Adapter User Manual SMCWUSBS N4 User maual rev1
Mirror Download [FCC.gov]Edgecore Networks SMCWUSBSN4 EZ Connect TM N 150 Mbps Wireless N USB Adapter User Manual SMCWUSBS N4 User maual rev1
Document ID1655836
Application IDpPuZ3vrvZvzq/M0+JllgRg==
Document DescriptionSMCWUSBS-N4_User maual_rev1
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize219.02kB (2737756 bits)
Date Submitted2012-03-14 00:00:00
Date Available2012-03-17 00:00:00
Creation Date2011-05-24 11:47:36
Producing SoftwareAcrobat Distiller 9.0.0 (Windows)
Document Lastmod2012-02-08 18:05:40
Document TitleSMCWUSBS-N4_User maual_rev1
Document CreatorFrameMaker 9.0

USER GUIDE
EZ ConnectTM N
150 Mbps Wireless N USB Adapter
SMCWUSBS-N4
EZ ConnectTM N SMCWUSBS-N4
User Guide
No. 1, Creation Road III,
Hsinchu Science Park,
30077, Taiwan, R.O.C.
TEL: +886 3 5770270
Fax: +886 3 5780764
May 2011
SMC-UG-0511-01
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable.
However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or
other rights of third parties which may result from its use. No license is granted by implication or
otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications
at any time without notice.
Copyright © 2011 by
SMC Networks, Inc.
No. 1 Creation Road III,
Hsinchu Science Park,
30077, Taiwan, R.O.C.
All rights reserved
Trademarks:
SMC is a registered trademark; and Barricade, EZ Switch, TigerStack, TigerSwitch, and TigerAccess
are trademarks of SMC Networks, Inc. Other product and company names are trademarks or
registered trademarks of their respective holders.
WARRANTY AND PRODUCT REGISTRATION
To register SMC products and to review the detailed warranty statement,
please refer to the Support Section of the SMC Website at http://
www.smc.com.
– 4 –
COMPLIANCES
FEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct
the interference by one or more of the following measures:
◆
Reorient or relocate the receiving antenna
◆
Increase the separation between the equipment and receiver
◆
Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected
◆
Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) This device may not cause harmful
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate
this equipment.
– 5 –
COMPLIANCES
IMPORTANT NOTE:
FCC RADIATION EXPOSURE STATEMENT
This device has been tested for compliance with FCC RF Exposure (SAR)
limits in the typical laptop computer configuration and this device can be
used in desktop or laptop computers. This device cannot be used with
handheld PDAs (personal digital assistants). This device and its antenna
must not be co-located or operated in conjunction with any other antenna
or transmitter. SAR measurements are based on a 5mm spacing from the
body and that compliance is achieved at that distance.
CE MARK WARNING
This is a class B product. In a domestic environment, this product may
cause radio interference, in which case the user may be required to take
adequate measures.
NATIONAL RESTRICTIONS
This device is intended for home and office use in all EU countries (and
other countries following the EU directive 1999/5/EC) without any
limitation except for the countries mentioned below:
Country
Restriction
Reason/Remark
Bulgaria
None
General authorization required for outdoor use and
public service
France
Outdoor use
limited to 10 mW
e.i.r.p. within the
band 2454-2483.5
MHz
Military Radiolocation use. Refarming of the 2.4 GHz
band has been ongoing in recent years to allow
current relaxed regulation. Full implementation
planned 2012
italy
None
If used outside of own premises, general
authorization is required
Luxembourg
None
General authorization required for network and
service supply(not for spectrum)
Norway
Implemented
This subsection does not apply for the geographical
area within a radius of 20 km from the centre of NyÅlesund
Russian
Federation
None
Only for indoor applications
NOTE: Do not use the product outdoors in France.
– 6 –
ABOUT THIS GUIDE
PURPOSE This guide details the hardware features of the wireless adapter, including
its physical and performance-related characteristics, and how to install the
device and use its configuration software.
AUDIENCE This guide is for PC users with a working knowledge of computers. You
should be familiar with Windows operating system concepts.
CONVENTIONS The following conventions are used throughout this guide to show
information:
NOTE: Emphasizes important information or calls your attention to related
features or instructions.
CAUTION: Alerts you to a potential hazard that could cause loss of data, or
damage the system or equipment.
WARNING: Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication gives basic information on how to install and use
the wireless adapter.
Quick Installation Guide
Also, as part of the wireless adapter’s software, there is online help that
describes all configuration related features.
REVISION HISTORY This section summarizes the changes in each revision of this guide.
MAY 2011 REVISION
This is the first revision of this guide.
– 7 –
ABOUT THIS GUIDE
– 8 –
CONTENTS
WARRANTY AND PRODUCT REGISTRATION
COMPLIANCES
ABOUT THIS GUIDE
CONTENTS
1 INTRODUCTION
11
Overview of the product
11
Features
11
LED Status
12
2 INSTALLATION GUIDE
13
Hardware Installation
13
Software Installation
13
For Windows XP
13
3 CONFIGURATION GUIDE
19
For Windows XP
19
Current Status
20
Profile Management
21
Add or Modify a Configuration Profile
22
Remove a profile
27
Switch another Profile
27
Export a Profile
27
Import a Profile
27
Scan Available Networks
28
Auto Profile Selection Management
28
Diagnostics
30
Check Driver Information
30
Check Receive and Transmit Statistical Information
31
4 WPS CONFIGURATION
32
PBC (Push Button Configuration) Method
– 9 –
33
CONTENTS
PIN Method
35
Enter a PIN into your AP/Router Device
35
Enter the PIN from your AP/Router Device
36
A HARDWARE SPECIFICATIONS
GLOSSARY
38
40
– 10 –
1
INTRODUCTION
OVERVIEW OF THE PRODUCT
The adapter is designed to provide a high-speed and unrivaled wireless
performance for your notebook and PC. With a faster wireless connection,
you can get a better Internet experience, such as downloading, gaming,
video streaming and so on.
The SMCWUSBS-N4’s auto-sensing capability allows high packet transfer
rate of up to 150 Mbps for maximum throughput. The adapter has good
capability on anti-jamming and it can also interoperate with other wireless
(802.11b/g) products. The adapter supports WEP, WPA and WPA2
encryption to prevent outside intrusion and protect your personal
information from being exposed.
The Quick Setup Wizard guides you step by step through the installation
process; the SMC Wireless N Client Utility helps you create a wireless
connection immediately.
With unmatched wireless performance, reception, and security protection,
the SMCWUSBS-N4 is the best choice for easily adding or upgrading
wireless connectivity.
FEATURES
◆
IEEE 802.11g, IEEE 802.11b standards
◆
Supports WPA/WPA2 data security, IEEE 802.1X authentication, TKIP/
AES encryption, WEP encryption
◆
Make use of IEEE 802.11n wireless technology to provide a wireless
data rate of up to 150 Mbps
◆
Automatically adjust to lower speeds due to distance or other operating
limitations
◆
Provides USB interface
◆
Supports Ad Hoc and Infrastructure modes
◆
Good capability on anti-jamming
◆
Supports roaming between access points when configured in
Infrastructure mode
– 11 –
CHAPTER 1 | Introduction
LED Status
◆
Easy to configure and provides monitoring information
◆
Supports Windows 2000, Windows XP 32/64, Windows Vista 32,
Windows 7
LED STATUS
Table 1: LED Indicator
Status
Working Status
Off
The driver has not been installed.
Flashing Slowing
The driver has been installed but there is no data being
transmitted or received.
Flashing Quickly
There is data being transmitted or received.
– 12 –
2
INSTALLATION GUIDE
HARDWARE INSTALLATION
There are two ways to install the Adapter:
1. Plug the Adapter directly to the USB port on your computer.
2. Connect the Adapter and your computer through the USB cable
attached in package.
NOTE: The Found New Hardware Wizard screen will pop up when the
adapter is installed correctly. Click Cancel.
SOFTWARE INSTALLATION
FOR WINDOWS XP The CD-ROM that comes with the package contains the USB driver and
software utility for the Wireless USB Adapter.
The installation screens are similar for Windows 2000, Windows XP,
Windows Vista and Windows 7. The installation interface for Windows XP is
shown in this user guide.
To install the Wireless USB Adapter's driver and utilities for Windows 2000
and Windows XP, follow these steps:
1. Turn on your PC and wait until the Windows system has completely
started.
2. Load the EZ Installation & Documentation CD that comes with the
package. The install program should start automatically.
NOTE: If the install program does not start automatically, double-click My
Computer, and then double-click the CD/DVD drive where the installation
CD was placed. Open the SMCWUSBS-N4 folder and double-click
“Setup.exe.”
3. Click “Install Driver/Utility” to start the installation.
– 13 –
CHAPTER 2 | Installation Guide
Software Installation
Figure 1: Install Driver/Utility
4. Wait for the InstallShield Wizard to start.
Figure 2: Prepare to Install
– 14 –
CHAPTER 2 | Installation Guide
Software Installation
5. When the SMC Client Installation Program starts, click Next to continue.
Figure 3: Install SMC Client Installation Program
6. Select “Install Client Utilities and Driver.” Otherwise, select “Install
Driver Only” to install the driver only. Click Next to continue.
Figure 4: Install Client Utilities and Driver
– 15 –
CHAPTER 2 | Installation Guide
Software Installation
7. To change the destination location for the software, click Browse and
select the new location. Click Next to continue.
Figure 5: Select the Location
8. Select the program folder. Either create a new folder name or select
one from the Existing Folders list. It is recommended to keep the
default setting. Click Next to continue.
Figure 6: Select Program Folder
– 16 –
CHAPTER 2 | Installation Guide
Software Installation
9. Choose the wirelesss configuration tool to use. If you are not sure,
leave the default setting. Click Next to continue.
Figure 7: Choose Configuration Tool
10. Click OK to continue the Installation. Wait for the installation process to
finish.
Figure 8: Installation Processing
NOTE: For Windows XP, the Setup Wizard will notify you of how to proceed
with the installation during these steps (as shown in Figure 9 on page 18).
The drivers have been tested thoroughly, and are able to work with the
operating system. Click “Continue Anyway” to continue the installation.
– 17 –
CHAPTER 2 | Installation Guide
Software Installation
Figure 9: Software Installation Warning
11. When the “InstallShield Wizard Complete” message displays, click
Finish to reboot the system.
Figure 10: Restart Computer
– 18 –
3
CONFIGURATION GUIDE
The SMCWUSBS-N4 can be configured by the SMC Wireless N Client Utility
in Windows XP and 2000. This chapter describes how to configure your
adapter for wireless connectivity on your Wireless Local Area Network
(WLAN) and use the data security encryption features.
The configuration of the adapter in Windows XP is similar with that of
Windows 2000. This User Guide takes Windows XP for example.
FOR WINDOWS XP
After Installing the adapter, the adapter’s tray icon will appear in your
system tray. It appears at the bottom of the screen and shows the signal
strength using color based on the received signal strength indication
(RSSI).
Table 2: Signal Strength System Tray Icon
If the icon is gray, there is no connection.
If the icon is red, there is poor signal strength and the RSSI is
less than 5dB.
If the icon is yellow, there is poor signal strength and the RSSI
is between 5dB and 10dB.
If the icon is partly green, there is good signal strength and the
RSSI is between 10dB and 20dB.
If the icon is all green, there is excellent signal strength and the
RSSI is more than 20dB.
– 19 –
CHAPTER 3 | Configuration Guide
Current Status
Double-click the icon and the SMC Wireles N Client Utility will run. You can
also run the utility by clicking the Start->Program->SMC->SMC Wireles N
Client Utility. The utility provides some integrated and easy tools to:
◆
Display current status information
◆
Edit and add configuration profiles
◆
Display current diagnostics information
The section below introduces these above capabilities.
CURRENT STATUS
The Current Status tab contains general information about the program
and its operations. The Current Status tab does not include any
configuration options.
Figure 11: Current Status
The following table describes the items found on the Current Status screen.
◆
Profile Name - This shows the name of current selected configuration
profile. The configuration of Profiles is described on the Profile
Management tab.
◆
Link Status - Shows if the station is associated to a wireless network.
◆
Wireless Mode - Displays the wireless mode.
◆
Server Based Authentication - Shows if server-based authentication
is used.
◆
IP Address - Displays the computer’s IP address.
◆
Signal Strength - Shows the current strength of the wireless signal.
– 20 –
CHAPTER 3 | Configuration Guide
Profile Management
◆
Network Type - The type of network and the station currently
connected are shown here. The options include:
■
Infrastructure (access point)
■
Ad Hoc
NOTE: You can configure the network type and wireless mode on the
Advanced tab of Profile Management.
◆
Data Encryption - Displays the encryption type the driver is using.
You can configure it on the Security tab of Profile Management.
◆
Control Channel - Shows the currently connected channel.
Click Advanced on the screen above, you can see advanced information
about the program and its operations.
PROFILE MANAGEMENT
Click the Profile Management tab of the wireless configuration utility and
the screen shown in Figure 12 on page 22 will appear. The Profile
Management screen provides tools to:
◆
Add a new profile
◆
Modify a profile
◆
Remove a profile
◆
Activate a profile
◆
Import a profile
◆
Export a profile
◆
Scan available networks
◆
Order profiles
– 21 –
CHAPTER 3 | Configuration Guide
Profile Management
Figure 12: Profile Management Tab
ADD OR MODIFY A To add a new configuration profile, click New on the Profile Management
CONFIGURATION tab. To modify a configuration profile, select the configuration profile from
PROFILE the profile list and click Modify. Then you will see the Management dialog
box (shown in Figure 13 on page 23).
EDIT THE GENERAL TAB
◆
Profile Name - Enter a name that identifies the configuration profile.
This name must be unique. Note that the profile names are not casesensitive.
◆
Client Name - Enter the profile name that identifies the client
machine.
◆
Network Names (SSIDs) - Enter the IEEE 802.11 wireless network
name. This field has a maximum limit of 32 characters.
– 22 –
CHAPTER 3 | Configuration Guide
Profile Management
Figure 13: Profile Tab - General
EDIT THE SECURITY TAB
Select the Security tab in the screen above, then you can edit the fields to
configure the profile.
Figure 14: Profile Tab - Security
To define the security mode, select the radio button of the desired security
mode as follows:
◆
WPA/WPA2: Wi-Fi Protected Access
– 23 –
CHAPTER 3 | Configuration Guide
Profile Management
◆
WPA/WPA2 Passphrase: Wi-Fi Protected Access Passphrase
◆
802.1x: Enables 802.1X security.
◆
Pre-Shared Key (Static WEP): Enables the use of shared keys that
are defined on both the access point and the station. To define shared
encryption keys, choose the Shared Key radio button and click
Configure to fill in the Define Shared Keys window (shown in Figure 15
on page 24).
◆
None: No security (not recommended).
NOTE: If the access point to which the adapter is associated has WEP set
and the client has WEP enabled, make sure that “Allow Association to
Mixed Cells” is checked on the Security tab to allow association. To
complete WEP encryption configuration, you must select the 802.11
Authentication Mode as appropriate on the Advanced tab of this Profile
Management dialog.
To configure the Encryption Keys under the Pre-Shared keys (Static WEP)
Security mode:
Figure 15: Profile Tab - Security (Static WEP)
NOTE: When you select different security options, the configuration is
different, you can then configure the exact keys as needed.
– 24 –
CHAPTER 3 | Configuration Guide
Profile Management
EDIT THE ADVANCED TAB
This screen allows you to make advanced configurations for a profile.
Figure 16: Profile Tab - Advanced
◆
◆
Power Save Mode - Select the power save mode from the drop-down
list.
■
Maximum - Selects maximum mode to let the access point buffer
incoming messages for the adapter. The adapter will detect the
access point if any messages are waiting periodically.
■
Normal - Normal mode uses maximum when retrieving a large
number of packets, then switches back to power save mode after
retrieving the packets.
■
Off - Turns power saving off, thus powering up the Wireless USB
Adapter continuously for a short message response time.
Network Type - There are basically two modes of networking:
■
Infrastructure - All wireless clients will connect to an access point or
wireless router.
■
Ad Hoc - Directly connects to another computer for peer-to-peer
communication using wireless network adapters on each computer,
such as two or more SMCWUSBS-N4 wireless adapters.
NOTE: An Infrastructure network contains an access point or wireless
router. All wireless devices or clients connect to the wireless router or
access point.
– 25 –
CHAPTER 3 | Configuration Guide
Profile Management
NOTE: An Ad Hoc network contains only clients, such as laptops with
wireless desktop adapters. All the adapters must be in Ad Hoc mode to
communicate.
Restricted by local law regulations, version for North America does not
have region selection.
◆
Wireless Mode - Specifies 2.4 GHz 150 Mbps, 2.4 GHz 54 Mbps or
2.4 GHz 11 Mbps operation in an access point network. The wireless
adapter must match the wireless mode of the access point with which it
associates.
◆
Wireless Mode when Starting an Ad Hoc Network - Specifies
2.4 GHz 54/11 Mbps to start an Ad Hoc network if no matching network
name is found after scanning all available modes. This mode also allows
the selection of the channel that the wireless adapter uses. The
channels available depend on the regulatory domain. If the adapter
finds no other ad hoc adapters, the channel that the adapter starts the
ad hoc network with will be selected automatically. The adapter must
match the wireless mode and channel of the clients to which it
associates.
◆
802.11 Authentication Mode - Select which mode the adapter uses
to authenticate to an access point:
■
Auto - Automatic causes the adapter to attempt authentication
using “Shared,” but switches it to “Open” authentication if shared
fails.
■
Open - Open System enables an adapter to attempt authentication
regardless of its WEP settings. It will only associate with the access
point if the WEP keys on both the adapter and the access point
match.
■
Shared - Shared-key only allows the adapter to associate with
access points that have the same WEP key.
For infrastructure (access point) networks, click Preferred APs to specify
four access points at most to which the client adapter that attempts to be
associated. The four access points have different priorities; the first has the
higher priority.
Figure 17: Preferred Access Point
– 26 –
CHAPTER 3 | Configuration Guide
Profile Management
REMOVE A PROFILE 1. Go to the Profile Management tab (shown in Figure 12 on page 22).
2. Select the profile name in the Profiles List.
3. Click Remove.
NOTE: The current profile being used cannot be removed.
SWITCH ANOTHER 1. Go to the Profile Management screen (shown in Figure 12 on page 22).
PROFILE
2. Select the profile name required in the Profiles List.
3. Click Activate.
EXPORT A PROFILE 1. From the Profile Management screen (shown in Figure 12 on page 22),
highlight the profile to export.
2. Click Export, the Export Profile window will then appear.
3. Browse and select the folder to where you want to export the profile.
4. Click Save. The profile should then be exported to the specified
location.
Figure 18: Export a Profile
IMPORT A PROFILE 1. From the Profile Management screen (shown in Figure 12 on page 22),
click Import. The Import Profile will appear.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open. The imported profile then appears in the Profiles List.
– 27 –
CHAPTER 3 | Configuration Guide
Profile Management
Figure 19: Import a Profile
SCAN AVAILABLE 1. Click Scan on the Profile Management screen (shown in Figure 12 on
page 22), the Available Infrastructure and Ad Hoc Networks window will
NETWORKS
appear.
2. Click Refresh to refresh the list at any time.
3. Highlight a network name and click Activate to connect to an available
network. If no configuration profile exists for that network, the Profile
Management window will open the General tab screen. Fill in the Profile
name and click OK to create the configuration profile for that network.
Figure 20: Scan Available Networks
AUTO PROFILE The auto selection feature allows the adapter to automatically select a
SELECTION profile from the list of profiles and use it to connect to the network. To add
MANAGEMENT a new profile into the Auto Selected Profiles list, follow these steps.
1. On the Profile Management screen (shown in Figure 12 on page 22),
click Order Profiles.
2. The Auto Profiles Selection management window will appear (shown in
Figure 21 on page 29) with a list of all created profiles in the Available
Profiles.
– 28 –
CHAPTER 3 | Configuration Guide
Profile Management
Figure 21: Auto Selection Management
3. Highlight the profiles to add to auto profile selection, and click Add. The
profile will appear in the Auto Selected Profiles box.
4. Highlight a profile in the Auto Selected Profiles box.
5. Click Move Up or Move Down as appropriate.
NOTE: The first profile in the Auto Selected Profiles box has highest priority,
while the last profile has the lowest priority.
6. Click OK.
7. Check the Auto Select Profiles checkbox on the Profile Management tab
(shown in Figure 12 on page 22).
NOTE: When auto profile selection is enabled by checking Auto Select
Profiles on the Profile Management tab, the client adapter will scan for an
available network. The profile with the highest priority and the same SSID
as one of the found networks will be used to connect to the network. If the
connection fails, the client adapter will try the next highest priority profile
that matches the SSID until an available network is found.
– 29 –
CHAPTER 3 | Configuration Guide
Diagnostics
DIAGNOSTICS
The Diagnostics tab of the SMC Wireless Lite-N Client Utility provides
buttons used to retrieve receiving and transmitting statistics. The
Diagnostics tab does not require any configuration.
The Diagnostics tab lists the following receiving and transmitting
diagnostics for frames received or transmitted by the wireless network
adapter:
◆
Multicast frames transmitted and received
◆
Broadcast frames transmitted and received
◆
Unicast frames transmitted and received
◆
Total bytes transmitted and received
Figure 22: Diagnostics Tab
CHECK DRIVER Click the Adapter Information button in the screen above, you will see the
INFORMATION adapter information, including general information about the wireless
network adapter and the Network Driver Interface Specification (NDIS)
driver. Access the adapter information from the Diagnostics tab.
◆
Card Name - The name of the wireless network adapter.
◆
MAC Address - The MAC address of the wireless network adapter.
◆
Driver - The driver name and path of the wireless network adapter
driver.
◆
Driver Version - The version of the wireless network adapter driver.
◆
Driver Date - The creation date of the wireless network adapter driver.
– 30 –
CHAPTER 3 | Configuration Guide
Diagnostics
◆
Client Name - The name of the client computer.
CHECK RECEIVE AND The Advanced Statistics show receiving and transmitting statistical
TRANSMIT information about the following receiving and transmitting diagnostics for
STATISTICAL frames received by or transmitted to the wireless network adapter.
INFORMATION Figure 23: Advanced Statistics
– 31 –
4
WPS CONFIGURATION
The WPS (Wi-Fi Protected Setup) function allows you to add a new wireless
device to an existing network quickly.
NOTE: The WPS function is not supported in Windows 7.
If the wireless card supports Wi-Fi Protected Setup (WPS), you can
establish a wireless connection between wireless card and router using
either the Push Button Configuration (PBC) method or PIN method.
First, the WPS software should be installed. Follow these steps:
1. Insert the Resource CD into your CD-ROM drive.
2. Double-click My Computer, and then double-click the CD/DVD drive
where the installation CD was placed.
3. Open the SMCWUSBS-N4 folder, and double-click “wps.exe.” The
following figure (Figure 24) displays.
Figure 24: Prepare to Install WPS
4. Follow the step-by-step instructions to complete the WPS installation.
When completed, the WPS function can be enabled. The following sections
describe the two ways to use WPS.
– 32 –
CHAPTER 4 | WPS Configuration
PBC (Push Button Configuration) Method
PBC (PUSH BUTTON CONFIGURATION) METHOD
1. Press the WPS button of the AP/router. There are two ways:
a. Press the WPS button directly on the front panel of the AP/router, as
shown in Figure 25.
Figure 25: WPS Button
WPS
b. Open the AP/router’s web-based utility and click the WPS link on the
main menu. Figure 26 will display. Click Add device, then Figure 27
displays. Select “Press the button of the new device in two minutes”
and click Connect.
Figure 26: WPS Setup
Figure 27: Add a New Device
2. Press the WPS button of the adapter. There are two ways:
a. Press and hold the WPS button of the adapter directly for 2 or 3
seconds.
b. Double-click the WPS icon on the desktop to open the WPS utility.
You will see the welcome screen, as shown in Figure 28. Click Next
to continue, then select “Push the button on my access point” in the
next screen (Figure 29) and click Next.
– 33 –
CHAPTER 4 | WPS Configuration
PBC (Push Button Configuration) Method
Figure 28: Start to Install WPS
Figure 29: Select the Method
– 34 –
CHAPTER 4 | WPS Configuration
PIN Method
3. Wait until the following figure appears. Click Finish to complete the WPS
configuration.
Figure 30: WPS Configuration Completed
PIN METHOD
There are two ways to configure the WPS by PIN method:
1. Enter a PIN into your AP/router device.
2. Enter the PIN from your AP/router device.
The detailed configuration procedures for each method follows.
ENTER A PIN INTO 1. Double-click the WPS icon on the desktop to open the WPS Utility. You
will see the welcome screen, as shown in Figure 28 on page 34.
YOUR AP/ROUTER
DEVICE
2. Click Next to continue. The “Join a Wireless Network” screen displays,
as shown in Figure 31 on page 36.
3. Select the second option, “Enter a PIN into my access point or a
registrar.” You will see the PIN value of the adapter displayed, which is
randomly generated. Click Next.
– 35 –
CHAPTER 4 | WPS Configuration
PIN Method
Figure 31: Enter a PIN into the Access Point
4. Open the AP/router’s web-based utility and click the WPS link on the
main menu. Then the Figure 26 on page 33 will appear.
5. Click Add device. The screen in Figure 32 appears.
Figure 32: Enter the device’s PIN
6. Select Enter the new device’s PIN and enter the PIN value of the
adapter, click Connect.
7. When Figure 29 on page 34 appears, the WPS configuration is
complete.
ENTER THE PIN FROM 1. Open the WPS Utility. You will see the welcome screen, as shown in
Figure 28 on page 34.
YOUR AP/ROUTER
DEVICE
2. Click Next to continue. The “Join a Wireless Network” screen displays,
as shown in Figure 33 on page 37.
3. Select the third option, “Enter the PIN from my access point.” Then
enter the PIN value, which is labeled on the bottom of the AP/router.
Click Next.
– 36 –
CHAPTER 4 | WPS Configuration
PIN Method
Figure 33: Enter the PIN from the Access Point
4. When the screen in Figure 34 appears, the WPS configuration is
complete.
Figure 34: WPS Configuration Complete
NOTE: If you generate a new PIN code for your router, enter the new one
instead.
– 37 –
A
HARDWARE SPECIFICATIONS
INTERFACE USB 2.0 Interface
STANDARDS IEEE 802.11n
IEEE 802.11g
IEEE 802.11b
OPERATING SYSTEM Windows 2000
Windows XP
Windows Vista
Windows 7
RADIO DATA RATE 11n: up to 150 Mbps
11g: 6/9/12/18/24/36/48/54 Mbps
11b: 1/2/5.5/11 Mbps
MODULATION 11n: QPSK, BPSK, 16-QAM, 64-QAM
11b: CCK, QPSK, BPSK
11g: OFDM
MEDIA ACCESS CSMA/CA with ACK
PROTOCOL
DATA SECURITY WPA/WPA2
64/128/152-bit WEP
TKIP/AES
FREQUENCY 2.4 ~ 2.4835 GHz
SPREAD SPECTRUM Direct Sequence Spread Spectrum (DSSS)
SAFETY & EMISSIONS FCC, CE
– 38 –
APPENDIX A | Hardware Specifications
TEMPERATURE Operating: 0 °C to 40 °C (32 °F to 104 °F)
Storage: -40 °C to 70 °C (-40 °F to 158 °F)
HUMIDITY Operating: 10% to 90% RH (non-condensing)
Storge: 5%-90% RH (non-condensing)
– 39 –
GLOSSARY
IEEE 802.11B The 802.11b standard specifies wireless product networking at 11 Mbps
using direct-sequence spread-spectrum (DSSS) technology and operating
in the unlicensed radio spectrum at 2.4 GHz. It supports WEP encryption
for security. All 802.11 networks are also referred to as Wi-Fi networks.
IEEE 802.11G The specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology, using OFDM modulation and
operating in the unlicensed radio spectrum at 2.4 GHz. Includes backward
compatibility with IEEE 802.11b devices and WEP encryption for security.
AD HOC NETWORK An ad hoc network is a group of computers, each with a wireless adapter,
connected as an independent 802.11 wireless LAN. Ad hoc wireless
computers operate on a peer-to-peer basis, communicating directly with
each other without the use of an access point. Ad hoc mode is also referred
to as an Independent Basic Service Set (IBSS) or as peer-to-peer mode,
and is useful at a departmental scale or SOHO operation.
DSSS (DIRECT- DSSS generates a redundant bit pattern for all data transmitted. This bit
SEQUENCE SPREAD pattern is called a chip (or chipping code). Even if one or more bits in the
SPECTRUM) chip are damaged during transmission, statistical techniques embedded in
the receiver can recover the original data without the need of
retransmission. To an unintended receiver, DSSS appears as low power
wideband noise and is rejected (ignored) by most narrowband receivers.
However, to an intended receiver (that is, another wireless LAN endpoint),
the DSSS signal is recognized as the only valid signal, and interference is
inherently rejected (ignored).
FHSS (FREQUENCY FHSS continuously changes (hops) the carrier frequency of a conventional
HOPPING SPREAD carrier several times per second according to a pseudo-random set of
SPECTRUM) channels. Because a fixed frequency is not used, and only the transmitter
and receiver know the hop patterns, interception of FHSS is extremely
difficult.
– 40 –
GLOSSARY
INFRASTRUCTURE An infrastructure network is a group of computers or other devices, each
NETWORK with a wireless adapter, connected as an 802.11 wireless LAN. In
infrastructure mode, the wireless devices communicate with each other
and to a wired network by first going through an access point. An
infrastructure wireless network connected to a wired network is referred to
as a Basic Service Set (BSS). A set of two or more BSS in a single network
is referred to as an Extended Service Set (ESS). Infrastructure mode is
useful at a corporation scale, or when it is necessary to connect the wired
and wireless networks.
SPREAD SPECTRUM Spread Spectrum technology is a wideband radio frequency technique
developed by the military for use in reliable, secure, mission-critical
communications systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more bandwidth is
consumed than in the case of narrowband transmission, but the trade off
produces a signal that is, in effect, louder and thus easier to detect,
provided that the receiver knows the parameters of the spread-spectrum
signal being broadcast. If a receiver is not tuned to the right frequency, a
spread-spectrum signal looks like background noise. There are two main
alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency
Hopping Spread Spectrum (FHSS).
SSID A Service Set Identification is a thirty-two character (maximum)
alphanumeric key identifying a wireless local area network. For the wireless
devices in a network to communicate with each other, all devices must be
configured with the same SSID. This is typically the configuration
parameter for a wireless PC card. It corresponds to the ESSID in the
wireless access point and to the wireless network name. See also Wireless
Network Name and ESSID.
WEP (WIRED A data privacy mechanism based on a 64-bit, 128-bit, or 152-bit shared
EQUIVALENT PRIVACY) key algorithm, as described in the IEEE 802.11 standard. To gain access to
a WEP network, you must know the key. The key is a string of characters
that you create. When using WEP, you must determine the level of
encryption. The type of encryption determines the key length; 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined
by entering a string in HEX (hexadecimal - using characters 0-9, A-F) or
ASCII (American Standard Code for Information Interchange –
alphanumeric characters) format. The ASCII format is provided so you can
enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can
change keys easily.
WI-FI A trade name for the 802.11b wireless networking standard, given by the
Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net),
an industry standards group promoting interoperability among 802.11b
devices.
– 41 –
GLOSSARY
WLAN (WIRELESS A group of computers and associated devices communicate with each other
LOCAL AREA NETWORK) wirelessly, which serves network users in a limited local area.
WPA (WI-FI PROTECTED A wireless security protocol that uses TKIP (Temporal Key Integrity
ACCESS) Protocol) encryption, which can be used in conjunction with a RADIUS
server.
– 42 –
Headquarters &
Sub-Sahara Africa Office
No. 1, Creation Rd. III
Hsinchu Science Park
Taiwan 30077
Tel: +886 3 5770270
Fax: +886 3 5780764
Asia-Pacific Office
1 Coleman Street
#07-09, The Adelphi
Singapore 179803
Tel: +65-63387667
Fax: +65-63387767
SMC NETWORKS TECHNICAL SUPPORT
From Singapore in English and
Tel: +65-63387667, Ext. 4
(Mon.-Fri. 9 AM to 5 PM)
From the United Arab Emirates in English (Sun.-Thu. 9 AM to 6 PM)
Tel: +971 800 222866/+971 4 3564810
From U.S.A. and Canada (24 hours a day, 7 days a week)
Tel: +1 (800) SMC-4-YOU/+1 (949) 679-8000 Fax: +1 (949) 679-1481
(for Asia-Pacific): Technical Support information at www.smc-asia.com
(for Middle East): Technical Support information at muneer@smc-asia.com
Europe & N. Africa Office
C/Fructuós Gelabert 6-8, 2o, 2a
Edificio Conata II
08970 Sant Joan Despí
Barcelona, Spain
Tel: +34 93 477 4920
Middle East Office
Office No. 416, Le Solarium Bldg
Dubai Silicon Oasis
Dubai, U.A.E.
Tel: +971-4-3564800
Fax:+971-4-3564801
North America Office
20 Mason
Irvine CA 92618 U.S.A.
Tel: +1 (949) 679-8000
www.smcnetworks.co.kr
SMCWUSBS-N4
www.edge-core.com / www.smc.com

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Page Mode                       : UseOutlines
XMP Toolkit                     : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39
Format                          : application/pdf
Title                           : 
Creator                         : 
Create Date                     : 2011:05:24 11:47:36Z
Creator Tool                    : FrameMaker 9.0
Modify Date                     : 2012:02:08 18:05:40+08:00
Metadata Date                   : 2012:02:08 18:05:40+08:00
Producer                        : Acrobat Distiller 9.0.0 (Windows)
Document ID                     : uuid:56dc75fe-22ab-41e1-9b67-17876fdc4522
Instance ID                     : uuid:d27eda60-f4d7-4465-9902-fe218a2cf6ab
Page Count                      : 43
Author                          : 
EXIF Metadata provided by EXIF.tools
FCC ID Filing: YZKSMCWUSBSN4

Navigation menu