Ericsson LG WP-1000N WIRELESS PCI ADAPTER User Manual 3 of 4

Ericsson-LG Co., Ltd. WIRELESS PCI ADAPTER 3 of 4

User manual 3 of 4

Download: Ericsson LG WP-1000N WIRELESS PCI ADAPTER User Manual 3 of 4
Mirror Download [FCC.gov]Ericsson LG WP-1000N WIRELESS PCI ADAPTER User Manual 3 of 4
Document ID1072294
Application IDOy+431F0hoJLxNooRjTcvg==
Document DescriptionUser manual 3 of 4
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize267.71kB (3346347 bits)
Date Submitted2009-02-24 00:00:00
Date Available2009-02-24 00:00:00
Creation Date2008-03-03 17:14:33
Producing SoftwareAcrobat Distiller 7.0.5 (Windows)
Document Lastmod2008-03-03 17:15:01
Document TitleMicrosoft Word - Wireless IEEE 802.11n Adapter User's Manual.-V1.doc
Document CreatorPScript5.dll Version 5.2
Document Author: 092010

or external Registrar supports the configuration setup using PIN configuration method or PBC
configuration setup using PIN configuration method or PBC configuration method through an
internal or external Registrar.
WPS AP List: Display the information of surrounding APs with WPS IE from last scan result.
List information includes SSID, BSSID, Channel, ID (Device Password ID), Security-Enabled.
Rescan: Issue a rescan command to wireless NIC to update information on surrounding
wireless network.
Information: Display the information about WPS IE on the selected network. List Information
includes Authentication Type, Encryption Type, Config Methods, Device Password ID,
Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands.
PIN Code: 8-digit numbers. It is required to enter PIN Code into Registrar using PIN method.
Each NIC Wireless has only one PIN Code of Enrollee.
Config Mode: Our station role-playing as an Enrollee or an external Registrar.
WPS Profile List: Display all of credentials got from the Registrar. List information includes
SSID, MAC address, Authentication and Encryption Type. If STA Enrollee, credentials are
created as soon as each WPS success. If STA Registrar, RaUI creates a new credential with
WPA2-PSK/AES/64Hex-Key and doesn’t change until next switching to STA Registrar.
Control items on WPS Profile List:
Î Detail: Information about Security and Key in the credential
Î Connect: Command to connect to the selected network inside credentials. The active
selected credential is as like as the active selected Profile.
Î Rotate: Command to rotate to connect to the next inside credentials
Î Disconnect: Stop WPS action and disconnect this active link. And then select the last
profile at the Profile Page of RaUI if exist. If there is an empty profile page, the driver will
select any non-security AP.
Î Delete: Delete an existing credential. And then select the next credential if exist. If
there is an empty credential, the driver will select any non-security AP.
PIN: Start to add to Registrar using PIN configuration method. IF STA Registrar, remember
that enter PIN Code read from you Enrollee before starting PIN.
PBC: Start to add to AP using PBC configuration method.
★ When you click PIN or PBC, please don’t do any rescan within two-minute
connection. If you want to abort this setup within the interval, restart PIN/PBC or
press Disconnect to stop WPS connection.
WPS associate IE: Send the association request with WPS IE during WPS setup. It is optional
for STA.
WPS probe IE: Send the probe request with WPS IE during WPS setup. IT is optional for STA.
Progress Bar: Display rate of progress from Start to Connected status.
Status Bar: Display currently WPS Status.
44
[WPS Information on AP]
WPS information contain authentication type, encryption type, config methods, device
password ID, selected registrar, state, version, AP setup locked, UUID-E and RF bands.
Authentication Type: There are three types of authentication modes supported by RaConfig.
There are Open, Shared, WPA-PSK, and WPA system.
Encryption Type: For Open and shared authentication mode, the selection of encryption are
None and WEP. For WPA, WPA2, WPA-PSK, and WPA2-PSK authentication mode, the
encryption type supports both TKIP and AES.
Config Methods: Correspond to the methods the AP supports as an Enrollee for adding
external Registrars. (A bitwise OR of values)
45
Device Password ID: Indicate the method or identifies the specific password that the selected
Registrar intends to use. AP in PBC mode must indicate 0x0004 within two-minute Walk time.
Selected Registrar: Indicate if the user has recently activated a Registrar to add an Enrollee.
The values are “TRUE” and “FALSE”
State: The current configuration state on AP. The value are “Unconfigured” and “Configured”.
Version: WPS specified version.
AP Setup Locked: Indicate if AP has entered a setup locked state.
UUID-E: The universally unique identifier (UUID) element generated by the Enrollee. There is
a value. It is 16 bytes.
RF-Bands: Indicate All RF bands available on the AP. A dual-band AP must provide it. The
values are “2.4GHz” and “5GHz”
3.1.8 About
About function display the wireless card and driver version information.
(1) Connect to Ralink’s Website: WWW.RALINKTECH.COM
(2) Display Configuration Utility, Driver, and EEPROM version information
(3) Display Wireless NIC MAC Address.
46
3.1.9 Link Status
Link Status displays the detail information current connection
Status: Current connection status. If no connection, it will show Disconnected. Otherwise, the
SSID and BSSID will show here.
Extra Info: Display link status in use.
Channel: Display current channel in use.
Authentication: Authentication mode in use.
Encryption: Encryption type in use.
Network Type: Network type in use.
IP Address: IP address about current connection.
Sub Mask: Sub Mast about current connection.
Default Gateway: Default gateway about current connection.
Link Speed: Show current transmit rate and receive rate.
Throughout: Display transmits and receive throughput in unit of Mbps.
Link Quality: Display Connection quality based on signal strength and Tx/Rx packet error
rate.
Signal Strength 1: Receive signal strength 1, user can choose to display as percentage or
dBm format.
Signal Strength 2: Receive signal strength 2, user can choose to display as percentage or
dBm format.
Signal Strength 3: Receive signal strength 3, user can choose to display as percentage or
dBm format.
Noise Strength: Display noise signal strength.
HT: Display current HT Status in use, containing BW, GI, MCS, SNR0, and SNR1 value.
(Show the information only for 802.11n wireless card)
47
3.1.10 Enable AP Mode Feature in Windows 2000 OS
In Windows 2000 Operation System, the local network won’t be automatically established
while using Wireless PCI adapter’s AP mode. Please follow the below steps to enable Internet
Connection Sharing feature first before you switch Wireless PCI adapter’s AP mode.
Step 1: After the Wireless PCI Adapter is installed properly in Windows 2000 Operation
System, go to Start Î Settings Î Control Panel Î Choose “Network and Dial-up
Connections” option. Right-Click your local area connection (such as another LAN Card in the
same computer), and choose “Properties”.
Step 2: In “Sharing” tab, enable Internet Connection Sharing for this connection and click
“OK”
48
Step 3: Back to Network and Dial-up Connection screen, right-click “Local Area Connection
2” (for 802.11n Wireless LAN card) and choose “Properties”.
Step 4: Select “Internet Protocol (TCP/IP)” and click “Properties”. You will see 802.11n
Wireless PCI adapter will be automatically assigned an IP address as Access Point.
Step 5: In the System tray, now you can switch 802.11n Wireless PCI Adapter to AP Mode.
49
Step 6: After switch to AP mode, Ralink Wireless Utility will automatically pup-up. The
Wireless Default SSID is assigned as “SoftAP-56”.
Step 7: To make sure your Soft AP is working properly, you need to use another computer
which with Wireless LAN feature to access SoftAP-56 AP. In the below example, use another
PC with Wireless feature in Vista Operation System. Go to Start Î Control Panel Î Choose
“Network and Sharing Center” option Î Click “Connect to a network” to search the
available networks.
50
Step 8: Select the network “SoftAP-56” and click “Connect” to establish the connection.
Step 9: After the computer is successful connected to SoftAP-56, Network and Sharing Center
screen will be shown as below. Click “View Status” to see the detail.
51
Step 10: In General tab, click “Detail…”, and then you can see the current Network connection
details. If this computer is successful connect to SoftAP-56 Access Point, the DHCP server will
be assigned to same IP address.
52
3.2 For Windows Vista
Ralink wireless utility is shown as below. There are 6 settings pages in Ralink wireless
utility:
„
Profile Page: Manage the profile.
„
Link Status Page: Display current connection information.
„
Site Survey Page: Display the available networks.
„
Statistics Page: Display the packet counters
„
WPS Configuration Page: Connect to WPS (Wi-Fi Protected Setup) capable APs.
„
QoS Page: It involves “WMM Enable”, “WMM – Power Save Enable” and DLS
setup
„
About Page: Display Ralink driver and utility information.
3.2.1 Profile
In the “Profile”, you can view and manage the current using Available Point(s). You can
Add, Delete, Edit, or Activate the current Available Point(s). Also you can duplicate the AP or
set current AP as Default.
53
Profiles Name: The Profiles List displays all the profiles and the relative settings of the profiles
including Profile Name, SSID, and Channel…etc; preset to PROF* (* indicate 1,2,3,…)
SSID: AP to Ad-hoc name.
Channel: Channel in use for Ad-Hoc mode.
Authentication: Authentication mode.
Encryption: Security algorithm in use.
Network Type: Network’s type, includes Infrastructure and Ad-hoc.
Indicate connection is successful on currently activated profile.
Indicate connection is failed on currently activate profile.
Add/Delete/Edit Button: Click these buttons to add/delete/edit the selected profiles.
Activate Button: Click ”Activate” to connect the selected profile. When a profile is activated,
the adapter will be initially connected to the profile.
54
3.2.1.1
Add a profile
By either pushing the “Add” button on Profile Page or the “Add to Profile” button on Site
Survey Page, it brings up the profile setting sheet which contains two setting pages -“Configuration” page and “Authentication and Security” page.
55
[Configuration page]
„
Profile Name: Name of the profile
„
SSID: Name of the desire network
„
Network Type: Network of the desired network, either infrastructure or Ad-Hoc.
Infrastructure – This operation mode requires the presence of a wireless Access
Point. All communication is done via the Access Point or Router.
Ad-Hoc – Select this mode if you want to connect to another wireless station in the
Wireless LAN network without through an Access Point or Router.
„
Tx-Power: The desired TX power level; the available options are 100%, 75%, 50%
and Auto. If you want to lower the transmit power of the adapter for saving the power
of the system, you can select the lower percentages from the list. The lower power
will cause the lower signal strength and the coverage range.
56
[Authentication and Security page]
„
Authentication Type: The authentication of the desired network. For infrastructure
network, the available modes are Open, Shared, WPA, WPA-PSK, WPA2, and
WPA2-PSK.
Open: No authentication is needed among the wireless devices.
Shared: Only Wireless device using a shared key (WEP Key identified) is allowed
to connecting each other. Setup the same key as the wireless device that the
adapter intends to connect.
WPA: WPA provides a scheme of mutual authentication using either IEEE
802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key
(PSK) technology. It provides a high level of assurance to enterprise, small
business and home users that data will remain protected and that only authorized
users may access their networks. For enterprises that have already deployed IEEE
802.1x authentication, WPA offers the advantage of leveraging existing
authentication databases and infrastructure.
WPA-PSK – It is a special mode designed for home and small business users who
do not have access to network authentication servers. In this mode, known as
Pre-Shared Key, the user manually enters the starting password in their access
point or gateway, as well as in each wireless station in the network. WPA-PSK
takes over automatically from that point, keeping unauthorized users that don’t
have the matching password from joining the network, while encrypting the data
traveling between authorized devices.
57
WPA2 – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK
technology. It also includes a new advanced encryption mechanism using the
Advanced Encryption Standard (AES). AES is required to the corporate user or
government users. The different between WPA and WPA2 is that WPA2 provides
data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol
(TKIP).
WPA2-PSK – WPA2-PSK is also for home and small business. The difference
between WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption
via the AES. In contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP).
„
Encryption: The encryption of the desired network.
-- For Open and Shared authentications, the available encryption modes are
None and WEP.
-- For WPA, WPA-PSK, WPA2 and WPA2-PSK authentications, the available
modes are TKIP and AES.
None – Disable the Encryption mode.
WEP – Enabled the WEP Data Encryption. When the item is selected, you have to
continue setting the WEP Key Length & the key Index.
TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every
10000 packets (a packet is a kind of message transmitted over a network). This
insures much greater security than the standard WEP security.
AES – AES has been developed to ensure the highest degree of security and
authenticity for digital information and it is the most advanced solution defined by
IEEE 802.11i for the security in the wireless network.
Note: All devices in the network should use the same encryption method to ensure
the communication.
„
WPA Pre-Shared Key: The WPA-PSK key can be from 8 to 64 characters and can
be letters or numbers. This same key must be used on all of the wireless stations in
the network.
„
WEP Key (Key1~Key4): The WEP keys are used to encrypt data transmitted in the
wireless network. There are two types of key length: 64-bit & 128-bit. Select the
default encryption key form key1 to key4 by selected the radio button.
Fill the text box by following the rule below:
64-bit – Input 10-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 5-digit
ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example:
“0123456aef” or “test1”
128-bit – Input 26-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 13-digit
ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example:
“01234567890123456789abcdef” or “administrator”.
58
3.2.1.2
Edit a profile
Selecting an exiting profile then clicking the “Edit” button on Profile Page brings up the
profile setting sheet filled with the profile information for user modification.
3.2.1.3
Delete a profile
Selecting an exiting profile then clicking the “Delete” button on Profile Page to deletes the
profile.
59
3.2.1.4
Active a profile
Selecting an exiting profile then clicking the “Active” button on Profile Page activates the
profile.
60
3.2.2 Link Status
In this section, you can immediately monitor the current connected link status, such as
Link Speed, Throughput, Link Quality, Signal Strength, Noise Level …etc.
Status: Current connection status. If no connection, it will show Disconnected. Otherwise, the
SSID and BSSID will show here.
Extra Info: Display the link status and current channel in use.
Channel: Display the number of the radio channel and the frequency used for the networking.
Link Speed (Mbps): Display the transmission and reception rate of the network. The
maximum transmission rate is 54Mbps.
Throughput (Kbits/sec): Display transmits and receives throughout in unit of K bits/sec.
Link Quality: Display connection quality based on signal strength and TX/RX packet error
rate.
dBm: If you want to know the signal strength in the unit of dBm, select the check box.
Signal Strength: Receive signal strength, user can choose to display as percentage or dBm
format.
Signal Strength2: Receive signal strength 2, user can choose to display as percentage or
dBm format.
61
Noise Level: Display the noise signal strength.
HT: Display current HT status in use, containing BW, GI, MCS, SNR0, and SNR1 value. (show
the information only for 802.11n wireless card.)
3.2.3 Site Survey
When you open the Configuration Utility, the system will scan all the channels to find all
the access points/stations within the accessible range of your adapter and automatically
connect to the wireless device with the highest signal strength. From the “Site Survey”, all the
network nearby will be listed. You can change the connection to another network or add one of
the networks to your own profile list.
SSID: Name of BBS of IBSS network.
BSSID: MAC address of AP or randomly generated of IBSS.
Signal: Receive signal strength of specified network.
Channel: Channel in use.
Encryption: Encryption algorithm used within than BBS or IBSS. Valid value includes WEP,
TKIP, AES, and Not Use.
Authentication: Authentication mode used within then network, including Unknown,
62
WPA-PSK, WPA2-PSK, WPA and WPA2.
Network Type: Network type in use, Infrastructure or Ad-Hoc.
Rescan: Issue a rescan command to wireless NIC to update information on surrounding
wireless network.
Re-Scanning: Clicking the re-scan button to perform the re-scanning action.
Add to Profile: Add the selected AP to Profile setting. It will bring up profile page and save
user’s setting to a new profile.
[Connect A Network]
(1) When Raconfig first ran, it will select the best AP to connect automatically.
(2) If user wants to connect to other AP, he can double-click mouse on the intended AP to
make connection.
(3) If the intended network has encryption other than “Not Use”, Raconfig will bring up the
security page and let use input the appropriate information to make the connection.
This icon indicates the change is successful.
☉Example 1: Open and Non-Encrypted
Step 1 – Choose “Open” authentication type
Step 2 – Choose “None” encryption type
Step 3 – After the profile is saved, click “Activate” button on Profile Page to activate the
profile.
63
☉ Example 2: WEP-Encrypted
Step 1 – Choose “Open” or “Shared” authentication type
Step 2 – Choose “WEP” encryption type
Step 3 –Enter the WEP KEY
64
Step 4 –After the profile is saved, click the “Activate” button on Profile Page to active the
profile.
☉ Example 3: WPA-PSK/WPA2-PSK
Step 1 – Choose “WPA-PSK” or “WPA2-PSK” authentication type
Step 2 – Choose “TKIP” or “AES” encryption type
Step 3 –Enter the pre-shared KEY
65

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print
Modify Date                     : 2008:03:03 17:15:01+08:00
Create Date                     : 2008:03:03 17:14:33+08:00
Title                           : Microsoft Word - Wireless IEEE 802.11n Adapter User's Manual.-V1.doc
Author                          : 092010
Creator                         : PScript5.dll Version 5.2
Producer                        : Acrobat Distiller 7.0.5 (Windows)
Page Count                      : 22
Mod Date                        : 2008:03:03 17:15:01+08:00
Creation Date                   : 2008:03:03 17:14:33+08:00
Metadata Date                   : 2008:03:03 17:15:01+08:00
EXIF Metadata provided by EXIF.tools
FCC ID Filing: TUI-WP-1000N

Navigation menu