HON HAI PRECISION IND T60H929 USB RF Module User Manual T60H929 00

HON HAI Precision Ind. Co., Ltd. USB RF Module T60H929 00

Users Manual

 1       U  S  E  R ’ S     M  A  N  U  A  L          T60H929.00         USB2.0 WLAN CARD
 2Contents SECTION ONE: INTRODUCTION............................................................................................3 1.1 FEATURES ............................................................................................................................... 3 1.1.1  WIRELESS LAN FUNCTION ...................................................................................................... 3 1.2:FCC NOTICE ..................................................................................................................................4 1.2.1 FCC COMPLIANCE ...................................................................................錯誤! 尚未定義書籤。 1.2.2  FCC CLASS B STATEMENT.......................................................................錯誤! 尚未定義書籤。 SECTION TWO:   WIRELESS UTILITY AND CONFIGURATION.......................................5 2-1 WINDOWS 98/ME/2000 WIRELESS UTILITY...................................................................................... 5 SECTION THREE: WINDOWS XP WIRELESS UTILITY AND CONFIGURATION.......... 10 3-1 WINDOWS XP WIRELESS UTILITY................................................................................................... 10 APPENDIX A  GLOSSARY................................................................................................................16                         The information contained in this manual has been verified at the time of this manual printing.  The manufacturer reserves the right to make any changes and improvements in the product described in this manual at any time and without notice. All registered trademarks are the property of their respective owners.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    3Section One:  Introduction   The Wireless 802.11b/g USB2.0 Module is available 54 Mbps solution in the 2.4-GHz band, compatible with the IEEE 802.11b standard , the 802.11g standard USB2.0 Specification and USB Electro mechanical Specification Revision 2.0. It allow user to switch to different vendors’ Access Points through the wireless networks and to prevent from eavesdropping. The 802.11g data rate provides for 54, 48, 36, 24, 18, 12, 9, 6Mbps, and 802.11b data rate provides for 11,5.5,2,1 Mbps. The 802.11g mode supports encryption using both 64-bit or 128-bit WEP.   1.1 Features 1.1.1   Wireless LAN Function Form Factor & Bus Interface     Form Factor : Not standard, Interface: USB 2.0. Wireless LAN Compliance  Compatible with IEEE 802.11b standard and IEEE802.11g standard and USB2.0 Specification. Operating Frequency    2.4 ~ 2.497GHz ISM band  Modulation Schemes                 802.11g:  64QAM(54Mbps,48Mbps),16QAM(36Mbps, 24Mbps),  QPSK(18Mbps,12Mbps), BPSK(9Mbps, 6Mbps)  802.11b:  CCK (11 Mbps, 5.5Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps)  Channel Numbers    IEEE 802.11b compliant 1 ~ 11 channels for United States  1 ~ 13 channels for Europe 1 ~ 13 or 14 channels for Japan  WLAN Data Rate   The IEEE802.11g data rate provides for 54 auto fallback 48,                          36, 24, 18, 12, 9, 6 and IEEE802.11b data rate provides for 11 auto fallback to 5.5, 2 and 1Mbps.  Spreading    11-chip Barker Sequence Media Access Protocol    CSMA/CA with ACK Transmitter Output Power    Typ. 802.11b 17.5+/-1.5 dBm                                                                      Typ. 802.11g 13.5+/-1.5 dBm  Antenna Type     Integrated diversity switch with Printed Antenna. Operating Voltage    5.0VDC Radio  On / Off  Dynamic Rate Shifting                 Automatic fallback  Network Architecture      Ad-hoc, Infrastructure  Operating Systems      Windows 98/Me/2000/XP
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    41.2 FCC Notice  Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.  This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.  FOXCONN declared that T60H929 is limited in CH1~11 from 2412 to 2462 MHz by specified firmware controlled in USA.    1.3 Canada Notice  Industry Canada Statement Operation is subject to the following two conditions: 1) this device may not cause interference and 2) this device must accept any interference, including interference that may cause undesired operation of the device  To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    5 Section Two:    Wireless Utility and Configuration The following sections describe the Wireless Network Configuration Utility. This utility provides quick access and friendly interface to configure the card setup.  2-1 Windows 98/ME/2000 Wireless Utility   After installation is completed, a Wireless LAN Utility icon will appear in Desktop screen. Click it, then you will see the screen below. If you cannot find the icon, you can select “Start” ->”Program”->”Wireless LAN Configuration Utility” Icon.  Card Status     You can see the AP information that your card connected. In this page you also can find Firmware Version , MAC Address and Frequency Domain.  ESSID: An acronym for Extended Service Set Identifier, ESSID is the unique name shared among all clients and Access Points in a wireless network. The ESSID must be identical for all clients or Access Points participating in the same network. The ESSID is case sensitive and must not exceed 32 characters. Press ‘Rescan’ it will scan the specific ESSID that your profile set. If your profile set the ESSID to be ANY, then while you press ‘Rescan’, it will scan AP in the nearby area and choose the stronger one. From Link Quality and Signal Strength, you can tell the wireless transmission quality.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    6 Profile   If you want to use default Profile setting, then choose the DEFAULT at profile name.  If you want to setup your own profile, then select PROFILE1 and you can change this PROFILE1 name to the one you like.   There are two network types:  Ad-Hoc: This mode is used for a simple peer-to-peer network. It offers file sharing between wireless clients without a wireless Access Point (AP). Infrastructure: This mode allows a wireless LAN to be integrated into an existing wired network through an AP. Infrastructure type networks also permit roaming between Access Points while maintaining connection to all network resources. Infrastructure mode provides additional features, such as WEP security, power saving and extended range. ESSID: You can either choose specific AP or connect to any AP in the nearby area. Power Save: enable it, so it will be triggered when your computer system is inactive.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    7  WEP Key: Wired Equivalent Privacy, WEP is an encryption scheme used to protect your wireless data communications. WEP uses a combination of 40-bit keys,128-bit keys to provide data encryption for your wireless network. AP and wireless card should use the same WEP key in order to communication.  KEY Format: You can choose to enter ASCII Characters (0~9, a~z, A~Z) or Hexadecimal number (0~9, a~f, A~F) Default Key: The current KEY you choose. KEY1~4: If you choose 40-bit keys, then you must enter 5 ASCII Characters or 10 Hexadecimal numbers. If you choose 128-bit keys, then you must enter 13 ASCII Characters or 26 Hexadecimal numbers.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    8 Site Survey Use the Site Survey Tool. You can identify each channel transmission quality.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    9 About Use the About, you can see the information of Network Driver, Configuration Utility and Firmware Version.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    10Section Three: Windows XP Wireless Utility and Configuration  3-1 Windows XP Wireless Utility   1. To configure the wireless card setting, you can select Start\Settings\Network Connection in the Windows XP. Choose the wireless network connection, then you will see below screen. From this screen, you can see wireless connection status and wireless signal level.   2.  Select ‘Properties’ in the above screen. The following windows will show up.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    11 In ‘General’ page, Wireless LAN card information and networking protocol have been displayed. Extra networking protocol can be installed in this page.                     3. Select Wireless Networks page, you can see available wireless networks in your nearby area. You can add your preferred wireless Access Point to your list, so your wireless card will search for specific wireless networks.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    12  Configure To connect to an existing access point (infrastructure) network, under Available networks, click the network name, and then click ‘Configure’ to setup wireless security and data encryption. Reflesh To update the list of available networks that are within range of your computer, click Refresh. Add To connect to an access point (infrastructure) network that you know is available but that does not appear under Available networks, under Preferred networks, click Add. In Wireless Network Properties, specify the network name (Service Set Identifier). Remove To remove a wireless network from the list of preferred networks.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    13 Advanced *If your network are configuring to a computer-to-computer (ad hoc) network, select ‘Computer-to-computer (ad hoc) network only’. *If you want to connect to a computer-to-computer and access point (infrastructure) networks are within range of your computer, click ‘Access point (infrastructure)network only’. *If you want to connect to a computer-to-computer (ad hoc) network and both computer-to-computer and access point (infrastructure) networks are within range of your computer, click ‘Any available network (access point preferred)’.  To automatically connect to available networks that do not appear in the Preferred networks list, click Advanced, and then select the Automatically connect to non-preferred networks check box.                 Define your network name (SSID) in the following windows, so your can join a specific wireless network. Check AP has WEP on or not. You wireless network will need to have same WEP setting with AP in order to communicate. If your wireless network don’t have any AP, check the ‘This is computer-to computer (ad-hoc) network; wireless access points are not used’
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    14                This window provides authentication via 802.1X. 802.1X, an IEEE standard that  provides an authentication framework for 802-based LANs. 802.1X takes advantage  of an existing authentication protocol known as the Extensible Authentication  Protocol. 802.1x, giving someone secure, encrypted, wireless access on a Microsoft  network will be as easy as setting a flag on the users domain account.   What does this mean for the Home Network user?  802.1x will ensure that if and when you make the change over to Wireless Ethernet, your neighbor will not be able to access your wireless LAN!
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    15          The ‘Advanced’ window offers Firewall and Internet Connection Sharing functions.  Depends on your networking environment, you can select below functions.
                                                                                                                                                                                                                                                                                                                               HON HAI PRECISION IND. CO., LTD.                                                                                                                    16           Appendix A  Glossary Access Point - An internetworking device that seamlessly connects wired and wireless networks together. Ad-Hoc - Ad-Hoc is a peer- to-peer wireless network without Access Point. A group of wireless clients consistent an independent wireless LAN. Backbone - The core infrastructure of a network, the portion of the network that transports information from one central location to another central location. The information is then off-loaded onto a local system. BSS - Stands for “Basic Service Set.” An Access Point associated with several wireless stations. ESS - Stands for “Extended Service Set.” More than one BSS can be configured as an Extended Service Set. An ESS is basically a roaming domain. Ethernet - A popular local area data communications network, originally developed by Xerox Corp., which accepts transmission from computers and terminals. Ethernet operates on 10/100 Mbps transmission rate over shielded coaxial cable or over shielded twisted pair telephone wire. Infrastructure - An integrated wireless and wired LAN is called an Infrastructure configuration. Roaming - A function that allows one to travel with a mobile end system (wireless LAN mobile station, for example) through the territory of a domain (an ESS, for example) while continuously connecting to the infrastructure.

Navigation menu