National Datacomm 3050S01 802.11g+ MiniPCI Module User Manual NWH1050 User s Guide

National Datacomm Corporation 802.11g+ MiniPCI Module NWH1050 User s Guide

User Manual

NWH3050
802.11g+ MiniPCI Module
User’s Guide
October 9, 2003
TRADEMARKS
All names mentioned in this document are trademarks or registered trademarks of their respective
owners.
DISCLAIMER
This document is provided “as is,” without warranty of any kind, either expressed or implied,
including, but not limited to, warranties of merchantability or fitness for a particular purpose. The
manufacturer may release improved or modified versions of this manual or any product or
program described in this manual at any time. This document could include technical inaccuracies
or typographical errors.
FCC WARNING
This equipment has been tested and found to comply with the limits for a Class B Digital device
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses, and can
radiate radio-frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment to an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
You are cautioned that changes or modifications not expressly approved by the party responsible
for compliance could void your authority to operate the equipment.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
This device may not cause harmful interference, and
This device must accept any interference received, including interference that may cause
undesired operation.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of 20
centimeters between the radiator and your body.
Packing List
Your NWH3050 802.11g+ MiniPCI Module package should contain the following items:
One NWH3050 802.11g+ MiniPCI Module
Contents
Introduction 1
1 System Requirements 2
1.1 Hardware Requirements 2
1.2 Software Requirements 2
2 Terminology Used in this Guide 3
3 Familiarization and Installation 5
3.1 The Parts of the Adapter 5
3.2 Adapter Installation 5
4 Driver Installation and Operation 9
4.1 Installation Preview 錯誤! 尚未定義書籤。
4.2 Installation Details 錯誤! 尚未定義書籤。
4.3 Driver Operation and Adapter Removal 錯誤!
未定義書籤。
4.4 Uninstalling the Driver 12
5 Utility Installation, Startup, and Shutdown 13
5.1 Installing the Utility 13
5.2 Controlling the Utility 13
6 Operation 15
6.1 Understanding Connection Profiles 15
6.2 Understanding the Utility’s Panels 15
6.3 Connecting for the First Time 16
7 Utility Reference 19
7.1 The Information Panel 19
7.2 The Configuration Panel 21
7.3 The Security Panel 24
7.4 The Site Survey Panel 26
7.5 The Profiles Panel 28
7.6 The About Panel 30
Appendixes
A Troubleshooting 31
B Technical Support 31
C Limited Warranty 32
D Specifications 34
E Channels and Regulations 35
18. The Profiles panel 28
19. The About panel 30
Introduction
Congratulations on choosing an outstanding wireless networking product, and thank you for
taking the time to read this user’s guide.
About the NWH3050
Your NWH3050 802.11g+ MiniPCI Module has standards-based and enhanced features.
Standards-based features: The adapter conforms fully to Institute of Electrical and Electronics
Engineers (IEEE) standards 802.11b and 802.11g. IEEE 802.11b-compliant products form the
heart of wireless local-area networks (WLANs) all over the world, including “hotspots” in many
public areas. Using your adapter, you can connect wirelessly wherever you have the permission
of the network operator to do so. It does not matter what brand or brands of wireless networking
equipment the network is built on. IEEE 802.11b and 802.11g are worldwide standards.
IEEE 802.11b allows communication speeds up to 11 megabits per second (Mbps), transmission
ranges (depending on electromagnetic conditions) up to tens of meters (yards) indoors and
hundreds of meters outdoors (or more, at lower communication speeds), and, for security, Wired
Equivalent Privacy (WEP) encryption using a digital “key” 64 or 128 bits long. IEEE 802.11g
allows communication speeds up to 54 Mpbs.
Enhanced features: Your adapter has several capabilities not present in IEEE 802.11b-only or
802.11g-only devices:
4X mode. This allows the packets exchanged between devices to be longer, reducing
overhead and increasing throughput.
256-bit WEP encryption. This greatly increases network security, as a longer key is
many times harder to “crack.”
These capabilities can be used on wireless links to products in the same family as your adapter.
The adapter can automatically detect when 4X mode can be used; you can also control its use
through the software included with the adapter.
About this Guide
This guide contains detailed instructions on installing and using your adapter and the software
included with it. Basic terms and concepts of wireless networking are also introduced. Follow the
instructions in this guide carefully to ensure that your adapter will give you many years of
trouble-free, high-performance operation.
1
1 System Requirements
Before installing the adapter and related software, make sure the computer system meets the
minimum requirements described below.
1. Open the task bar’s Start menu, go to Settings, and click Control Panel.
2. Double-click the
System icon.
The System Properties window will appear.
3. Find and click the Device Manager tab or button.
If there is no Device Manager tab in the System Properties window, click the Hardware tab.
The Device Manager button will be in the middle of the panel that appears.
4. Expand the MiniPCI Module entry.
1.2 Software Requirements
The drivers included with the adapter allow the adapter to be used in Microsoft® Windows 98,
ME, 2000, and XP. Third-party drivers may allow the adapter to be used, with reduced
functionality, in these and other operating systems.
2
2 Terminology Used in this Guide
Ad-hoc Network
An ad-hoc network is a wireless local-area network (WLAN) made up of stations
communicating directly with each other through their wireless interfaces. There is no central
relay point, and normally no connection to a wired network. Ad-hoc mode is sometimes
referred to as peer-to-peer, computer-to-computer, or Independent Basic Service Set (IBSS)
mode. Figure 1 shows a typical ad-hoc network.
Figure 1. Ad-hoc network
Infrastructure Network
An infrastructure network is a WLAN made up of wireless stations and at least one wireless
relay point, known as a base station or access point (AP). The AP usually has a connection
to a wired network, allowing wireless stations to use resources on that network. The AP also
relays all communications between wireless stations in its coverage area; these stations
never communicate directly with each other. Infrastructure mode is sometimes referred to as
managed or Basic Service Set (BSS) mode. Figure 2 shows a typical infrastructure network.
Figure 2. Infrastructure network
BSSID/MAC Address
A Basic Service Set (BSS) is two or more wireless devices that are in communication with
each other. Like every wired Ethernet device, every wireless device has a fixed, unique
“medium access control” (MAC) address. When wireless devices establish communication,
3
they automatically select the MAC address of one BSS member as an identifier for the group;
this is the BSSID.
It has become customary to refer to a wireless device’s MAC address as its BSSID even
when the address is not being used to identify an active BSS.
A BSS that includes an access point is often referred to as a cell.
SSID/Domain Identifier
A Service Set Identifier (SSID) is a shared name, usually assigned by a network
administrator, that identifies wireless devices that are allowed to communicate with each
other. This is one way of providing basic security on a wireless network. An SSID can be up
to 32 characters long, is case-sensitive, and can include letters, symbols, and numbers.
Giving multiple access points the same SSID and encryption settings allows mobile stations
that also share those settings to “roam” from one AP to another. When at least one AP is
among the devices sharing an SSID, the name may be referred to as an Extended Service Set
Identifier (ESSID).
An SSID is sometimes called a “domain name,” but it is unrelated to the domain names used
to identify machines and networks on the Internet. Other terms for SSID are domain ID, net
ID, network name, extended network ID, and wireless network name. The set of devices that
an SSID identifies is sometimes called a communication domain or wireless domain.
Figure 3 shows a common wireless network setup. If the APs share SSID and encryption
settings, mobile devices that also share those settings can roam among them.
Figure 3. Roamable multi-AP infrastructure network
Roaming
When APs covering adjacent areas have the same SSID and encryption settings, a mobile
device that also shares those settings can communicate through the APs continuously while
moving from one coverage area to another. This is known as roaming. When one AP’s
signal begins to weaken, the mobile device automatically searches for another AP that it is
authorized to “associate with” (that is, connect to); when the second AP’s signal quality is
better than that of the first, the station automatically switches over.
4
4 Software Installation
You must install the driver and utility from the adapter CD-ROM before inserting the adapter in
the computer for the first time.
To install the driver and utility, insert the CD-ROM and wait for the window shown below to
appear. This may take 20 to 30 seconds on a laptop or notebook computer.
Click Install Driver, and then click Next in each window that appears. In the final window, click
Finish. This process is illustrated below.
5
6
The original window will reappear. Click Install Utility. Then, as before, click Next in each
window that appears, and at the end click Finish. This process is illustrated below.
7
The original window will reappear. Click Exit and remove the CD-ROM.
Commands for starting the utility, and for uninstalling the utility and the driver, will be added to
the Start menu, and a shortcut icon for starting the utility will be added to your desktop display,
as shown below.
8
5 Adapter Installation
Before inserting the adapter in the computer for the first time, be sure to install the driver and
utility as described above. Also take note of the following tips and cautions:
If the adapter is inserted or removed while the computer is running, the operating system
may beep very loudly even if the sound control has been set to Mute or Muted.
If the adapter will be connected to an extender card installed in a desktop computer, make
sure the extender card is firmly bolted to the computer’s housing before inserting or
removing the adapter. Shifting or rocking of a loose extender card can result in
momentary loss of contact, which can permanently damage sensitive electronic
components.
Microsoft® Windows lets you “stop” (deactivate) the adapter before removing it. It is
strongly recommended that you use this function and avoid removing the adapter while it
is operating.
The location of the MiniPCI slot depends on the make and model of the computer. There may be
a button next to it for physically ejecting an adapter from the slot. See your computer manual for
details. Remember that the adapter should be “stopped” (deactivated) through the operating
system before being ejected while the computer is on.
When inserting the adapter, make sure it goes in straight, so there is no resistance until its metal
body is almost all the way in. When the adapter is fully inserted, its metal body will be
completely inside the slot, and most of its plastic outer end will extend outside the computer.
The first time you insert the adapter, Windows will start up a program for installing a driver.
Although the driver has already been placed on the system, Windows needs to confirm its
location. The window that appears in Windows 2000 is shown below.
In Windows ME, click Next in each window that appears, and then click Finish.
9
In Windows XP, click Next until a message about “Windows logo testing” appears. Indicate that
you wish to continue with installation. Click the Finish button when it appears.
In Windows 98, click Next until you are prompted to insert your Windows CD-ROM. Follow the
on-screen instructions. Click the Finish button when it appears. You will be prompted to restart
the computer. Allow the system to restart.
In Windows 2000, you must make sure a certain option is unchecked. The full procedure is
illustrated and explained below.
After you click Next in the window shown above, the following window will appear.
Click Next. The window shown below will appear.
If the check box next to Specify a location is checked, click it to clear it. Then click Next. The
window shown below will appear. Windows will indicate that it found the driver.
10
Click Next. A message about a “digital signature” will appear.
Click Yes, and then click Finish in the window shown below.
11
6 Driver Operation and Adapter Removal
The driver is automatically loaded into the computer’s memory whenever the system detects the
adapter. When the adapter is not present, the driver is not loaded. The “removable device” icon in
the system tray (also known as the “PC Card” or “Unplug/Eject” icon) lets you unload the driver
and deactivate the adapter for safe removal.
To unload the driver and deactivate the adapter: Click the “removable device” icon
using the mouse’s main button (usually the button on the left), move the pointer onto the
menu that appears, and choose the command to “stop” (or, in Windows XP, “safely
remove”) the TNET1130 WLAN adapter.
Figure 7. Tray icon menus (1): main button
This will unload the driver and deactivate the adapter. The adapter’s activity LED will go
dark. (The power LED will continue to shine. This is normal, and not a cause for worry.)
A message indicating that you can safely remove the adapter will appear. Choose OK to
continue.
You should then remove the adapter from the slot. The driver will automatically be
reloaded when the adapter is re-inserted.
To hide the tray icon without unloading the driver: In Windows ME and 2000, click
the “removable device” icon with the mouse’s secondary button (usually the button on
the right) and choose Unplug or eject hardware from the menu that appears. Select the
adapter from the list of hardware devices and uncheck the option Show Unplug/Eject
icon on the taskbar.
In some versions of Windows you can, instead, open the Start menu, go to Settings,
choose Control Panel, open the PC Card (PCMCIA) icon, select the adapter, uncheck the
Show control on taskbar box, and choose OK.
In Windows 98, click the tray icon using the mouse’s secondary button (usually the
button on the right) and choose Disable PC Card Tray Icon.
Whenever you wish to remove the adapter while the computer is running, it is strongly
recommended that you choose Stop (or Safely Remove) TNET1130 WLAN Adapter or Unplug
or eject hardware and deactivate the adapter before physically removing it.
Uninstalling the Driver: “Uninstalling” the driver means removing the driver files from your
hard disk. You should uninstall the driver before installing a newer version. To do this, open the
Start menu, go to Wireless Adapter and then to TNET1130 Driver, and click Uninstall the
driver.
12
7 Utility Startup and Shutdown
The Wireless Adapter Utility is used to connect to wireless networks and use the adapter’s special
features.
Figure 9. Utility icons in the Start menu and on the desktop
7.1 Controlling the Utility
The Wireless Adapter Utility behaves slightly differently from most programs with icons on the
desktop and in the Start menu. Take note of the following so you will know what to expect when
you start using the utility:
Startup: You can start the utility up in either of two ways:
o by opening the Start menu, going to Programs, choosing the Wireless Adapter
Utility folder, and choosing the Wireless Adapter Utility command, or
o by choosing the Wireless Adapter Utility icon on the desktop.
Tray icon: When the utility is running, its icon, a stylized white “at” sign on a colored
background, appears in the system tray (usually located at the right end of the task bar).
This icon has three states: (1) A blue-green background shows that you are connected to
a wireless network. (2) A red background shows that the adapter and driver are working,
but a wireless connection has not been established. (3) A black background shows that
the utility cannot communicate with the driver.
Figure 10. Utility icon in the system tray
Window controls: It is important to understand the effects of the utility window’s OK
button, Cancel button, and other controls. These are explained below.
13
OK button: Clicking OK applies (sends to the adapter) any changes you have made in
the adapter settings shown in the utility window. It also hides the window, whether you
have made changes or not. Pressing the Enter key is the same as clicking OK.
Cancel button: Clicking Cancel discards any unapplied changes you have made in the
adapter settings shown in the utility window. It also hides the window, whether you have
made changes or not. Pressing the Esc key is the same as clicking Cancel.
Figure 11. Utility window controls
To apply or discard changes but keep the window visible, click a tab other than the tab of
the panel currently shown. If there are unapplied changes, you will be asked if you want
to apply them. Click Yes to apply them, No to discard them.
To hide the window without applying or discarding any changes, click the window’s
Close box (in the top right corner), or open the window’s System menu (in the top left
corner) and choose Close. Pressing Alt+F4 is the same as clicking the Close box or
choosing Close.
When you are connected to a wireless network, hiding the utility window has no effect on
the connection. (The connection will be broken, however, if settings unsuitable for the
network are applied.)
Redisplaying the utility: To redisplay the utility when it is hidden, double-click its icon
in the system tray, or carry out either of the procedures for starting it up (this will not
cause a second copy of it to start up).
Shutting down the utility: To shut the utility down completely, click its icon in the
system tray with your pointing device’s secondary button (most often the button on the
right), move the pointer onto the menu that pops out, and choose the Exit command.
Figure 12. Shutting down the utility
Shutting down the utility will not break any existing connection to a wireless network.
14
8 Operation
This chapter explains how to establish wireless connections using your adapter and the Wireless
Adapter Utility. It is assumed here that —
you have completed installation of the driver, utility, and adapter;
you know how to start the utility, hide and redisplay its window, and shut it down (see
section 5.2, “Controlling the Utility”); and
you are within range of at least one wireless device that will accept a connection from
you.
Any wireless connection, even a connection to a single device, is treated in this chapter as a
connection to a wireless network. There is, in fact, no difference in the steps required to connect
wirelessly to a single device or a whole network, and a connection to a single device works in all
the same ways as a connection to a network with many devices on it.
6.1 Understanding Connection Profiles
The utility makes connecting to wireless networks simpler by the use of connection profiles. A
connection profile is a group of settings used to join a particular wireless local-area network
(WLAN). Connection profiles are referred to simply as profiles in the rest of this guide.
For a low-security WLAN, you often can create a profile with two clicks, save it with another
click, and apply it (that is, use the settings in it to join the WLAN) with one more click. For some
WLANs, however — especially high-security WLANs — you must input settings supplied by the
WLAN operator to create a profile and join the WLAN for the first time.
A profile is automatically saved for each WLAN that you join. The next time you want to join
that WLAN, you can do so by simply applying the profile. There is no limit to the number of
profiles you can save. You can also save multiple profiles for a single WLAN, if it requires
different settings at different times (this is done on some WLANs for security reasons). You can
create, edit, and delete profiles at any time, whether you are connected to a WLAN or not.
6.2 Understanding the Utility’s Panels
The utility has six tabbed panels. When the program starts up, the Information panel is shown,
and a dotted rectangle on the tab shows that the panel name is selected. For convenience on
laptop computers, you can switch panels with the right, left, and up arrow keys when a panel
name is selected.
Figure 13. The utility’s panel tabs
15
The utility’s panels are explained briefly below. The order of the explanations matches the order
in which the right and left arrow keys take you through the panels.
The Information panel shows if you are connected to a WLAN. When you have a connection,
information about it appears here. This panel can also display important error messages. A
Rescan button, present only when this panel appears, is for attempting to reconnect if the radio
link has gone down.
The Configuration panel shows the adapter’s current settings (except for security settings), and
lets you change them. Changes are applied (that is, sent to the adapter) when you switch panels or
click OK. This lets you test changes to the current profile before editing and resaving the profile
itself.
The Security panel shows the adapter’s current Wired Equivalent Privacy (WEP) settings, and
lets you change them. WEP is a form of encryption that can help prevent snooping. To join a
WLAN that uses WEP, you must obtain WEP settings from the WLAN operator. WEP settings
are part of the current profile, and can be changed and tested like the settings in the
Configuration panel.
The Site Survey panel shows the results of searches for WLANs. A search is carried out at
startup, any time you click the Search button, and whenever necessary to establish or maintain a
connection. You can double-click a WLAN in the search results to display a dialog box for
creating a profile for that WLAN. When you click that dialog box’s OK button, the profile is
saved, and you are asked if you want to join the WLAN.
The Profiles panel lists existing profiles. Click a profile to enable buttons that let you edit, apply,
or remove it. Double-clicking a profile is another way of applying it. The New button is for
creating a profile manually (this may be necessary for joining a WLAN that does not allow
automatic detection). After creating or editing a profile, you are asked if you want to apply it.
The About panel contains a copyright notice and information about the operating system, the
utility, the driver, and the adapter. The final item, “regulatory domain,” is the country or region
whose laws the adapter’s radio transmission characteristics conform to.
6.3 Connecting for the First Time
Connecting to a WLAN is often referred to as joining the network. Another term you might often
see is associate: a station is said to “associate with” (or to) an access point in an infrastructure
WLAN, or with other stations in an ad-hoc WLAN. The term join is used below for brevity.
Joining a WLAN is like connecting a cable to a wired network. Additional steps might be needed
to make full access to network resources possible. Such steps are outside the scope of this guide.
These instructions assume that the adapter is inserted and in operation, that you have successfully
installed the driver and utility, and that you are within radio range of the WLAN you want to join.
If the WLAN is set up for the easiest possible access, you can join as follows: (1) Start the utility.
(2) Go to the Site Survey panel. (3) Double-click the line showing information about the WLAN.
(4) Click OK to save the profile created by the utility. (5) Click Yes to confirm that you want to
connect.
16
This process is described in greater detail below.
1. Start up the Wireless Adapter Utility.
The utility’s Information panel will appear. In most cases, the first time you run the
utility, this panel will show that you have not joined a WLAN.
If the WLAN you want to join allows automatic detection, the utility can create a profile
containing all or most of the settings required for joining. You will need little or no
information from the network operator.
If the WLAN does not allow automatic detection, you will have to obtain configuration
and security information from the operator. Then, to create a profile and join the WLAN,
go to the Profiles panel, click New, input all the information, and click OK.
It is assumed here that the WLAN allows automatic detection. If it does, information
about it will appear on your screen in the next step.
2. Go to the Site Survey panel. Note the information shown in the SSID and WEP
columns.
An SSID (Service Set Identifier) is a name assigned to a WLAN by the operator. If more
than one WLAN is listed, the SSIDs should help you identify the one you want to join.
(The SSID is sometimes called the network [or domain] name [or ID].)
WEP is Wired Equivalent Privacy, a means of encrypting digital radio transmissions to
prevent snooping. Look to see if WEP is disabled or enabled on the WLAN; this affects
what you must do in this step and the next.
If WEP is disabled, the utility can create a profile containing all the settings required
for joining the WLAN. Go straight to step 3.
If WEP is enabled, encryption is used for security on the WLAN, and you will need
to know (1) the encryption method (64-, 128-, or 256-bit WEP), (2) the format of
the “key” or keys (“hex” or “ASCII” — that is, numeric or textual), (3) the key or
keys, and in some cases, (4) the “authentication mode” (“open” or “shared”).
The encryption method is sometimes called the “key length,” and 64-bit WEP is
sometimes called “40-bit WEP.” If you have received a key or keys but are not sure
of the method and format, see the additional explanations in step 3.
3. Double-click the WLAN that you want to join.
A window titled New Profile will appear. It will show a suggested name for the profile
and, in a panel titled Configuration, adapter settings that the utility has determined are
suitable for joining the WLAN.
The name and most of the settings should be left unchanged. If you need to conserve
battery power on a laptop computer, you can set the Power Saving Mode control to
Maximum Power Save. This will make the adapter turn its receiver off and on
periodically when you are connected to this WLAN. As a result, the connection might
sometimes seem slower than usual.
17
If WEP is disabled on the WLAN, go straight to step 4.
If WEP is enabled on the WLAN, go to the New Profile window’s Security panel.
To enable WEP in this profile, pull down the Method list and select 64-Bit, 128-Bit,
or 256-Bit. Controls for selecting the “key input method” (that is, key format) and
for entering keys will appear.
If you are unsure of how to set the Method and Key Input Method controls, you
can determine the correct settings from the length and contents of the WLAN’s key
or keys. Read the following two paragraphs very carefully.
“Hex” is hexadecimal (base 16) notation. A WEP key in hex format can contain
only hex digits. The hex digits are the numerals 0 through 9 and the letters A
through F (case does not matter: “A” has the same meaning as “a” in hex). The
key must contain an exact number of hex digits: 10 for 64-bit WEP, 26 for 128-
bit WEP, and 58 for 256-bit WEP. (A WEP key in hex format may be written
with spaces or colons between pairs of digits. Be sure to count and type only the
digits.)
ASCII (American Standard Code for Information Interchange) means plain text.
A WEP key in ASCII format can contain any characters you can type on your
keyboard, including spaces. Case matters: “A” and “a” are treated as different
characters. The key must contain an exact number of characters: 5 for 64-bit
WEP, 13 for 128-bit WEP, and 29 for 256-bit WEP.
64-bit WEP allows the use of one to four keys, and the Default Key control must be
set to the key currently in use on the WLAN. If using 128- or 256-bit WEP, type the
key into the Key 1 box. Remember that 256-bit WEP can only be used by devices
from the same product family as your adapter.
The Auth. Mode (authentication mode) control is set by default to Open. In open
authentication, a request to join a WLAN is never encrypted. If the WLAN uses
“shared” authentication (where requests to join must be encrypted), set this control
to Shared. (If Auth. Mode is set to Auto, the adapter will try both methods. Some
WLANs allow this, and some do not.).
4. Click
OK.
The utility will save the profile and ask if you want to connect to the WLAN.
5. Click
Yes.
Connection is usually very quick. If your computer needs to obtain settings (such as an IP
address) from a server on the network, this may take a few seconds. The utility’s
Information panel shows the state of the connection. It also displays your computer's IP
address and other TCP/IP settings (this is for convenience only; these settings are not
directly related to wireless networking).
18
7 Utility Reference
This chapter explains all the indicators and controls in each of the Wireless Adapter Utility’s
panels. The panels are explained in the order in which the right arrow key takes you through them
when the program has just been started up: Information, Configuration, Security, Site Survey,
Profiles, and About.
Note: The Configuration and Security panels in the Profile and New Profile
dialog boxes contain all the same controls as those in the utility’s main window.
For information on these panels, see sections 7.2 and 7.3 in this chapter.
7.1 The Information Panel
The Information panel shows the adapter’s current connection status and the computer’s current
IP (Internet Protocol) address settings. The information shown is “read-only,” that is, this panel
does not let you directly change any settings.
Figure 14. The Information Panel
Status display: When you are connected to a WLAN, the Status display consists of a box
showing the SSID and a box showing the BSSID. At other times, it consists of a single box
showing a status message such as “Not connected to network” or “Couldn’t communicate
with driver.”
19
The SSID, a human-assigned name, defines the WLAN. It is sometimes called the network
(or domain) name (or ID). Groups of devices using different SSIDs in the same area are
considered to make up different WLANs. Your computer must be set to use the same SSID as
all other machines on the WLAN. A “detectable” WLAN is one that broadcasts its SSID.
SSID broadcasts (often called “beacons”) enable the utility to show the WLAN in the Site
Survey listing and automatically fill in the correct SSID when creating a profile.
The BSSID is a numeric, factory-set identifier identical to the medium access control (MAC)
address (also called the MAC ID) of one of the devices on the WLAN. On an infrastructure
WLAN, it is usually the MAC address of the access point; on an ad-hoc WLAN, it is usually
the MAC address of one of the members. BSSIDs are shown in hexadecimal (base 16)
notation.
The BSSID can change as you move between cells of a roamable infrastructure WLAN. On
an ad-hoc WLAN, it may change as different stations take on the role of “coordinator” (this
change is automatic).
Current Channel display: A channel is one of 14 groups of adjacent frequencies in the radio
band used for wireless networking. The channel can change as you move between cells of a
roamable infrastructure WLAN; the adapter automatically detects and uses the channel used
by the access point with the best signal. An ad-hoc WLAN always uses a single, fixed
channel decided on by its users.
Current Tx Rate display: The Tx (transmission) rate is the communication speed in megabits
per second (Mbps). If the Transmission Rate setting in the current profile is Auto, the figure
shown here can vary as the adapter adjusts to changing interference levels, distance, etc.
When the adapter is operating in 4X mode, +4X appears after the transmission rate. 4X mode
uses larger packets to reduce overhead and increase throughput; it does not change the
number of bits transmitted per second.
Link Quality and Signal Strength display: Link quality can be compared to the clarity, and
signal strength to the volume, of audible speech. Radio-frequency interference, reflection, and
obstructions can reduce link quality even when signal strength is high. These figures are often
useful in diagnosing problems on a wireless network.
IP Address, Subnet Mask, and Default Gateway display: This information is obtained from
the operating system, and can be of use to technicians in diagnosing network problems. It can
also help non-technical users determine when they are “on the Internet.”
20
If your computer is set to obtain IP (Internet Protocol) settings automatically, the IP Address
and Subnet Mask boxes will contain 0.0.0.0, and the Default Gateway box will be blank,
before you join a WLAN. After you join a WLAN and receive IP settings from a server on
the network, the settings will appear in these boxes. This is a way of letting you know that
you are “fully connected” and can access e-mail, the World Wide Web, and other Internet-
based resources.
Rescan button: Click Rescan to try to re-establish a link that has gone down. You can also
click Rescan to make the adapter “renegotiate” a link that has become slow; the connection
will be re-established at the highest speed possible.
7.2 Configuration Panel
The descriptions in this section apply to the Configuration panels in the main window, the New
Profile dialog box, and the Profile dialog box. These panels all contain the same controls.
Use the main window’s Configuration panel to view the adapter’s current settings and to make
experimental or temporary changes. When you want to save a configuration, access the New
Profile or Profile dialog box, either from the Site Survey panel (by double-clicking a listed
WLAN) or from the Profiles panel (by clicking New, or by selecting a profile and clicking Edit).
Figure 15. The main window’s Configuration panel
Auto-detected configuration settings — those that appear in the New Profile or Profile dialog box
just after you double-click a WLAN in the Site Survey listing — ordinarily should not be changed.
Changing the auto-detected SSID or network mode setting will prevent you from establishing or
maintaining a connection to the WLAN.
21
SSID control: The SSID is a name that a wireless device uses to indicate which WLAN it is on
or wants to join. It is case-sensitive, can be up to 32 characters long, and can contain letters,
numbers, and symbols. All devices on a WLAN must have exactly the same SSID setting.
Other terms often used for SSID are Extended Service Set Identifier (ESSID), domain ID, net
ID, network name, extended network ID, and wireless network (or domain) name. The set of
devices that an SSID identifies is sometimes called a communication domain or wireless
domain.
Transmission Rate control: The adapter can transmit at many different bit rates (measured in
megabits per second, or Mbps), and it can automatically adjust its speed according to link
quality, signal strength, and the capabilities of whatever device it is exchanging signals with.
The default setting of the Transmission Rate control is Auto.
There is rarely a need to change the setting of this control. The benefits of a fixed, low speed
(greater range) or a fixed, high speed (smaller range for greater security) can be obtained only
if all the devices on the WLAN are set the same way. A setting of Auto offers the best
combination of throughput, range, and resistance to interference.
A speed of 22 Mbps can be used only on connections to devices from the same product
family as your adapter. Even if the Transmission Rate control is set to 22 Mbps, the adapter
will not use a higher speed than the device at the other end of the link can handle.
Network Mode control: This control can be set to Infrastructure or 802.11 Ad-hoc. The default
setting is Infrastructure. To establish and maintain a wireless connection, the adapter must
be set to the same mode as all the other devices on the WLAN.
A WLAN with a connection to a wired network (such as the Internet) is certain to be working
in infrastructure mode. An ad-hoc WLAN is usually a temporary, “on-the-spot” arrangement
among a group of people who need to connect only with each other and do not need the
resources of a wired network.
Some controls in the Configuration panel are disabled or enabled according to which
network mode is selected. Infrastructure mode requires automatic channel switching. Packet
length standards must be observed in 802.11 ad-hoc mode, ruling out the use of 4X mode.
When you select high-speed ad-hoc mode, it is assumed that you want to use the highest
possible speed.
22
Channel control: This control is enabled only when the network mode (see above) is set to
ad-hoc (either 802.11 or high-speed). An infrastructure WLAN can include many access
points using different channels, and to allow roaming, the adapter must be able to switch
channels automatically. An ad-hoc WLAN uses a single fixed channel, and the adapter must
be set to that channel to join the WLAN. Channel detection is automatic for any WLAN that
appears in the Site Survey listing, so the setting of this control rarely needs to be changed.
The radio band used for wireless networking contains 95 frequencies spaced 1 MHz apart.
These are organized into 14 staggered clusters of 23 adjacent frequencies each. Such a cluster
is called a channel. There is much frequency overlap among channels. When overlapping
channels are used in the same area, this causes interference, which reduces throughput.
Which channels are available can differ from country to country (see appendix E).
On an infrastructure WLAN, access points with overlapping coverage areas should use non-
overlapping channels. Non-overlapping channels are those with numbers that differ by 5 or
more, for example, channels 1, 6, and 11, or channels 3, 8, and 13. An ad-hoc WLAN should
use a channel that has little or no frequency overlap with any other channels being used in the
same area.
Power Saving Mode control: The Power Saving Mode control is a drop-down list that offers
two settings: Continuous Access Mode and Maximum Power Save.
In Continuous Access mode, your adapter’s receiver is always on. This is the default setting.
Maximum Power Save mode is a “doze” mode in which the adapter turns its receiver off but
“wakes up” at fixed intervals to see if any communications are waiting for it. Before entering
this mode, it tells the access point (or, on an ad-hoc network, the current coordinating station)
that it is going to do so. The access point (or coordinating station) will “buffer” (temporarily
store) communications destined for your machine. The adapter stays “awake” only long
enough to check for and receive waiting communications.
4X Mode control: 4X mode is a means of reducing communication overhead and increasing
throughput by allowing packets to be much longer than is normally allowed. This mode can
be used only on connections to devices from the same product family as your adapter.
When the 4X Mode control is set to On, the adapter uses 4X mode whenever possible.
Detection of whether it can be used or not is completely automatic, so interoperation with
devices from other product families is unaffected. When the control is set to Off, 4X mode is
never used. The default setting is On.
23
7.3 The Security Panel
The descriptions in this section apply to the Security panels in the main window, the New Profile
dialog box, and the Profile dialog box. These panels all contain the same controls.
Use the main window’s Security panel (shown below, without its initially blank lower part) to
view the adapter’s current security settings, and to make experimental or temporary changes.
Figure 16. The main window’s Security panel
When you want to save security settings, you must (1) access the New Profile or Profile dialog
box, either from the Site Survey panel (by double-clicking a listed WLAN) or from the Profiles
panel (by clicking New, or by selecting a profile and clicking Edit), and then (2) click the New
Profile or Profile dialog box’s Security tab.
When a WLAN is auto-detected, the adapter can detect only whether security (in the form of
Wired Equivalent Privacy [WEP] encryption) is on or off (“enabled” or “disabled”). Where
security is on (that is, WEP is enabled), you must obtain WEP settings from the WLAN operator
and input them in the Security panel to be able to join the WLAN.
Method control: The Method control is a drop-down list for selecting a WEP setting. Four
settings are offered: Disabled, 64-Bit, 128-Bit, and 256-Bit.
(So-called 40-bit WEP encryption is the same as that offered by the 64-Bit setting. On all
wireless networking products, only 40 bits of a 64-bit key, and 104 bits of a 128-bit key, are
input by the user.)
The default setting is Disabled. Selecting any other setting enables the Default Key control
and causes the Key Input Method, Key 1, Key 2, Key 3, and Key 4 controls to appear.
Default Key control: On a WLAN that uses 64-bit WEP, each device can store one to four WEP
keys. The WLAN can then switch among these keys from time to time for better security.
The “default key” is the key currently in use on the WLAN. This control lets you switch
quickly, without having to input the current key each time it is switched. The default setting
is Key 1.
Auth. Mode control: “Authentication” is the process of determining whether a requesting station
should be permitted to join the WLAN. A station authenticates itself by using the correct
SSID in its request to join. If WEP is enabled, the WLAN may require that requests to join be
24
unencrypted (“open” authentication) or that they be encrypted (“shared” authentication), or it
may allow stations to try both methods (“auto” determination of the authentication mode).
The default setting of the Auth. Mode control is Open. If WEP is enabled on the WLAN, the
operator has a responsibility to tell you if you need to set this control to Shared or Auto.
Key Input Method control: This control determines how the utility will interpret the key or keys
you type before it sends the actual bits to the adapter for use and storage. It can treat your
input as “hex” or as “ASCII.”
“Hex” is hexadecimal (base 16) numeric notation. When input in hex, a key can contain only
hex digits, that is, the numerals 0 through 9 and the letters A through F — no spaces, symbols,
punctuation marks, or letters other than A through F. Letters can be uppercase or lowercase;
“A” is interpreted the same way as “a” in hex.
If 64-bit WEP is used and the key input method is hex, each key must contain exactly 10 hex
digits. If 128-bit WEP is used and the key input method is hex, the key must contain exactly
26 hex digits. A 256-bit WEP key in hex format must contain exactly 58 hex digits.
“ASCII” (American Standard Code for Information Interchange) has become a synonym for
plain text, that is, whatever characters you can type on your keyboard, including spaces.
If 64-bit WEP is used and the key input method is ASCII, each key must contain exactly 5
characters. If 128-bit WEP is used and the key input method is ASCII, the key must contain
exactly 13 characters. A 256-bit WEP key in ASCII format must contain exactly 29
characters. Remember that 256-bit WEP can only be used by devices from the same product
family as your adapter.
Key 1, Key 2, Key 3, and Key 4 controls: These boxes are for typing in the key or keys used for
WEP encryption on the WLAN. If there is only one key, type it into the Key 1 box.
To help ensure that your input is correct, the utility enforces the rules for length and
acceptable characters of the key input method currently selected. To help maintain the
security of the WLAN, after security settings are sent to the adapter or stored in a profile,
only asterisks appear in the key input boxes when the settings are viewed again.
25
7.4 The Site Survey Panel
The Site Survey panel shows the results of searches for WLANs. A search is carried out
automatically when the utility starts up and whenever necessary to establish or maintain a
connection. You can start a search manually by clicking the Search button.
Figure 17. The Site Survey panel
Each WLAN found in a search appears on a line of its own in the Site Survey listing. The
information shown is divided into the following columns:
SSID column: The SSID is a name, usually assigned by the network operator, that is shared by
all members of the WLAN. It is sometimes called the network (or domain) name (or ID).
BSSID column: The BSSID is an automatically assigned numeric identifier. On an infrastructure
WLAN, the BSSID shown is usually the medium access control (MAC) address of the closest
access point; on an ad-hoc network, it is usually the MAC address of one of the members.
BSSIDs are shown in hexadecimal (base 16) notation, with a colon [:] added between each
pair of digits to aid readability.
WEP column: WEP stands for Wired Equivalent Privacy, an encryption method that can
enhance network security. WEP can be enabled or disabled. If it is enabled, you must enable
it with the correct settings on your machine to join the network.
Network Mode column: The network mode can be infrastructure, 802.11 ad-hoc, or high-speed
ad-hoc. In infrastructure mode, all wireless stations communicate through an access point. In
26
ad-hoc mode, wireless stations communicate directly with each other. Only networking
devices from the same product family as your adapter can operate in high-speed ad-hoc mode.
Ch. (Channel) column: A channel is one of 14 groups of adjacent frequencies in the band used
for wireless networking. Not all channels are available in all countries. A station operating in
infrastructure mode automatically finds the channel used by any access point it is within
range of. An ad-hoc WLAN must use a single, fixed channel agreed upon by the members.
Signal Level column: This is the strength of the radio signal as measured at the adapter’s
antenna input. It is shown in dBm, that is, decibels referenced to 1 milliwatt (mW). Decibels
are a logarithmic unit, so -10 dBm equals 0.1 mW, -20 dBm equals 0.01 mW, -30 dBm
equals 0.001 mW, and so on. The closer the figure is to zero, the stronger the signal is (for
example, “-13dbm” represents a stronger signal than “-78dbm”).
The actions you can take in the Site Survey panel are described below.
To change the order in which site survey results are displayed, click a column heading.
For example, you can click the WEP column heading to have all WLANs where WEP is
disabled listed above all WLANs where WEP is enabled. Click again to reverse the order.
To see all of an item (for example, an SSID) that exceeds the width of its column, let the
pointer rest on it for at least half a second.
The full name will usually appear in a pop-up description box. In some columns, more
text must be cut off than in others for the full name to pop up. You can also widen a
column by dragging the right edge of the column header to the right.
To search again for WLANs in your vicinity, choose the Search button.
The utility will “listen” for about five seconds and then display the results.
To join a listed WLAN (or just to create or edit a profile for it) double-click anywhere on
the line showing information about it.
The utility requires that a profile exist for a WLAN before you can join. A dialog box for
creating or editing a profile will appear.
By default, the utility uses the WLAN’s SSID as the profile name. If no profile with that
name exists, the New Profile dialog box will appear. If you already have a profile with
that name, the Profile dialog box will appear. These dialog boxes both contain a
Configuration panel and a Security panel.
In either case, settings that are required for joining the WLAN and were auto-detected
during the Site Survey search will automatically be filled in for you. You might wish to
change the Power Saving Mode setting, and you might need to input or edit security
settings. See section 7.2, “The Configuration Panel,” and section 7.3, “The Security
Panel,” for details.
When finished checking or editing the profile, click the dialog box’s OK button. The
profile will be saved, and you will be asked if you wish to join the WLAN.
27
7.5 The Profiles Panel
The Profiles panel lists existing profiles. The list is initially in order of creation, with the oldest
profiles at the top.
After you have created profiles for a number of WLANs, you will probably use this panel more
than any other. When you are within range of a WLAN that you have a profile for, just (1) start
the utility, (2) click the Profiles tab, (3) double-click the profile, and (4) confirm that you want to
apply the profile and join the WLAN. As long as the WLAN’s settings have not changed, you
will be connected, and you can hide or shut down the utility and start using the network.
The Apply function is also available, along with others, when you “left-click” or “right-click” a
profile in the Profiles panel, as shown below.
Figure 18. The Profiles panel
Each profile occupies a single line in the listing. There are three columns of information:
Profile column: The profile name appears here.
SSID column: This column shows the SSID of the WLAN the profile is for.
WEP column: This column shows the status of Wired Equivalent Privacy encryption in the
profile: disabled, or set to 64, 128, or 256 bits.
28
The actions you can take in the Profiles panel are described below.
To change the order in which profiles are listed, click a column heading.
For example, you can click the SSID column heading to have the list arranged in
alphabetical order of the SSIDs. Click the heading again for reverse alphabetical order.
To see all of a profile name or SSID that exceeds the width of its column, let the pointer
rest on it for at least half a second.
The full name will usually appear in a pop-up description box. In some columns, more
text must be cut off than in others for the full name to pop up. You can also widen a
column by dragging the right edge of the column header to the right.
To apply a profile as quickly as possible, double-click anywhere on the line showing
information about it.
To apply a profile is to send the settings in it to the adapter and try to join the WLAN the
profile is for. You will be asked to confirm that this is what you want to do.
To edit, apply, or remove a profile, click it with the mouse’s main or secondary button
and choose the appropriate button or command.
Clicking a profile with your pointing device’s main button (usually the button on the left)
selects the profile and enables the Edit, Apply, and Remove buttons under the list.
Clicking a profile with the secondary button (usually the button on the right) does all of
this and displays a pop-up menu containing Edit, New, Apply, and Remove commands.
The Edit and New buttons and commands display dialog boxes containing Configuration
and Security panels identical in content and function to the panels of the same names in
the utility’s main window. See section 7.2, “The Configuration Panel,” and section 7.3,
“The Security Panel,” for details. You are asked for confirmation after all major actions.
29
7.6 The About Panel
The About panel contains a copyright statement; gives hardware, software, and firmware version
information; and shows the “regulatory domain” for the which the adapter was made. The
regulatory domain is the country or region whose laws regarding radio transmissions the
adapter’s capabilities conform to.
Figure 19. The About panel
This information can be helpful in the event that you require service or have an opportunity to
upgrade the software. It is a good idea to keep a record of this information for future reference.
30
Appendix A: Technical Support
If you encounter a problem that cannot be solved by following the steps in the troubleshooting
section, call your networking equipment supplier for help. Have the following information ready
before you make the call:
Full product name and, if possible, firmware version number
Version numbers of all software products included in the package
Operating system name and version
Network type and configuration, and any recent configuration changes
Actions that led to the situation that prompted the call
LED status and any on-screen messages seen in connection with the problem
If it appears that a return or exchange will be required, you may be asked to provide the serial
number of the product.
Support personnel may ask you to try to reproduce the problem. They may also ask you to run
some simple tests using diagnostic tools included with the system. Proper preparation on your
part can greatly reduce the amount of time needed to solve the problem.
31
Appendix B: Limited Warranty
Hardware
The manufacturer warrants its products to be free of defects in workmanship and materials, under
normal use and service, for a period of 12 months from the date of purchase from the
manufacturer or its authorized reseller, and for the period of time specified in the documentation
supplied with each product.
Should a product fail to be in good working order during the applicable warranty period, the
manufacturer will, at its option and expense, repair or replace it, or deliver to the purchaser an
equivalent product or part at no additional charge except as set forth below. Repair parts and
replacement products are furnished on an exchange basis and will be either reconditioned or new.
All replaced products and parts will become the property of the manufacturer. Any replaced or
repaired product or part has a warranty of ninety (90) days or the remainder of the initial warranty
period, whichever is longer.
The manufacturer shall not be liable under this warranty if its testing and examination disclose
that the alleged defect in the product does not exist or was caused by the purchaser’s or any third
party’s misuse, neglect, improper installation or testing, unauthorized attempt at repair or
modification, or any other cause beyond the range of the intended use, or by accident, fire,
lightning, or other hazard.
Software
Software and documentation materials are supplied “as is,” without warranty as to their
performance, merchantability, or fitness for any particular purpose. However, the media
containing the software is covered by a 90-day warranty that protects the purchaser against failure
within that period.
Limited Warranty Service Procedure
Any product (1) received in error, (2) received in a defective or non-functioning condition, or (3)
exhibiting a defect under normal working conditions, can be returned to the manufacturer by
following these steps:
1. Prepare the following in printed or electronic form:
Dated proof of purchase
Product model number and quantity
Product serial number
Precise reason for return
Your name, address, email address, phone number, and fax number
2. Inform the distributor or retailer.
3. Ship the product back to the distributor/retailer with freight charges prepaid. The
purchaser must pay the cost of shipping from the distributor/retailer to the manufacturer.
Any package sent C.O.D. (Cash On Delivery) will be refused.
32
Charges: Usually, RMA (Returned Material Authorization) items will be returned to the
purchaser via airmail, prepaid by the manufacturer. If any item is returned by another carrier, the
purchaser will pay the difference. A return freight and handling fee will be charged to the
purchaser if the manufacturer determines that the product is not defective or that the damage was
caused by the user.
Warning
The manufacturer is not responsible for the integrity of any data on storage equipment (hard
drives, tape drives, floppy diskettes, etc.). We strongly recommend that our customers back their
data up before sending such equipment in for diagnosis or repair.
Service After Warranty Period
After the warranty period expires, all products can be repaired for a reasonable service charge.
The shipping charges to and from the manufacturer’s facility will be borne by the purchaser.
Return for Credit
In the case of a DOA item (an item that is “dead on arrival”) or a shipping error, a return for
credit will automatically be applied to the purchaser’s account, unless otherwise requested.
Limitation of Liability
All expressed and implied warranties of a product’s merchantability, or of its fitness for a
particular purpose, are limited in duration to the applicable period as set forth in this limited
warranty, and no warranty will be considered valid after its expiration date.
If this product does not function as warranted, your sole remedy shall be repair or replacement as
provided for above. In no case shall the manufacturer be liable for any incidental, consequential,
special, or indirect damages resulting from loss of data, loss of profits, or loss of use, even if the
manufacturer or its authorized distributor/dealer has been advised of the possibility of such
damages, or for any claim by any other party.
33
Appendix C: Specifications
Standards compliance IEEE 802.11b, IEEE 802.11g, MiniPCI
Regulatory compliance
USA: FCC Part 15 Class B
Frequency band 2400.0 to 2497.0 MHz (Japan)
2400.0 to 2483.5 MHz (North America and Europe)
2445.0 to 2475.0 MHz (Spain)
2446.5 to 2483.5 MHz (France)
Transmitter power 17 dBm (typical)
Receiver sensitivity* 11 Mbps: 8% PER, -82 dBm (typical)
54 Mbps: 10% PER -68 dBm (typical)
* Minimum receiver input power level at which a packet error ratio (PER) of less than the indicated percentage can
be maintained, given a packet length of 1024 bytes and conditions of 20° to 30° C.
Input power DC 3.3V ±5%
Power consumption 550 mA/3.3V (transmitting), 350 mA/3.3V (receiving)
Data rates 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbps with auto
fallback; special user-selectable 22 Mbps option
RF spreading scheme Direct-sequence spread-spectrum (DSSS)
Encoding and modulation
methods
BPSK, QPSK, CCK, OFDM, and PBCC
Security 64- and 128-bit Wired Equivalent Privacy (WEP) encryption
Special user-selectable 256-bit WEP option
Environmental requirements
Operating temperature: 0° to 50° C
Storage temperature: -30° to 70° C
Operating humidity: Tested to RH 85% at 40° C (104° F)
for 48 hours
Accompanying software Drivers for Microsoft® Windows 98/ME (NDIS 5.0), 2000
(NDIS 5.0), and XP (NDIS 5.1); configuration utility with
connection profile management for multiple networks
34
Appendix E: Channels and Regulations
The following table lists the IEEE 802.11b transmission channels and provides important notes
on regulations regarding channel use.
Channel Start, Center, and
End Frequencies (MHz)
Non-overlapped
Channels Notes
1 2401 2412 2423 6-14 1
2 2406 2417 2428 7-14 1
3 2411 2422 2433 8-14 1
4 2416 2427 2438 9-14 1
5 2421 2432 2443 10-14 1
6 2426 2437 2448 1, 11-14 1
7 2431 2442 2453 1, 2, 12-14 1
8 2436 2447 2458 1-3, 13, 14 1
9 2441 2452 2463 1-4, 14 1
10 2446 2457 2468 1-5, 14
11 2451 2462 2473 1-6
12 2456 2467 2478 1-7 2
13 2461 2472 2483 1-8 2
14 2473 2484 2495 1-10 3
1.Notes: Not used where the regulations of Spain or France are in effect.
2. Not used where the regulations of Spain or North America are in effect.
3. Used only where the regulations of Japan are in effect.
An illustration of IEEE 802.11b channel distribution and overlap appears below.
Wireless networking channels in the 2.4-GHz frequency band
35
FCC STATEMEMT:
This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna
and users, and
2) The transmitter module may not be co-located with any other transmitter or
antenna.
As long as 2 conditions above are met, further transmitter test will not be required.
However, the OEM integrator is still responsible for testing their end-product for any
additional compliance requirements required with this module installed (for example,
digital device emissions, PC peripheral requirements, etc.).
IMPORTANT NOTE: In the event that these conditions can not be met (for example
certain laptop configurations or co-location with another transmitter), then the FCC
authorization is no longer considered valid and the FCC ID can not be used on the
final product. In these circumstances, the OEM integrator will be responsible for
re-evaluating the end product (including the transmitter) and obtaining a separate FCC
authorization.
End Product Labeling
This transmitter module is authorized only for use in device where the antenna may be
installed such that 20 cm may be maintained between the antenna and users (for
example access points, routers, wireless ADSL modems, and similar equipment). The
final end product must be labeled in a visible area with the following: "Contains TX
FCC ID: IOU3050S01".
Manual Information for End Users
The end user must not have manual instructions to remove or install the device. The
user manual for end users must include the following information in a prominent
location:
"IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements,
the antenna used for this transmitter must be installed to provide a separation distance
of at least 20 cm from all persons and must not be co-located or operating in
conjunction with any other antenna or transmitter."

Navigation menu