OvisLink WMU-6500FS AirLive Wireless Mini PCI Adapter User Manual

OvisLink Corp. AirLive Wireless Mini PCI Adapter Users Manual

Users Manual

Download: OvisLink WMU-6500FS AirLive Wireless Mini PCI Adapter User Manual
Mirror Download [FCC.gov]OvisLink WMU-6500FS AirLive Wireless Mini PCI Adapter User Manual
Document ID866473
Application IDfcYkepbsStvjoxdSUHayUA==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize172.4kB (2155019 bits)
Date Submitted2007-11-09 00:00:00
Date Available2007-11-09 00:00:00
Creation Date2006-06-15 05:19:48
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2007-11-08 09:07:34
Document TitleUsers Manual

11B/G
WMU-6500FS-MPCI
AirLive Wireless Mini PCI Adapter
User’s Manual
FCC Information
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1.
2.
This device may not cause harmful interference.
This device must accept any interference received; including interference that may cause
undesired operation. Federal Communications Commission (FCC) Statement.
This Equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates uses and can
radiate radio frequency energy and if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC RF Radiation Exposure Statement:
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
-1-
Chapter 1 Install Driver for Windows Series
This section describes the installation of the 11b/g Wireless Mini PCI Adapter driver for the
Windows98/ME/2000 and Windows XP operating systems.
1-1 Set up 11b/g Wireless Mini PCI Adapter for Windows Series
Step 1: After inserting the Wireless Mini PCI Adapter into the Mini PCI port on notebook or
desktop, the Windows will auto-detect the Wireless Mini PCI Adapter and a “Found New
Hardware Wizard” window will show up. Select “Cancel” to install the driver from CD-Rom.
-2-
Step 2: Insert the Product CD-ROM into the CD-ROM drive. Select “Setup.exe” to install Driver
and Utility.
Step 3: After installing the driver, you can check if your device is active in the device management
-3-
Chapter 2 Configure Wireless Mini PCI Adapter
This chapter will show you how to configure your Wireless Mini PCI Adapter by using utility in
the Product CD Package under Windows series Operation System
2-1 Install Utility
1. After finishing the install process, you can execute the utility as follows
2. You will see the utility icon after you executing program “Wireless Utility” if your Wireless
Mini PCI Adapter is alive
3. If your operation system belong to Windows XP and have update to SP1, click the right button
on the icon. You will see the frame below. If you want to configure your Wireless Mini PCI
Adapter with “Wireless Zero Configure” supported by XP, you should choose “Use Zero
-4-
Configuration as Configuration utility”.
-5-
2-2 Configure Wireless Mini PCI Adapter with Zero Configure
After installing Wireless Mini PCI Adapter, the Windows XP will display a “Wireless Network
Connection ” message.
Click on the message and the “Automatic Wireless Network Configuration” will then appear
automatically and allow users to connect to an available Wireless infrastructure network (Access
Point), shown as follows. You may click the “Advanced” button to make advanced configuration
for the Wireless LAN Card, shown as below.
Choose one
suitable server
In order to reconfigure you Wireless connection, you can deal as follow procedure
1. Click left button on the network icon as bellow.
-6-
2. Click Properties to continue
3. Click Wireless Networks to reconfigure the Wireless network connection.
4. If you need a key (WEP) to connect the Wireless network, you should keyin the key that
supported by the Wireless network router or access point
-7-
-8-
Chapter 3 Configure Wireless Mini PCI Adapter with
“ Wireless Utility” for Windows 98/ME/2000/XP
Click the utility icon, and you will see the application interface as step 2.
3-1 Site Survey Page
1. The means of item
z SSID : Name of AP
z BSSID : Mac Address of AP
z Signal : Signal strength of AP
z Channel : AP used channel
z Encryption : what encrypted mechanism does AP used, the encrypted mechanism contain four
ways , WEP, AES, TKIP, NOT USE
z Authentication : What authentication mechanism does AP used.
-9-
z
Network Type : What Network Type does the AP belong to.
2. The connected AP
z the system will choose the suitable AP when you start up RaConfig in the first time
z if you want to connect with another AP, double click mouse’s left button in the SSID of AP.
indicate connect successful.
3. if the connect is success, it will show the SSID of the connected AP
4.
rescan and upgrade all the AP’s information in time
5.
connect with selected AP
6.
Save the selected AP’s information to Profile
3-1-1 Add/Edit Profile
System Configuration: as figure bellow
- 10 -
1. Profile Name: Different AP can be set up into different Profile Name
2. SSID: The drop-down menu can select which AP is detected by system
3. Power Save Mode: can select〔CAM(Constantly Awake Mode)〕 or 〔Power Saving Mode〕
4.
5.
6.
7.
mode. Selecting the” CAM when AC Power” means the power saving mode can automatically
switch into CAM, if the computer uses the AC power, not using the batteries instead. Selecting
the “Power Save Mode” can only work under the infrastructure mode.
Network Type: Can select “Infrastructure” or “802.11 Ad Hoc” mode. When set up to
“Infrastructure” mode, the “Power Saving” mode will be enabled, but the “11b Preamble Type”
will not; When set up to “802.11 Ad Hoc” mode, the “Power Saving Mode” will not be enabled,
but “11b Preamble” will, and the channel selection in the session 7 will show up as well.
TX Power: Transmit power, the amount of power used by a radio transceiver to send the signal
out. User can choose power value by sliding the bar.
Preamble: There are three types, Auto, Long and Short are supported.
Ad hoc wireless mode: There are five types. 802.11B only, 802.11 B/G mixed 802.11A only,
802.11 A/B/G mixed and 802.11G only modes are supported.
- 11 -
8. RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value
directly. The default value is 2312.
9. Fragment Threshold: User can adjust the RTS threshold number by sliding the bar or key in the
value directly. The default value is 2312.
Note: Channel: Only available for setting under ad-hoc mode. User can choose the channel
frequency to start their ad-hoc network.
Profile function is based on the needs to set up the most linkable AP in order to record the system
configuration and to set up the authentication security. The function of each session is shown below
- 12 -
3-2 Authentication & Security
As shown in picture. When the Encryption feature is enabled, the other setups are same as the said
WEP setting.
1. Authentication Type: There are three type of authentication modes supported by RaConfig.
They are open, Shared, WPA-PSK and WPA system.
2. 802.1x Setting: It will display to set when user use radius server to authenticate client certificate
for WPA authentication mode. The detail operation will explain in section 5-6 Configure
connection with WPA by 802.1x setting
3. Encryption Type: For open and shared authentication mode, the selection of encryption type are
None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the
encryption type supports both TKIP and AES.
4. WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and
WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less
than 32 lengths.
5. WEP Key: Only valid when using WEP encryption algorithm. The key must matched AP
key.
There are several formats to enter the keys.
i.
Hexadecimal、40bits:10 Hex characters.
- 13 -
ii.
iii.
iv.
Hexadecimal、128bits:32Hex characters.
ASCII、40bits:5 ASCII characters.
ASCII、128bits:13 ASCII characters.
3-2-1 802.1x Setting
802.1x is a authentication for 『WPA』and 『WPA2』certificate to server. Show as figure
1. Authentication type:
i.
PEAP: Protect Extensible Authentication Protocol. PEAP transport securely
authentication data by using tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients using only server-side
certificates, thus simplifying the implementation and administration of a secure
wireless LAN.
ii.
TLS Smart Card: Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on client-side and
server-side certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys to secure subsequent
communications between the WLAN client and the access point.
- 14 -
iii.
iv.
v.
TTLS: Tunneled Transport Layer Security. This security method provides for
certificate-based, mutual authentication of the client and network through an
encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type
used primarily in Cisco Aironet WLANs. It encrypts data transmissions using
dynamically generated WEP keys, and supports mutual authentication.
MD5-Challenge: Message Digest Challenge. Challenge is an EAP authentication
type that provides base-level EAP support. It provides for only one-way
authentication - there is no mutual authentication of wireless client and the network.
2. Session Resumption: user can choose “ Disable ”, “ Reauthentication ”, “ Roaming ”,
“ SameSsid ” and “ Always ”.
3. Identity and Password: Identity and password for server.
4. Use Client Certificate: Client Certificate for server authentication.
5. Tunnel Authentication
i.
Protocol: Tunnel protocol, List information include “ EAP-MSCHAP ”,
“ EAP-MSCHAP v2 ”, “ CAHAP ” and “ MD5 ”
ii.
Tunnel Identity: Identity for tunnel.
iii.
Tunnel Password: Password for tunnel.
6. CA Server: Certificate Authority Server. Each certificate is signed or issued by it. The detail
operation will explain in section 4-2-2 CA Server
3-2-2 CA Server
Depending on the EAP in use, only the server or both the server and client may be authenticated and
require a certificate. Server certificates identify a server, usually an authentication or RADIUS
server to clients. Most EAPs require a certificate issued by a root authority or a trusted commercial
CA. Show as the figure.
1. Certificate issuer: Choose use server that issuer of certificates.
2. Allow intimidate certificates: It must be in the server certificate chain between the server
certificate and the server specified in the certificate issuer must be field.
3. Server name: Enter an authentication sever root.
- 15 -
- 16 -
3-3 Profile Page
Profile can book keeping your favorite wireless setting among your home, office, and other public
hotspot. You may save multiple profiles, and activate the correct one at your preference.
1. Definition of each field:
i.
Profile: Name of profile, preset to PROF* (* indicate 1, 2, 3,).
ii.
SSID: AP or Ad-hoc name.
iii.
Cannel: Channel in use for Ad-Hoc mode.
iv.
Authentication: Authentication mode.
v.
Encryption: Security algorithm in use.
vi.
Network Type: Network’s type, icluding infrastructure and Ad-Hoc.
2. Connection status
Indicate connection is successful on currently activated profile.
Indicate connection is failed on currently activated profile.
3.
4.
5.
6.
Add a new profile.
Delete an existing profile.
Edit Profile
Activate selected profile.
- 17 -
3-4 Link Status Page
Show the information of linking status. As show in picture 20, the description of each session is said
as following:
1. Status: Current connection status. If no connection, if will show Disconnected. Otherwise, the
SSID and BSSID will show here.
2. Extra Info: Display link status and current channel in use.
3. Link Speed: Show current transmit rate and receive rate.
4. Throughout: Display transmits and receive throughput in unit of K bits/sec.
5. Link Quality: Display connection quality based on signal strength and TX/RX packet error rate.
6. Signal Strength: Receive signal strength, user can choose to display as percentage or dBm
format
7. Noise Level: Display noise signal strength.
- 18 -
3-5 Statistics Page
Statistics page displays the detail counter information based on 802.11 MIB counters. This page
translates that MIB counters into a format easier for user to understand.
1. Transmit Statistics:
i.
Frames Transmitted Successfully: Frames successfully sent.
ii.
Frames Transmitted Successfully Without Retry: Frames successfully sent without
any retry.
iii.
Frames Transmitted Successfully After Retry: Frames successfully sent with one or
more reties.
iv.
Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting
retry limit.
v.
RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RTS
frame.
vi.
RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS.
2. Receive Statistics:
i.
Frames Received Successfully: Frames received successfully.
ii.
Frames Received With CRC Error: Frames received with CRC error.
iii.
Frames Dropped Due To Out-of-Resource: Frames dropped due to resource issue.
iv.
Duplicate Frames Received: Duplicate received frames.
- 19 -
3.
To zero the statistic numbers of transmitting and receiving data.
- 20 -
3-6 Advance Page
The advance setting is shown as follows. The description of each session is said as following:
1. Wireless mode: Select wireless mode. 802.11B only, 802.11 B/G mixed 802.11A only, 802.11
A/B/G mixed and 802.11G only modes are supported.
2. 11B/G Protection: ERP protection mode of 802.11G definition. User can chosse from Auto, On,
and Off
i.
Auto: STA will dynamically change as AP announcement.
ii.
On: Always send frame with protection.
iii.
Off: Always send frame without protection.
3. TX Rate: Manually force the Transmit using selected rate. Default is auto.
4. CCX2.0: support Cisco Compatible Extensions function:
i.
LEAP turn on CCKM
ii.
Enable Radio Measurement: can channel measurement every 0~2000 milliseconds.
5. Tx Burst: Ralink’s proprietary frame burst mode.
6. Wireless radio signal control
: means to open the wireless radio signal and show simultaneously:
: means to close the wireless radio signal and show simultaneously:
- 21 -
7. Apply
Means the modification of session 1~4 are formally used.
- 22 -
3-7 About Page
About page display the wireless card and driver version information shown as follow figure .
1.
2.
3.
Connect to RaLink’s website: Ralink Technology, Corp.
Display Configuration Utility, Driver, and EEPROM version information.
Display Wireless NIC MAC address.
- 23 -
Chapter 4 Example
4-1 Adding profile in site survey page
1. Select the indented network from site survey list.
2. Click ADD PROFILE.
- 24 -
3. System will pop up Add Profile windows
4. Change profile Name from PROF1 to FAVORITE.
- 25 -
5. Click OK without changing other value.
- 26 -
4-2 Add profile in profile page
1.
Click ADD in profile page
2.
Add Profile page will pop up
- 27 -
3.
Change profile name to TEST.
4.
Pull down SSID and select one intended AP. The AP list is the result of last site survey.
- 28 -
5.
Set Power Saving Mode.
6.
Click Authentication & Security page
- 29 -
7.
Click OK. Then we can find the profile name appears in the grid.
8.
Click ACTIVATE. Activate the profile setting.
- 30 -
4-3 WEP encryption
1. Select AP with WEP encryption.
2. Click CONNECT or doucle click intended network.
- 31 -
2. Authentication & Security page pop up.
4. Enter 0123456789 at Key#1 which is same as our intended AP’s setting.
- 32 -
5. Click OK. The result will look like the below figure.
- 33 -
4-4 Configure connection with WPA-PSK
1. Select the AP with WPA-PSK authentication mode.
2. Click CONNECT or double click the intended network.
- 34 -
3. Authentication & Security page will pop up.
*If AP setup security to 〝Both 〞(TKIP + AES), system define is AES that security is severely.
3. Authentication Type is WPA-PSK. Select correct encryption (TKIP or AES).Enter WPA
Pre-Shared Keysecret as 01234567.
- 35 -
4. Click OK. Be careful, if the WPA Pre-Shared Key entered is not correct, even though the AP
can be connected, but you won’t be able to exchange any data frames.
- 36 -
4-5 Configure connection with WPA2-PSK
1.
Select the AP with WPA2-PSK authentication mode.
2.
Click CONNECT or double click the intended network.
- 37 -
3.
Authentication & Security page will pop up. TKIP, AES and Both (TKIP+AES) security are
support.
*If AP setup security to 〝Both 〞(TKIP + AES), system define is AES that security is severely.
4.
Authentication Type is WPA-PSK. Select correct encryption (TKIP or AES). Enter WPA
Pre-Shared Keysecret as 12345678.
- 38 -
5.
Click OK. Be careful, if the WPA Pre-Shared Key entered is not correct, even though the AP
can be connected, but you won’t be able to exchange any data frames.
- 39 -
4-6 Configure connection with WPA by 802.1x setting
1.
Select A.P with WPA authentication mode.
2.
Click CONNECT or double click the intended network
- 40 -
3.
Authentication & Security page will pop up. TKIP, AES and Both (TKIP+AES) security are
support.
*If AP setup security to 〝Both 〞(TKIP + AES), system define is AES that security is severely.
4.
Click 802.1x setting.
- 41 -
5.
802.1x setting page will pop up.
6.
Authentication type and setting method:
1. PEAP:
i.
Authentication type chooses PEAP, key identity into wpatest2. Protocol chooses
EAP-MSCHAP v2 for tunnel authentication, tunnel identity is wpatest2 and tunnel
password is test2. Those setting are same as our intended AP’s setting.
- 42 -
ii.
Click OK. The result will look like the below figure.
- 43 -
2.
TLS / Smart Card:
i.
Authentication type chooses TLS / Smart Card, TLS only need identity that is
wpatest2 for server authentication.
ii.
TLS must use client certificate. Click more to choose certificate.
- 44 -
iii.
Certificate page will pop up; choose a certificate for server authentication.
iv.
Display certificate information in use client certificate page.
- 45 -
v.
3.
Click OK. The result will look like the below figure.
TTLS:
i.
Authentication type chooses TTLS, identity is wpatest2. Protocol chooses CHAP for
tunnel authentication, tunnel identity is wpatest2 and tunnel password is test2. Those
setting are same as our intended AP’s setting.
- 46 -
ii.
Click OK. The result will look like the below figure.
- 47 -
4.
MD5:
i.
Authentication type chooses MD5, MD5 only need identity and password that are
wpatest2 and test2 for server authentication.
ii.
Click OK. The result will look like the below figure.
- 48 -
4-7 Configure connection with WPA2 by 802.1x setting
1.
Select A.P with WPA2 authentication mode.
2.
Click CONNECT or double click the intended network.
- 49 -
3.
Authentication & Security page will pop up. TKIP, AES and Both (TKIP+AES) security are
support.
*If AP setup security to 〝Both 〞(TKIP + AES), system define is AES that security is severely.
4.
Click 802.1x setting.
- 50 -
5.
802.1x setting page will pop up.
6.
Authentication type and setting method:
1. PEAP:
i.
Authentication type chooses PEAP, key identity into wpatest2. Protocol chooses
EAP-MSCHAP v2 for tunnel authentication, tunnel identity is wpatest2 and tunnel
password is test2. Those setting are same as our intended AP’s setting.
- 51 -
ii.
Click OK. The result will look like the below figure.
- 52 -
2.
TLS / Smart Card:
i.
Authentication type chooses TLS / Smart Card, TLS only need identity that is
wpatest2 for server authentication.
ii.
TLS must use client certificate. Click more to choose certificate.
- 53 -
iii.
Certificate page will pop up; choose a certificate for server authentication.
iv.
Display certificate information in use client certificate page.
- 54 -
v.
3.
Click OK. The result will look like the below figure.
TTLS:
i.
Authentication type chooses TTLS, identity is wpatest2. Protocol chooses CHAP for
tunnel authentication, tunnel identity is wpatest2 and tunnel password is test2. Those
setting are same as our intended AP’s setting.
- 55 -
ii.
4.
Click OK. The result will look like the below figure.
MD5:
i.
Authentication type chooses MD5, MD5 only need identity and password that are
wpatest2 and test2 for server authentication.
- 56 -
ii.
Click OK. The result will look like the below figure.
- 57 -
FCC Information
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received; including interference that may cause
undesired operation.
Federal Communications Commission (FCC) Statement.
This Equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates uses and can
radiate radio frequency energy and if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC RF Radiation Exposure Statement:
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of 20
centimeters between the radiator and your body.
IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop
configurations or co-location with another transmitter), then the FCC authorization is no longer
considered valid and the FCC ID can not be used on the final product. In these circumstances, the
OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and
obtaining a separate FCC authorization.
End Product Labeling
This transmitter module is authorized only for use in devices where the antenna may be installed
such that 20 cm may be maintained between the antenna and users (for example access points,
routers, wireless ADSL modems, and similar equipment). The final end product must be labeled in
visible area with the following:
“Contains TX FCC ID: ODMWMU-6500FS”
End Product Manual Information
The user manual for end users must include the following information in a prominent location
“IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antenna
used for this transmitter must be installed to provide a separation distance of at least 20cm from all
persons and must not be co-located or operating in conjunction with any other antenna or
transmitter.”
Other important note:
1. The end user may not be provided with instructions to remove or install the device.
2. Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
3. This device is authorised for OEM integration only.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 5.0 (Windows)
Create Date                     : 2006:06:15 05:19:48Z
Modify Date                     : 2007:11:08 09:07:34+08:00
Metadata Date                   : 2007:11:08 09:07:34+08:00
Format                          : application/pdf
Document ID                     : uuid:baa125e0-1fc3-4404-8ece-6a5892fd469a
Instance ID                     : uuid:2b2946d1-b6b8-48fc-90aa-391f95bb3171
Has XFA                         : No
Page Count                      : 59
EXIF Metadata provided by EXIF.tools
FCC ID Filing: ODMWMU-6500FS

Navigation menu