Senao Co AT53V216 Atheros 11a/g Mini-PCI Adapter User Manual 5354mp aries2 new

Senao International Co Ltd Atheros 11a/g Mini-PCI Adapter 5354mp aries2 new

Manual revised

Download: Senao Co AT53V216 Atheros 11a/g Mini-PCI Adapter User Manual 5354mp aries2 new
Mirror Download [FCC.gov]Senao Co AT53V216 Atheros 11a/g Mini-PCI Adapter User Manual 5354mp aries2 new
Document ID423927
Application IDkIVswqbH/aKhtaFgF4VxfA==
Document DescriptionManual revised
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize131.37kB (1642075 bits)
Date Submitted2004-05-19 00:00:00
Date Available2004-05-19 00:00:00
Creation Date2004-04-29 18:55:37
Producing SoftwareAcrobat PDFWriter 5.0 for Windows NT
Document Lastmod2004-05-19 20:17:27
Document Title5354mp+aries2 new user manual.doc
Document Creator5354mp+aries2 new user manual - Microsoft Word
Document Author: POPO

SENAO
High-Speed Wireless Mini PCI Adapter
OEM installation Manual
Version: 1.0
Chapter 1 Introduction
1.1 Feature
l Fully interoperable with IEEE 802.11a/g compliant products.
l High-Speed data transfer rate up to 108Mbps.
l 64-bit and 128-bit WEP Encryption.
l MAC Address filtering.
l Web-Based Network Manager/Telnet for Configuring and Managing Your access points.
l SNMP MIB I and MIB II supported.
l Capable of acting as a DHCP Server.
l Remote Management supported.
l Firmware Upgrade via WEB/TFTP
l IEEE802.1x/RADIUS Client (EAP-MD5/TLS/TTLS) Support
1.2 Package Contents
l One Access Point (with Mini PCI Adapter)
l One CD-ROM with User Guide included
l One Power Adapter
l One CAT 5 UTP Cable
l One Fast Start Guide and One Registration Card
Chapter 2 Hardware Configuration
2.1 Hardware Configuration
1. RJ-45 Ethernet connector
Provides 10/100 Mbps connectivity to a wired Ethernet LAN.
2. Reset Button
By pressing this button for over 3 seconds, the AP will be reset with factory default
configuration.
3. Power Supply connector
It is for connecting to the power adapter.
2.2 Hardware Installation
1. Configure your notebook or PC with Wireless LAN card.
2. For Wired LAN, connect your PCs’Ethernet port to any AP’s LAN port by an Ethernet cable.
3. For WLAN, locate the AP to a proper position.
4. Plug the power cord into a power outlet.
Chapter 3 Configuring your PC
1. Change the TCP/IP setting of your managing computer. Select the TCP/IP line that has been
associated to your network card. Click the Properties button.
2. Make sure the IP address of your computer and the AP are in the same subnet. The default IP
address of the access point is 192.168.1.1 and the default subnet mask is 255.255.255.0.
3. For WLAN, open the WLAN client utility. Click Configuration tab. Type default SSID (default
SSID: wireless) in the Network Name field. Choose “Access Point” for Network Type, then
click OK button.
Note: the default channel is 6.Configuring the Router through Web Browser
Chapter 4 Initial Software Installation and Configuration
The access point can be configured through your web browser with the Web-Based Utility.
Open your web browser and type the default IP address of the AP in the address field (default IP:
192.168.1.1) and press Enter. Make sure the IP address of AP and your computer are in the same
subnet.
After the connection is established, you will see the User Login page as shown below. Leave
the password field blank when the first time you open the Web-Based utility. You can change the
password on the “Administrator settings” page.
The system will be time out after idling about 1 minute. You have to login again to re-enter the
main setting page. You can change the idle time out period on the “Administrator settings” page.
On any page, you can click HELP to obtain more descriptions and explanatio ns. To clear any
values you’ve entered on any page, click CANCEL and re-enter information.
There are three tabs on the upper right-corner of each page. To go back to the main setting page,
press HOME tab. To log out of the web management, press EXIT tab. To complete any change you
have made, press RESET tab after clicking APPLY button.
Chapter 5 Configuring the Access Point through web browser
5.1.1 Administrator Settings
Set a password to restrict management access to the access point. If you want to manage the access
point from a remote location (outside of the local network), you must also specify the IP address of
the remote PC.
Password Settings:
To change your password, enter your current password in the “Current Password” box. Enter
new password in the “Password” box. Enter it again in the “Re-type password” box to confirm it.
Click APPLY to complete your change.
The “idle Time Out” is the amount of time of inactivity before the access point will
automatically close the Administrator session. Set this to zero to disable it.
Remote Management:
By default, management access is only available to users on your local network. However, you
can also manage the access point from a remote host. Just check the Enable check box and enter the
IP address of an administrator to this screen.
5.1.2 Firmware Upgrade
The firmware information is displayed on this page. You can find firmware version and firmware
date here. There are two ways to upgrade the firmware: “Using TFTP ” and “Using WEB”. Click
“NEXT” button to choose the one you want.
Using TFTP
On the managed computer, run the TFTP Server utility. And specify the folder in which the
firmware file resides. After running the TFTP server, enter the TFTP server IP and the filename on
the following page. Click on APPLY to complete your change.
l
Using WEB
Type the correct firmware file path and file name on the File field. You can click Browse to
select the file location. Click on APPLY to complete your change.
5.1.3 Configuration Tools
This tool can backup or restore the AP’s configuration. It can also restore the original factory
default settings.
Restore Factory default configuration:
(1) Chick the “Restore Factory Default Configuration” button and then click NEXT.
(2) Click Restore button to force the access point to perform reset and restore the original
factory settings.
Backup Setting/Restore Settings:
(1) Check the “Backup Settings/Restore Settings” radio button and click NEXT.
(2) To save the access point's current configuration to a file named "config.bin" on yo ur PC, click
Backup Settings button.
(3) To restore configuration, you can use the "Restore Settings" tool to restore the saved
configuration of the access point.
(4) Enter the path and file name then click Restore Settings button. You can also click Browse to
locate and select the previously saved backup file.
5.1.4 Status
The Status window displays current information and settings for your AP. It has five main
parts – LAN, Wireless 11a, Wireless 11g, System Information.
For LAN, it displays AP’s IP address, MAC address, and Subnet Mask. It also displays the IP
address of the DNS and the number of clients connected by DHCP server.
For Wireless 11a, it displays SSID, Channel, WEP security status, and wireless MAC address
of the 11a adapter.
For Wireless 11g, it displays SSID, Channel, WEP security status, and wireless MAC address
of the 11g adapter.
For System Information, it displays system time, firmware version, firmware date, hardware
version, and serial number.
You can obtain the most up-to-date information by pressing the “Refresh” button.
5.1.5 Reset
In the event that the access point stops responding correctly or in some way stops functioning,
you can perform a reset. Your settings will not be changed. To perform the reset, click on the Reset
button below. You will be asked to confirm your decision. The reset will take about 18 seconds.
10
5.2
5.2.1
LAN Setting
LAN Settings
You can change the basic settings of AP here, including IP address, Subnet mask, IP Pool
Address, Lease Time, and Local Domain Name. Click APPLY to complete your change.
11
(1) IP Address: The IP address of the AP. You should have a unique IP address to your network.
The default value is 192.168.1.1.
(2) Subnet Mask: The Subnet Mask of your access point. The default value is 255.255.255.0.
(3) DHCP Server: By default, the AP can function as a DHCP server. The AP can automatically
assign an IP address to a client. To enable this function, clear the “Enable” check box.
(4) IP Pool Starting Address & IP Pool Ending Address: The first and the last address in the IP
address pool.
(5) Lease Time: The period client can have the IP address assigned by DHCP server.
(6) Local Domain Name: It’s optional.
5.2.2
DNS Settings
Domain Name Servers are used to map an IP address to the equivalent domain name. Your ISP
should provide the IP address for one or more domain name servers. The access point can be a DNS
relay to send clients’ request to the Domain Name Server. You can do a DNS lookup to find the IP
address of some specific servers. Click APPLY to complete your change.
12
5.2.3 MAC Control
You can block certain clients PCs accessing the internet based on MAC address.
When you enable “MAC Address Control” without allowing unspecified MAC address
connect to internet, you will block all client PCs accessing the internet. The clients whose MAC
addresses listed in the “MAC Address Control List” can access the internet only if the “Allow
Connect to Internet is checked.
5.2.4 MAC address filtering
The maximum number of items is 64. Check the select check box to include or exclude
corresponding items. The wireless clients whose MAC addresses listed in the “MAC address table”
cannot get associations to the AP while the “Filtering type” is chosen to “Include”. On the other
hand, only those wireless client s’ with MAC addresses listed in the “Exclude” filtering list can
associate to the AP. The MAC address filtering function can be disabled by choosing the “Filtering
type” to “Disable”. Click APPLY to complete your change.
13
5.3
Wireless Setting
11a
In this window you can make changes to the default wireless settings. For communicating, all
computers on the network must be within the same IP Address range, and have the same settings for
the Radio channel and SSID. If you don’t want to utilize WEP Encryption, select “None ” to disable
this function.
1.
SSID: The SSID is a unique name shared among all points in your wireless network. The
SSID must be identical for all points in the network. It is case sensitive and must not exceed
32 characters. The default SSID for 11a Interface is wireless_11a.
2.
Channel: The channel shared by all wireless devices. The range of channel is 1~12.
3.
WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area
networks (WLANs) defined in the 802.11a standard. WEP is designed to provide the same
level of security as that of a wired LAN. Select None to disable this function.
There are two WEP Encryption key length: 64-bit(10 hex digits) 128 bit(26 hex digits) and
152 bit(32 hex digits).
14
n
Data Rate: Specify the transmit and receive data rate. Select the desired rate from the
drop-down menu.
Transmit Power: Specify the level of the transmit power. Use the drop-down menu to
specify the value of the transmit power.
Beacon Interval (20~1000): Beacon transmissions announce the existence of 802.11
network at regular intervals. Enter a value between 20 and 1000 to specify the Beacon
Interval.
Data Beacon Rate (1~16384): Specify the Data Beacon Rate. Enter a value between 1
and 16384 that specify the Delivery Traffic Indication Message (DTIM).
Fragment Length (256~2346): Enter a value between 256 and 3346 to specify the
Fragment Length.
RTS/CTS Threshold (256~2346): Packets large than the value are preceded by an
RTS/CTS handshake. Enter a value between 256 and 2346 to specify the value of the RTS
/CTS Threshold.
15
4. 802.1X: The 802.1X standard is designed to enhance the security of wireless local area networks
that follow the IEEE 802.11 standard. 802.1X uses an existing protocol, the Extensible
Authentication Protocol (EAP) for message exchange during the authentication process.
In a wireless LAN with 802.1X, a user requests access to an access point (known as the
authenticator). The access point forces the user into an unauthorized state that allows the client to
send only an EAP-start message. The AP replies with an EAP-request identify message to obtain
the clients identity. The clients EAP-response packet containing the clients identity is forwarded to
the authentication server. The authentication server is configured to authenticate clients with a
specific authentication algorithm. The result is an accept or reject packet from authentication server
to AP. Once authenticated, the AP opens the client’s port and traffic will be forwarded.
Authentication type: There are three EAP (Extensible Authentication Protocol) types supported.
You can choose between EAP-TLS 1 , EAP-MD5 2 , and EAP -TTLS 3 . You can choose NONE to
disable the 802.1X.
Re-authentication time: The time period that AP informs clients to re-authenticate.
Radius Server:
1. Primary Radius Server: The IP address and port number of Primary Radius Server. You
need to know the shared secret between AP and Radius Server. The default port number is 1812.
2. Backup Radius Server: The IP address, shared secret, and port number of backup Radius
Server. It is optional.
11g
In this window you can make changes to the default wireless settings. For communicating, all
computers on the network must be within the same IP Address range, and have the same settings for
the Radio channel and SSID. If you don’t want to utilize WEP Encryption, select “None ” to disable
this function.
1. SSID: The SSID is a unique name shared among all points in your wireless network. The
SSID must be identical for all points in the network. It is case sensitive and must not
exceed 32 characters. The default SSID for 11g Interface is wireless_11g.
TLS- Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the
Internet. When a server and c lient communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the
successor to the Secure Sockets Layer.
MD5- provides basic security and is analogous to the challenge handshake authentication protocol (CHAP). MD5 is intended for use
with signal signature applications, which require that large files must be compressed by a secure method before being encrypted with a
secret key, under a public key cryptosystem.
TTLS- provides mutual authentication, supports legacy password protocols and does not require clients to have certificates. As a result,
enterprises can reduce the costs associated with operating a certificate authority to distribute and revoke user certificates.
16
2. Channel: The channel shared by all wireless devices. The range of channel is 1~11.
3. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area
networks (WLANs) defined in the 802.11a standard. WEP is designed to provide the same
level of security as that of a wired LAN. Select None to disable this function.
There are two WEP Encryption key length: 64-bit(10 hex digits) 128 bit(26 hex digits) and
152 bit(32 hex digits).
n Data Rate: Specify the transmit and receive data rate. Select the desired rate from the
drop-down menu.
n Transmit Power: Specify the level of the transmit power. Use the drop-down menu to
specify the value of the transmit power.
n Beacon Interval (20~1000): Beacon transmissions announce the existence of 802.11
network at regular intervals. Enter a value between 20 and 1000 to specify the Beacon
Interval.
n Data Beacon Rate (1~16384): Specify the Data Beacon Rate. Enter a value between 1
and 16384 that specify the Delivery Traffic Indication Message (DTIM).
n Fragment Length (256~2346): Enter a value between 256 and 3346 to specify the
Fragment Length.
n RTS/CTS Threshold (256~2346): Packets large than the value are preceded by an
RTS/CTS handshake. Enter a value between 256 and 2346 to specify the value of the RTS
/CTS Threshold.
17
4. 802.1X: The 802.1X standard is designed to enhance the security of wireless local area
networks that follow the IEEE 802.11 standard. 802.1X uses an existing protocol, the
Extensible Authentic ation Protocol (EAP) for message exchange during the authentication
process.
In a wireless LAN with 802.1X, a user requests access to an access point (known as the
authenticator). The access point forces the user into an unauthorized state that allows the
client to send only an EAP-start message. The AP replies with an EAP-request identify
message to obtain the clients identity. The clients EAP-response packet containing the
clients identity is forwarded to the authentication server. The authentication server is
configured to authenticate clients with a specific authentication algorithm. The result is an
accept or reject packet from authentication server to AP. Once authenticated, the AP opens
the client’s port and traffic will be forwarded.
18
Authentication type: There are three EAP (Extensible Authentication Protocol) types
supported. You can choose between EAP-TLS 4 , EAP-MD5 5 , and EAP -TTLS 6 . You can
choose NONE to disable the 802.1X.
Re-authentication time: The time period that AP informs clients to re-authenticate.
Radius Server:
1. Primary Radius Server: The IP address and port number of Primary Radius Server.
You need to know the shared secret between AP and Radius Server. The default port number
is 1812.
2. Backup Radius Server: The IP address, shared secret, and port number of backup
Radius Server. It is optional.
TLS- Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the
Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the
successor to the Secure Sockets Layer.
MD5- provides basic security and is analogous to the challenge handshake authentication protocol (CHAP). MD5 is intended for use
with signal signature applications, which require that large files must be compressed by a secure method before being encrypted with a
secret key, under a public key cryptosystem.
TTLS- provides mutual authentication, supports legacy password protocols and does not require clients to have certificates. As a result,
enterprises can reduce the costs associated with operating a certificate authority to distribute and revoke user certificates.
19
n
5.4
802.1x Status
In this window, it shows the 802.1x status information of the supplicants, including the
port number, MAC address, Authentication PAE state, Backend state, Rx bytes, Tx
Frames, Tx bytes, Session time, and Last Session time.
SNMP
Short for Simple Network Management Protocol, a set of protocols for managing complex
networks. SNMP works by sending messages, called protocol data units (PDUs), to different parts
of a network. SNMP-compliant devices, called agents, store data about themselves in Management
Information Bases (MIBs) and return this data to the SNMP requesters.
5.4.1 SNMP Community
SNMP Community provides a simple kind of password protection. Access to the SNMP
device is controlled through community names. The community name can be thought of as a
password. If you don’t have the correct community name you can’t retrieve any data (get) or make
any changes (sets). Multiple SNMP managers may be organized in a specified community. You can
change your SNMP community settings on this screen. Check the “Enable ” check box to enable the
SNMP function. Click APPLY to complete your change.
20
Validity: You can enable or disable the SNMP function of the corresponding community item.
Access Right: Select a access right for the corresponding SNMP community
(Deny7 /Read8 /Write9 ).
Community: Specify the name of community for the SNMP manager( Private/Public). By
convention, “Public” community is with a read-only access right.
5.4.2 SNMP Trap
Traps can be used by network entities to signal abnormal conditions to management stations.
SNMP TRAP message can be sent to a host. Click APPLY to complete your settings.
Version: Select the SNMP Version.
Select “Disable” to disable the snmp trap function of the corresponding item.
Version1: SNMP Version1
Version2: SNMP Version2
IP Address: Specify the IP Address of the SNMP Manager for SNMP Trap Report.
Community: Specify the name of community ( public/Private) for SNMP manager.
Following are the traps supported in the access point:
Cold-start trap:
This trap indicates that the specified node’s power has just come on. The cold-start trap is
generated every time the access point is power-cycled. Cold-start traps are not generated
until three seconds after the access point is power-cycled. This allows time for the hardware
Deny community will not allow a remote device to read information from a device or to modify settings on that
device.
Read-only community enables a remote device to retrieve "read-only" information from a device.
Read-Write community allows a remote device to read information from a device and to modify settings on that
device.
21
providing the low- level IP network interface to start up and stabilize before attempting to
send a packet.
22
Appendix A Specifications
1. General
Radio Data Rate
(Auto-rate capable)
802.11a :
6, 9, 12, 18, 24, 36, 48, 54 & 108Mbps turbo
mode
802.11g :
6, 9, 12, 18, 24, 36, 48, 54 & 108 Mbps turbo
mode
802.11b :
1, 2, 5.5, 11Mbps
Network Standards
WECA
(Wi-Fi
Wi-Fi5
Compliant),
IEEE802.11, IEEE802.11a, IEEE802.11g draft,
IEEE802.11b, draft IEEE802.11e, f, h and I
standards, IEEE802.11x (Optional)
l IEEE802.11x Support for LEAP (Optional)
l WPA – Wi-Fi Protected Access (64, 128,
152-WEP with TKIP)
Security
Network Architecture
Support ad-hoc, peer-to-peer networks and
infrastructure
communications to wired Ethernet networks via
Access Point
Drivers
Access Protocol
Windows 98/ME/2000/XP
CSMA/CA with ACK
Roaming
IEEE802.11b compliant
Operating Voltage
Regulation
Certifications
3.3V/5V
FCC Part 15/UL, ETSI 300/328/CE
LED Indicator
RF Link activity
2. RF Information
Frequency Band
802.11a :
5.15 to 5.25GHz
5.25 to 5.35GHz
5.725 to 5.825GHz
802.11b/g :
2.412 to 2.462GHz (United States)
23
2.412 to 2.484GHz
2.412 to 2.472GHz
2.457 to 2.462GHz
2.457 to 2.472GHz
Modulation
Technology
Receive Sensitivity
(Typical)
802.11a/g : OFDM (64-QAM, 16-QAM, QPSK,
BPSK)
802.11b : DSSS (DBSK, DQPSK, CCK)
802.11a :
-86dBm@6Mbps, -80dBm@18Mbps, -70dBM@
48Mbps
-84dBm@9Mbps, -77dBm@24Mbps, -68dBM@
54Mbps
-82dBm@12Mbps, -73dBm@36Mbps
802.11b/g :
-91dBm@1Mbps, -85dBm@9Mbps, -77dBM@
36Mbps
-89dBm@2Mbps, -82dBm@12Mbps, -76dBM@
48Mbps
-87dBm@5.5Mbps,
-80dBm@18Mbps,
-73dBM@ 54Mbps
-86dBm@6Mbps, -78dBm@24Mbps
Transmit Output Power 802.11a : Up to 18dBm
802.11b/g : Up to 21dBm
3. Environmental
Temperature Range
-10℃ to 60℃ (14℉ to 140℉) – Operating
-40℃ to 70℃ (-40℉ to 158℉) - Storage
Humidity
(non-condensing)
5% to 95% Typical
4. Physical Specifications
Interface
Mini PCI TypeIII A
Antenna
Two Antenna Connectors(U.FL)
Dimensions
50.9(L) mm x 59.6(W) mm x 4.8.(H) mm
2 (L) in x 2.3(W) in x 0.2.(H) in
24
Appendix B Regulatory Compliance Information
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the
interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference, and (2)
this device must accept any interference received, including interference that may
cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party
responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
25
This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna and
users, and
2) The antenna should be integral if the end device is intended to be operated in 5.15 ~
5.25GHz frequency range.
As long as 2 conditions above are met, further transmitter test will not be required. However,
the OEM integrator is still responsible for testing their end-product for any additional
compliance requirements required with this module installed (for example, digital device
emissions, PC peripheral requirements, etc.).
IMPORTANT NOTE: In the event that these conditions can not be met (for example
certain laptop configurations or co-location with another transmitter), then the FCC
authorization is no longer considered valid and the FCC ID can not be used on the final
product. In these circumstances, the OEM integrator will be responsible for re-evaluating
the end product (including the transmitter) and obtaining a separate FCC authorization.
End Product Labeling
This transmitter module is authorized only for use in device where the antenna may be
installed such that 20 cm may be maintained between the antenna and users (for example:
Access Point, Router). The final end product must be labeled in a visible area with the
following: “Contains TX FCC ID: N13-AT53V216”.
Manual Information That Must be Included
The OEM integrator has to be aware not to provide information to the end user regarding
how to install or remove this RF module in the users manual of the end product which
integrate this module.
The users manual for OEM integrators end users must include the following information in a
prominent location “ IMPORTANT NOTE: To comply with FCC RF exposure compliance
requirements, the antenna used for this transmitter must be installed to provide a separation
distance of at least 20 cm from all persons and must not be co-located or operating in
conjunction with any other antenna or transmitter”.
If the end product integrating this module is going to be operated in 5.15 ~ 5.25GHz
frequency range, the warning statement in the user manual of the end product should
include the restriction of operating this device outdoor could void the user’s authority to
operate the equipment
26

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Copy, Fill forms, Extract, Assemble, Print high-res
Create Date                     : 2004:04:29 18:55:37Z
Modify Date                     : 2004:05:19 20:17:27+08:00
Page Count                      : 27
Creation Date                   : 2004:04:29 18:55:37Z
Author                          : POPO
Producer                        : Acrobat PDFWriter 5.0 for Windows NT
Mod Date                        : 2004:05:19 20:17:27+08:00
Metadata Date                   : 2004:05:19 20:17:27+08:00
Title                           : 5354mp+aries2 new user manual.doc
Creator                         : POPO
EXIF Metadata provided by EXIF.tools
FCC ID Filing: NI3-AT53V216

Navigation menu