Summit Data Communications SDMCF10G 802.11g Mini-Compact Flash Module with Dual U.FL User Manual 3 XDW
Summit Data Communications, Inc. 802.11g Mini-Compact Flash Module with Dual U.FL 3 XDW
Manual
User’s g‘; i_d§ for Summit CFIOG PCIDG and MCFlOG 07 11 06 Summit Data Communications, Inc. User’s Guide for CF10G, PC10G, and MCF10G Version 0.8 Summit Data Cammunicatians, Inc. i CONFIDENTIAL User’s Guide for Summit CFlOG PCIOG and MCFlOG 07/11 06 Table of Contents 1.0 INTRODUCTION.... 1.1 PRODUcr OVERVIEW 1.2 THIS MANUAL ..... 1.3 SECURITY CAPABILITIESMI 114 INTERACTING wrrI-I TI-IE RADIO MODULE 2.0 GETTING STARTED . 211 STEP 1: INSTALL THE SUMMIT SOI-‘I'WARE ...... 2.2 STEP 2: INSTALL THIE RADIO MODULE IN THE HOST DEVICE 2.3 STEP 3: CONFIGURE THE MANNER OF OBTAINING AN IP ADDRESS 244 STEP 4: CONNECT TO YOUR WLAN , 2.4,1 PreferredMethod: Use SCUM 2,4.2 Alternative: Use Windows Zero Canfig 3.0 USmG THE SUMMIT CLIENT UTILITY ...... 3,1 MAIN WINDOW. 3.2 Com-10 WINDO 33 GLOBAL SETTINGS WINDOW 3.4 STATUS WlNDOW 3.5 DIAGS WINDOW.,.. APPENDIX: FCC INFORMATION Summit Data Communications, Inc. ii CONFIDENTIAL User’s Guide for Summit CFlOG PClOG and MCFlOG 07 11/06 1.0 Introduction Thank you for choosing a compact flash (SDC-CFIOG), PCMClA (SDC-PCIOG), or miniature compact flash (SDC—MCFIOG) wireless LAN radio module from Summit Data Conununications, Inc. This radio module, or WLAN client adapter, enables a computing device to communicate to a computing network using the IEEE 802.11g and IEEE 802.11b protocols. The hardware components and software for all three radio modules are the same The PCIOG is a CFIOG in a specially designed PCMCIA carrier, and the MCFIOG is essentially a CFIOG with a different layout and a different (Molex) connector 1.1 Product Overview For an overview of Summit WLAN radio modules, go to http:[zwww.summitdatacom.com[products.htm. 1.2 This Manual This manual is a user‘s guide for 3 Summit radio module that is installed or will be installed on a computing device that is running one of the following operating systems: - Windows CE 4.2 0 Windows Mobile 2003 ' Windows CE 5.0 - Windows Mobile 5.0 The software for all three radio modules is the same. This manual may refer to any of the modules as the CF 1064 1.3 Security Capabilities Summit radio modules typically are used in business-critical mobile devices that transmit sensitive information, such as inventory data and patient information, over the air that separates the mobile devices from the network To protect transmitted data as well as the mobile devices and network infrastructure that transmit and receive the data, an organization’s IT department often imposes on mobile devices the same strict security standards imposed on other client devices. Summit’s integrated approach to security simplifies the task of enforcing a consistent security policy on all devices. A foundational element of the IEEE 802.11i WLAN security standard is IEEE 802.1X, and a critical application on a mobile device is an 802.1X supplicant. Such a supplicant provides an interface between the radio and the operating system and supports the authentication and encryption elements required for 802t11i, also known as Wi-Fi Protected Access 2 or WPA2, as well as predecessors such as WPA and WEP. Summit software includes an integrated supplicant that supports a broad range of security _ capabilities, including: ° 802.1X authentication using pre‘shared keys or an EAP type, required for WPA2 and WPA ' Data encryption and decryption using WPA2 ABS, WPA TKIP, or WEP The Summit supplicant supports the following EAP types: ' EAP-TLS: Uses the same technology as is a follow-on to Secure Socket Layer (SSL) It provides strong security, but relies on client certificates for user authentication. - PEAP: Provides secure user authentication by using a TLS tunnel to encrypt BAP traffic. Two different inner methods are supported with PEAP: - EAP-MSCHAPVZ, or PEAP-MSCHAP: This is appropriate for use against Windows Active Directory and domains Summit Data Communications, Inc. 1 CONFIDENTIAL User’s Guide for Summit CFlOG PCIOG and MCFIOG 07/11 06 - EAP-GTC, or PEAP-GTC: This is for authentication with one-time passwords (OTPs) against OTP databases such as SecureID - LEAP: Is an authentication method for use with Cisco WLAN access points. LEAP does not require the use of server or client certificates. LEAP supports Windows Active Directory and domains but requires the use of strong passwords to avoid a vulnerability to offline dictionary attacks. ' EAP-FAST: Is a successor to LEAP and does not require strong passwords to protect against offline dictionary attacks Like LEAP, BAP-FAST does not require the use of server or client certificates and supports Windows Active Directory and domains PEAP and EAP~TLS require the use of Windows facilities for the configuration of digital certificates. 1.4 Interacting with the Radio Module The software that Summit provides for its radio modules includes: . A device driver for the operating system running on the computing device that houses the radio module - An integrated 802.1X supplicant, which is described in the previous section ' The Summit Client Utility (SCU), a configuration, moniLoring, and management application designed for Summit radio modules You can configure radio and security settings, monitor performance and activity, and troubleshoot issues with the radio module using any of the following: 0 SCU ' Another application, such as Wavelink Avalanche, that uses the application programing interface (API) for SCU Native facilities in the operating system, such as Windows Zero Config (WZC) This guide assumes that you are using SCU for all interactions with the radio module Summit Data Communications, Inc. 2 CONFIDENTIAL User’s Guide for Summit CFIOG PCIOG and MCFIOG 07/11 06 2.0 Getting Started Before you can use the CFlofi, PCIOG, or MCFlOG, you must install it in a computing device. Before you install the module, you will require the following itcms and information: ' A mobile computing device with: - An internal compact flash (CF) Type I or Type II slot, internal PCMCIA slot, or internal miniature CF slot — One or two internal antennas fitted with Hirose U.FL connectors - Microsoft Windows CE Version 4.2 or 5.0, Microsoft Windows Pocket PC 2003, or Windows Mobile Version 5.0 ' Summit CFIOG software, which is available from the Summit web site, wwwsummitdatacomcom ° The network name (SSID) of your wireless network To make the radio module operational, you must perform the following four steps: Install the Summit software Install the radio module in your mobile computing (or host) device Configure the manner of obtaining an IP address Connect to your wireless network PENN!" It is recommended that you complete the steps in order. If you insert the card in your device before you install the software, then the “Found New Hardware Wizard” screen will appear, and you must select “Cancel” to cancel the Hardware Wizard. 2.1 Step 1: install the Summit Software a) Download the appropriate SDC—CFIOG “cab” file for the type of device you are using. The “cab” file is the software equivalent of a “file cabinet” which contains the driver for the radio as well as the SCU (Summit Client Utility). b) Copy the file to your device using a supported file transfer mechanism. Common methods of moving the file include: - Place the file on a supponed Compact Flash or SD memory card and use that card for copying the file to the device - Use a program such as FTP or Microsoft ActiveSync c) On the device, use the resident File Explorer program to locate the “cab” file d) Run the “cab” file by single-clicking the file or by right-clicking and selecting “run” e) If asked to replace any existing files on the device, answer “yes to all” 2.2 Step 2: Install the Radio Module in the Host Device a) Insert the card into a CF or PCMCIA slot or, in the case of the MCFlOG, attach the card’s Molex connector to the corresponding Molex connector on the device’s board b) Connect the device’s internal antenna or antennas to the card via the UAFL connector or connectors — If there is one antenna, connect it to the radio module’s main connector, which is nearer to the right edge of the card 2.3 Step 3: Configure the Manner of Obtaining an IP Address 3) Select Programs, then Settings, then the Connections tab at the bottom of the Settings screen b) Select Connections and then Advanced c) On the Advanced Connections screen, select the Network Card button and then select the Summit WLAN Adapter from the list of available network devices Summit Data Communications, Inc, 3 CONFIDENTIAL U as Guide for Summit CFloG PCIOG and MCFlOG 07 11 06 d) On the screen that appears, choose that a server will assign an 1? address (using DHCP) or enter a spectfic [P address e) If you select the Name Sewers tab, you can statically configure DNS servers, but if you use DHCP for IP address assignment then DNS usually is supplied by the same server that hands out IP addresses 2.4 Step 4: Connect to Your WLAN Two methods exist for configuring the radio module for operation on a wireless network The first and preferred method is to use the Summit Client Utility (SCU). The other method is to use WZC, which is the Microsoft program for configuring any WLAN card. 2.4.1 Preferred Method: Use SCU To use the SCU to connect to your wireless network, do the following: a) From the Start menu, select Programs, then select the directory called Summit b) Inside the Summit directory are two items: a directory for the storage of security certificates and the SCU. To run the SCU, double-click the SCU icon c) Select the Admin Login button to have privileges to make changes to the configuration The default password is “SUMMIT” d) At the bottom of the screen are tabs for Main, Config, Status, Diags, and Global Settings. To create a new profile, select the Config tab e) When the default configuration appears in the Config drop~down box, select the New button below the Config dialog box 1) When a pop-up screen prompts for a name, enter any alpha-numeric name to identify this configuration (as unique from other configurations or SSIDs on the device) g) Tap the OK button to return to the Config tab h) Tap the Commit button to save the configuration name i) When a message pops up to indicate that this conunand has been saved, select OK on that pop-up to return to the Config tab j) To configure the SSID for the network to which you wish to associate, enter an SSID in the text box to the right of “SSID”, and select the Commit button and 0K at the pop-up k) To configure authentication and encryption, use the appropriate drop-down boxes on the lower half of the screen, and enter credentials for IEEE 802.1X EAP types or WEP keys just below the drop-down boxes (to View the security drop-down boxes, you may have to minimize the alpha-numeric keyboard provided by the operating system) 1) Configure any other settings that are dictated by the network administrator for the SSID to which you must associate, being sure to select Commit after each change in) Select the Main lab n) In the Active Config drop-down box will appear the newly created Config. Select this Config, and the Summit radio module will attempt to connect to the network using the following steps: - Associate to the SSID Authenticate to the network If EAP authentication is being used, derive dynamic encryption keys If DHCP is being used by the network, obtain an IP address To assist with troubleshooting of any connectivity issues, the Status tab reflects the current state of the device and the Ding tab allows for DHCP renewal and ICMP Echo Requests, also known as Pings, to be sent by the device. Summit Data Communications, Inc 4 CONFIDENTIAL User’s Guide for Summit CF10G PCIOG and MCFIOG 07/11/06 2.4.2 Alternative: Use Windows Zero Config Another method of configuring the radio module is through the operating system’s WZC feature. If the radio module is inserted and the SCU is not configured, then WZC will attempt to use the card to attach to an available WLAN, A p0p~up box will appear that indicates which networks (SSIDs) have been located and asks the user which network the device should use. Selecting an SSID that requires security will prompt the user for security keys or credentials. If the correct credentials are entered, then the WZC process will attempt to associate, authenticate, and run the appropriate encryption required to connect the user to the network. Summit Data Communications, Inc. 5 CONFIDENTIAL User’s Guide for Summit CFlUG PCIOG and MCFlOG 07 11 06 3.0 Using the Summit Client Utility The Summit Client Utility (SCU) is an application designed for end users and administrators of mobile devices that use a Summit radio module. Using SCU, an end user can view: ' The contents of profiles, each of which houses the RF, security, and other settings for the radio ' Global settings, which apply to every profile ' A snapshot status of the current wireless network connection - More detailed status information on the radio, the AP to which it is connected, and the RF connection or link between the two ' ln-depth diagnostic information on the connection and the radio, most likely to report it to an administrator when there is a connection or performance issue Other information on the radio, such as software versions and regulatory domain After completing an administrator login to the utility, a user can perform these additional tasks: - Turn the radio on and off ' Select the profile to be used - Create, rename, edit, and delete profiles ' Alter global settings, which apply to every profile - Perform various troubleshooting and diagnostic tests The SCU provides a graphical user interface (GUI) for access to all of its functions. Access to these functions also is available through an application programming interface (API) that is provided to every Summit customer. A Summit customer can use the AP] to manage the radio from another utility, such as one that the customer provides with its mobile devices. Wavelink Avalanche also uses this APIi The SCU has five windows: Main, Config, Global Settings, Status, and Diags (or Troubleshooting). Tabs which are shown as item 8 in Figure 1 below, enable easy navigation between windows. Each window is described in more detail in this section. llmmlt (lient Utllt SUMMlT: “n < mmumcnmm meme @ 3 Activemme Is Associated c— 4 Association status WorIdWide 5 Regulatory domain Driver VLDUJS SCU VLEIUJEI E Sofiwaro versions -oweroo by DeviceSane Th|s product includes software developed by the OpenSSL Project 1 Admin Iogin/logout Z Enable/disable radio 7 About box © 2005 Summit Data Corrrnunlcations Main ft ' 's “ D ‘ ‘ . 8 Tabs Summit Data Communications, Inc. 6 CONFIDENTIAL User’s Guide for Summit Cl-‘lUG PCIOG and MCFIOG 07/11/06 3.1 Main Window Figure 1 on the previous page is an example of a Main window. Here are the highlights: 1. Admin login/logout: To login to SCU as an administrator, you select this button when “Admin Login” is displayed and supply the correct admin password on the dialog box. The default password is “SUMMIT” in all capital letters. (The password can be changed through the Admin Password function on the Global Settings window.) Once you are logged in as an administrator, clicking the button again logs you out as an administrator, leaving you with access only to end-user functions. Enable/disable radio: When the radio is enabled, selecting this button disables it; when the radio is disabled, selecting this button enables it. Active profile: A user can view the name of the active profile. An administrator can use the selection list to select a different profile. Association status: Indicates if the radio is associated to an access point and, if not, what the radio’s status is. Regulatory domain: Indicates the regulatory domain or domains for which the radio is configured. “Worldwide” means that the radio can be used in any domain. Domain cannot be configured by an administrator or user. Software versions: Indicates the version of the device driver and the version of SCU that are running on the ASD. About box: Supplies information on SCU that on a Windows application normally would appear under Help | About. 3.2 Config Window Config settings are radio and security settings that are stored in the registry as part of a config, or profile. When a config is selected as the active config, the settings for that config become active. An administrator can define, change, and delete a config on the Config window in SCU. 14 Profile 2 Actions 3 Radio attribute and setting You must click on Commit to save the ,, Config‘s settings 4 Security settings Figure 2: Config window Figure 2 above is an example of a Config window. Here are the highlights: Summit Data Communications, Inc. 7 CONFIDENTIAL User’s Guide for Summit CFIOG PC10Ei and MCFIOG ' Profile: This is used to select the profile to be viewed or, if you are an administrator, edited. ' Actions: Four actions are available to an administrator: - Rename: Give tlle profile a new name, one that is not assigned to another profile - Delete: Delete the profile, provided that it is not the active profile - New: Create a new profile with default settings using other selections on the window) — Commit: Ensure that changes to profile settings made on the window are saved in the profile - Radio attribute and setting: Attributes in the list box can be selected individually. When an attribute is selected, the current setting or an appropriate selection box with the current setting highlighted appears on the right. For example, selecting SSID causes an edit box transmit power causes SCU to display a drop—down list box with available settings. ' Secun'ty settings: The items at the bottom of the window enable the admi settings for authentication and encryption. The following table provides details for the settings that are available on the Config window: 07/11 06 and give it a name (and then change settings to appear; selecting nistrator to configne the gfliiieg°3vf$w Description Potential Valne(s) Default Config Name of config, or profile; can be A string of up to 32 characters None changed through Rename function SSID Service set identifier (SSID) for A string of up to 32 characters None WLAN to which radio will connect Client Name Name assigned Summit radio and A string of up to 16 characters None client device that uses it Power Save Power save mode for radio - Off: Constantly awake mode, or CAM Fast ' Maximum: Maximum power savings ° Fast: Fast power save mode Tx Power Maximum transmit power - Max: Maximum defined for current Max regulatory domain » Required setting if Cisco AP is to define maximum transmit power for client 0 One of the following wlues in milliwatts (mW): 50, 30, 10, 1 Bit Rate Bit rate used by radio when Auto (rate negotiated automatically with AP) Auto interacting with WLAN access or one of the followrng rates in megabits per point (AP) second (Mbps): 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Radio Mode Use of 802,11g and/or 802.111) B rates only, BG rates full, G rates only, BG BG rates when interacting with AP LRS (B+G 24, 541 full Auth Type 802.11 authentication type, used Open1 shared-key, or Network BAP Open when associating to AP EAP Extensible Authentication Protocol None, LEAP, BAP-FAST, PEAP-MSCHAP, None type used for 802.1X PEAP—GTC, EAPJ'LS authentication to AP Credentials Authentication credentials for an . Usemame or DomaimUsemame (up to 64 None EAP type such as PEAP—MSCHAP characters) - Password (up to 64 characters) ' CA Certificate Filenarne (if using an BAP tnge that requires a server certificate) Encryption Type of encryption (and Off, Manual WEP, Auto WEP (generated None decryption) used to protect during EAP authentication), WPA—PSK, transmitted data WPA-TKlP, WPAZ-PSK, WPAZ-TKIP, WPA2~AES, CCKM-TKIP CCKM-AES Summit Data Communications, Inc. CONFIDENTIAL User’s Guide [or Summit CFIOG PCIOG and MCFlOG (T7 11/06 Name on SCU . i . Cimfig Wlndow DewnPtlfln Potentlal Value(s) Default - For Manual WEP: Up to four static WEP keys ' For PSK: ASCII yassphrase or hex PSK if the profile named “3rdPartyConfig” is selected as the active profile, then SCU passes control to Windows Zero Config for configuration of all radio and security settings for the radio module. 3.3 Global Settings Wlndow Global settings include: ' Radio and security settings that apply to all profiles ' Settings that apply to SCU itself An administrator can define and change most global settings on the Global Settings window in SCU. A sample Global Settings window is shown in Figure 3. ummit EIiEnt Ut Global Configuration Settings RX Diversity g -70 darn Diversity w 50 dBm e reamble _ g G shovslut ‘ 55 dam ’ DEVICE MUST BE POWER CYCLED FOR SOME OF THESE SETTINGS TO TAKE EFFECT B . . Global Settings ' » a ‘ 11 t A 4, a») 5? Figure 3: Global Settings window The Global Settings listed in the table below can be changed in SCU: Name on SCU Global Settings Description Potential Value(s) Default Window Rx Diversity How to handle antenna diversity 0 Main only: Use main antenna only Oil—Start when receiving data from AP - Aux only: Use auxiliary antenna only on Main ' On-Start on Main: On startup use main antenna ' On-Start on Aux: On startup, use amriliary antenna Tx Diversity How to handle antenna diversity ' Main only: Use main antenna only On when transmitting data to AP . Aux only: Use auxiligLantenna onlL Summit Data Communications, Inc. 9 CONFIDENTIAL User’s Guide for Summit CFlOG PClOG and MCFlOG 07 11/06 Name on SCU Global Settings Description Potential Value(s) Default Window 0 On: Use diversity Preamble Type of radio preamble, or headerl Auto, short, long Auto G short slot Solggjhort slot timing mode Auto, off, on Auto Roam Trigger If signal strength (RSSI) received 1113111: -50. -55, -60, -65, -70, -75 -70 from AP is less than trigger value, then radio will look for “better” AP Roam Delta Amount by which second AP’S dBm: 5, 10, 15, 20> 25, 30, 35 15 R85] must exceed current AP‘s RSSl before radio will attempt to roam to second AP Roam Period How long RSSl scan data is Seconds: 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, I!) collected before radio makes 55, 60 roaming decision Frag Threshold If packct size (in bytes) exceeds An integer from 256 to 2346 B46 threshold, then packet is fragmented RTS Threshold Packet size above which RTS/Cl‘S An integer from 0 to 2347 2347 is required on link Ping Payload Amount of data to be transmitted Bytes: 32, 64, 128, 255, 512, 1024 32 on a fig Ping Timeout Amount of time that transpires Milliseconds (ms): Specified value 5000 without a response before ping request is consider a failure Ping Delay Amormt of Lime between Milliseconds (ms): Specified value 1000 suocessive pingriquests LED Available only with MCFIOG On, off Off Hide Passwords If on, SCU masks passwords On, off Off Admin Password Password that must be specified A string of up to 64 characters SUMMIT when Admin Log] buttolptessed Certs Path Direclory where certificate(s) for A valid directory path of up to 64 characters Depends BAP authentication are housed on device These global settings are listed in the table below: A few global settings can be defined or set only through a separate utility such as the Summit Manufacturing Utility, which is made available only to device manufacture rs and not to their customers Descrithion Potential Valuets) Default RegulatorLdomain for radio FCC, ETSI TELEC, Worldwide Worldwide Bluetooth coexistence On, off Off Administrative oven-ide Maximum transmit power: For a radio that will be used with ‘high-gain antennas WEP key length Not set, 40 bits, 128 bils FCC test Off, Transmit Receive Prequeng Test channel Test rate: Bit [ate Test power 0-100% ’ See httD:IIwww.cisoo.oom/univstedloc/tdIdoc/oroduct/wireless/airm1 UO/accssntsfi12213ia/i12213sc/s13rf.htmflwoil]37656 2Seehttg'lwww “scooom/univerodIcc/td/doclproductlwi less! 01100laccssgisj12213'afi122133c/s13fi, tm#w91044425 Summit Data Communications, Inc. 10 CONFIDENTIAL User’s Guide for Summit CFlOG PCIOG and MCFlOG 07/11/06 Description Potential Valne(s) Default Transmit Test Timeout: Number of seconds Arr integer of up to 59999; 60000 means no timeout 3.4 Status Window The Status window provides status information on the radio. Status items include IP address and MAC address for the client radio, lP address and MAC address for the AP, signal strength. channel, transmit power, and data rate. A sample Status window is shown in Figure 4. ummit (bent Ill” Config: SWIMlT 350 “No Name Client“ ; A _ IP: ”11.1035 1 Client mfo MAC: DU,17.23.DD,Ul.d7 Is Associated to “No Name AP” ID: 1951.23.10 2"AF' info MAC: UD.13.1a.d9.t’o.aU agnal Strength Signal 3 Channel: 4 strength Ty Pgwer: 59 mw 4 Connection met” Rate 36 mEIit mm Figure 4: Status window Here are the highlights: 1. Client info: Name of active config, client name, client IP address, and client MAC address 2. AP info: AP name, AP IP address, and AP MAC address 3. Signal strength, shown both graphically and numerically 4. Other connection info: Channel, transmit power, and bit rate A few status items are shown on the Main window. Those items are: Card state: Down (not recognized), Not Associated, or Associated SCU software version Driver software version Regulatory domain for radio: FCC, ETSI, TELEC, or Worldwide 3.5 Diags Window A sample Diags, or troubleshooting, window is shown in Figure 5 on the next page. Here are the functions available on the Diags window: 0 (Re)connec’t: Disable and enable the radio, apply or reapply the current profile, and attempt to associate and authenticate to the wireless LAN, logging all activity in the output area at the bottom. Summit Data Communir'alions, Inc. 11 CONFIDENTIAL User’s Guide [in Summit CFlOG PClOG and MCFIUG 07 11/06 Release/Renew: Obtain a new IP address through DHCP release/renew, and log all activity in the output area at the bottom. ' Start Ping: Start a continuous ping to the address in the edit box next to it. Once the button is clicked, its name and function will change to Stop Ping. Leaving the Diags window also will stop the ping, as will pressing any other button on the screen. Diagnostics: Attempt to (re)eonnect to an AP, and provide a more thorough dump of data than is obtained with (Re)conneeti The dump will include radio state, profile settings, global settings, and a BSSID list of APs in the area. ' Upd. Driver: Update the driver via a dialog and power cycle. 0 Site Survey: Launch a separate site survey utility (not yet available). 1 Ping address (3) 10.1.104 success 17 ms (4) 10.1.10l1 success 5 ms (5) 10.1.1D.1 success 8 ms (6) 1n,1.1o.1 success 5 ms 2 ng results F gure 5:D1ags window, with pmg active Summit Dam Communications, Inc. 12 CONFIDENTIAL User’s Guide for Summit CFIOG PCIOG and MCFIOG 07/11/06 Appendix: FCC Information All declarations and instructions for the SDC—CFIOG apply to the SDC»PCIUG, because the PC] 06 is a CF] 06 in a specially designed PCMCIA carrier. Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: - Reorient or relocate the receiving antenna. ° Increase the separation between the equipment and receiver. ~ Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 0 Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (I) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users; 2) The transmitter module may not be co-located with any other transmitter or antenna; and 3) For all products marketed in the United States, OEM must limit the operating channels to channel 1 through channel it for the 2.4 GI lz band by using the supplied Summit Manufacturing Utility. OEM shall not supply to its customers (end users) the Summit Manufacturing Utility or any tool or info that will enable an end user to change the regulatory domain or the operating channels for the radio. As long as the three conditions above are met, further transmitter test will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc). IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-loeation with another transmitter), then the FCC authorization is no longer considered valid and the FCC in can not be used on the final product. In these circumstances, the OEM Summit Data Communications, Inc. 13 CONFIDENTIAL User‘s Guide for Summit CFIOG PCIOG and MCFlUG 07/11/06 integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization. End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 em may be maintained between the antenna and users (for example : Mobile Data Terminals (MDTs), Vehicle Mounted Devices ( VMDs)...etc.)i The final end product must be labeled in a visible area with the following: “Contains TX FCC ID: TWG-SDMCFIOG". Manual Information That Must be Included The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the users manual of the end product which integrate this module. The users manual for OEM integrators must include the following information in a prominent location: IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be (to-located or operating in conjunction with any other antenna or transmitter. Summit declares that US model of SDC-MCFIOG (FCC ID: TWG-SDMCFIOG) is limited in CHl—CHll for 2.4G band by specific firmware controlled by the manufacturer and is not user changeable. Summit Data Communications, Inc. 14 CONFIDENTIAL
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Encryption : Standard V1.2 (40-bit) User Access : Print, Copy, Fill forms, Extract, Assemble, Print high-res Create Date : 2006:07:11 11:15:59Z Modify Date : 2006:07:11 11:28:50+08:00 Page Count : 16 Creation Date : 2006:07:11 11:15:59Z Author : joy Producer : Acrobat PDFWriter 5.0 for Windows NT Mod Date : 2006:07:11 11:28:50+08:00 Metadata Date : 2006:07:11 11:28:50+08:00 Title : 掃描-3.XDW Creator : joyEXIF Metadata provided by EXIF.tools