Surecom Technology 9428G-0502 802.11g 54M WLAN CardBus Adapter User Manual 4819428GZ000
Surecom Technology Corporation 802.11g 54M WLAN CardBus Adapter 4819428GZ000
Users Manual
EP-9428-g 54M WLAN CardBus Adapter User Manual 4819428GZ000 1.Introduction--------------------------------------------------------------------------------------------------------3 1.1Feature-------------------------------------------------------------------------------------------------------------3 1.2Specification------------------------------------------------------------------------------------------------------4 1.3Package Contents---------------------------------------------------------------------------------------------- 4 1.4Systems Requirements----------------------------------------------------------------------------------------5 2.Hardware Installation------------------------------------------------------------------------------------------5 2.1Connecting the CardBus--------------------------------------------------------------------------------------5 2.2 Removing the CardBus---------------------------------------------------------------------------------------6 3.Software Installation-------------------------------------------------------------------------------------------7 3.1Installing WLAN CardBus Adapter Utility and Driver--------------------------------------------------7 3.2Uninstalling the Driver and Utility---------------------------------------------------------------------------11 4.Configuration Utility--------------------------------------------------------------------------------------------14 4.1Using the configuration utility---------------------------------------------------------------------------------14 4.1.1Profile---------------------------------------------------------------------------------------------------------15 4.1.1.1 System Configuration Edit profile Network Type--------------------------------------------15 4.1.1.2 Edit Profile---------------------------------------------------------------------------------------------17 4.1.1.3 Authentication and Security-----------------------------------------------------------------------19 4.1.2 Link Status---------------------------------------------------------------------------------------------------20 4.1.3 Site Survey---------------------------------------------------------------------------------------------------21 4.1.4 Statistics----------------------------------------------------------------------------------------------------- 22 4.1.5 Advance----------------------------------------------------------------------------------------------------- 23 4.1.6 About--------------------------------------------------------------------------------------------------------- 24 5.Glossary------------------------------------------------------------------------------------------------------------ 25 1 Introduction The 54Mbps WLAN CardBus Adapter provides greater performance than ever before. Incorporated with latest IEEE 802.11g technology, the CardBus is not only compliant with other 802.11g products but allows you to connect with other 802.11b devices. With WPA (Wi-Fi Protected Access) and 64/128-bit WEP encryption, the CardBus ensure the security of your network communication. All you need is laptop computer with one 32-bit CardBus interface and Windows 98SE/2000/ME/XP operating system; the Plug-and-Play feature will enable you to complete the set up process within minutes. This wireless network CardBus has been designed for both home and business users, enables you to communicate seamlessly with other wireless networking products wherever you are. 1.1 Features 1.IEEE 802.11b-DSSS (BPSK,QPSK,CCK) 2.IEEE 802.11g-OFDM(64-QAM,16-QAM,QPSK,BPSK) 3.54Mbps high Data Rate 4.Support 32bit CardBus interface. 5.Auto Rate fallback for optimizing communication possibility in worse channel conditions and over larger distances. 6.64/128bit WEP data encryption security 7.Compliant with Windows 98SE/2000/ME/XP 8.Power save in infrastructure mode. 9.Build-in PCB patch space diversity antenna. 10.Plug-and-Play and easy to setup. 11.Easy-to-Use Graphical Configuration utility saves detailed connectivity profiles for frequently accessed networks. 1.2 Specification Model:54Mbps WLAN CardBus Adapter Radio:Complies with IEEE 802.11b/g Frequency Band:2.412-2.462GHz(U.S.) 2.412-2.484GHz(Japan)2.412-2.472GHz(ETSI) Modulation TYPE :BPSK,QPSK,CCK,16-QAM,64-QAM Operating Channels:11 channels (US)13 channels (ETSI)14 channels (Japan) Data Rate:1 / 2 / 5.5 / 6/9/11/12/24/36/48/54Mbps Output Power: 18dBm@11Mbps;14dBm@54Mbps Receive sensitivity: Min.80dBm for 11Mbps (@BER 8%) Min. -70dBm for 54 Mbps(@BER 10%) Antenna Type: Build-in PCB patch space diversity antenna Current Consumption: 3.3V, Tx mode 400 mA (Max.) Rx mode 250 mA (Max.) Package: 3.3V CardBus Certification:Radio: EU: ETS 300 328; USA: FCC Part 15C EMC: EU ETS 300 826; USA: FCC Part 15B Safety: EN60950 Driver:Windows 98SE/2000/ME/XP 1.3 Package Contents 1.One 54Mbps WLAN CardBus Adapter. 2.One setup Utility CD-ROM (User Guide on CD). 3.Quick Installation Guide. 1.4 Systems Requirements 1.One PCMCIA Type II or Type III slot. 2.A laptop computer with an available 32bit CardBus slot. 3.Operating System: Windows 98SE/2000/ME/XP 4.2M bytes free disk space for utility and driver installation. Note : If you insert the WLAN CardBus before installing the driver and utility, the operating system will detect a new device and start to configure the new device. Click Cancel to finish the wizard. Follow the instruction step by step to install the WLAN CardBus Adapter. 2.Hardware Installation 2.1Connecting the CardBus Insert the CardBus into the PC Card slot on your notebook, and push it until it is firmly seated. 2.2 Removing the CardBus If you want to remove the CardBus, press the Eject Button to make it stretch out. Press the eject button again and remove the CardBus out of the slot. 3.Software Installation 3.1Installing WLAN CardBus Adapter Utility and Driver Insert the setup CD into your CD-ROM Drive. Then, the Install Shield Wizard should launch automatically, if it does not launch automatically, Double-click setup.exe in your CD-ROM Drive. Click Next button in the following window. The Install Shield Wizard is copying the necessary files to the system. The progress indicator shows the installing status. Plug-in the WLAN CardBus Adapter into your CardBus slot when the window below appears. If this is the first time you install the software, the window below will appear. Select your current country region then click Next. Click Finish ,when the installation is completed. 10 After completing the installation, the icon will appear in the system tray. Double-click the icon to configure the WLAN CardBus Adapter. 3.2 Uninstalling the Driver and Utility You may follow the instruction step by step to uninstall the WLAN CardBus Adapter completely. Insert the setup CD or execute the setup.exe again. 11 The following window should launch automatically. Select Remove, and click Next. Select Yes to continue uninstallation. 12 Click OK to finish, when the uninstallation is completed. 13 4. Configuration Utility After the Configuration Utility has been installed, an icon will placed in the system tray when the WLAN CardBus Adapter is inserted. Click the icon and the configuration utility will pop up. The utility was six tabs: Profile, Link Status, Site Survey, Statistics Advance, and About. You should change all your configuration settings for your WLAN CardBus adapter using this utility. 4.1 Using the configuration Utility After the Configuration Utility has been installed, an icon will placed in the system tray when the WLAN CardBus Adapter is inserted. Click the icon and the configuration utility will pop up. The utility was six tabs: Profile, Link Status, Site Survey, Statistics Advance, and About. You should change all your configuration settings for your WLAN CardBus adapter using this utility. 14 4.1.1 Profile Specific different network profile settings used in various locations, such as your office, your home, the factory, or the airport. In each profile, you can specify a network type, network name, WEP and security setting parameters required for that operating location. 4.1.1.1 System Configuration Edit profile Network Type: The column in Profile list from left to right is “Profile”、”SSID”、”Channel”、”Authentication”、”Encryption”and “Network Type” .Click ACTIVATE to excuse the profile. 15 SSID: All wireless devices within the ESS or extended wireless LAN use the SSID. This can be any alphanumeric value of up to 32 characters long. Use this to prevent cross communication between two or more WLAN in one area. The SSID should be changed in order to provide some minimum security. Channel: Shows the selected channel that is currently used. (Available channels depends on the country or region you are located.) Authentication: Defines authentication type of the wireless networks, including "Open System" and “Share Key” authentication. The wireless adapter will need to be set to the same authentication type to communicate. Encryption: Indicates your WEP (Wired Equivalent Privacy) settings. WEP encryption can be used to ensure the security of your wireless network. If there is no Encryption exists, the column will show Not USE. Network Type: The network type of the wireless network. An Ad-Hoc wireless LAN is a group of computers each with wireless adapters, connected as an independent wireless LAN. An integrated wireless and wired LAN is called an infrastructure configuration. 16 4.1.1.2 Edit Profile To add a new location profile name or to rename, delete, or select an existing profile, click Edit. The Edit Configurations screen appears as follows Power Save Mode: CAM: (Constant Awake Mode) CAM is the normal mode for desktop machines or other machines where power consumption is not an issue. It keeps the radio powered up continuously, so there is little latency for responding to messages. Max_PSP: Maximum Power Save. Fast_PSP: Fast Awake. Network Type The network type of the wireless network. An Ad-Hoc wireless LAN is a group of computers each with wireless adapters, connected as an independent wireless LAN. An integrated wireless and wired LAN is called an infrastructure configuration. Preamble Type Preamble is the first sub-field of PPDU, which is the appropriate frame format for transmission to PHY (Physical layer). There are two options, Short Preamble and Long Preamble. The Short Preamble option improves throughput performance. 17 RTS Threshold: The RTS Threshold sets an upper threshold at which point the device will issue an RTS packet. The RTS (Request To Send) packet is used for the purpose of avoiding data collisions on the wireless LAN. There are several trade offs to consider when setting this parameter. Setting this parameter to a small value causes RTS packets to be sent more often, consuming more of the available bandwidth, therefore reducing the apparent throughput of other network packets. However, the more often RTS packets are sent, the quicker the system can recover from interference or collisions. Refer to the IEEE 802.11 Standard for more information on the RTS/CTS mechanism. Fragment Threshold: Fragment Threshold defines a threshold above, which the wireless packet will be split up, or fragmented. For a fragmented packet, if transmission of part of it were to be interfered with, only the portion that was successfully transmitted would need to be resent. Throughput will generally be lower for fragmented packets, since the fixed packet overhead consumes a higher portion of the RF bandwidth. 18 4.1.1.3 Authentication & Security Authentication Type: Defines authentication type of the wireless networks, including "Open System" and “Share Key” authentication. The wireless adapter will need to be set to the same authentication type to communicate. Open System: With this setting any station in the Wireless LAN can associate with an Access Point to receive and to transmit data. Share Key: Is when both the sender and recipient share a secret key. Both units use this key for an extended length of time, sometimes indefinitely. Encryption Type: Indicates your WEP (Wired Equivalent Privacy) settings. WEP is disabled by default. WEP : WEP (Wired Equivalent Privacy) is an optional feature of the IEEE 802.11 standard that is used to ensure the security of your wireless network. No Encryption: No any encryption for security. WEP Key: Key 1 - Key 4: These four fields can be used to manually enter the encryption keys. This may be necessary if you wish this node to match keys in a different vendor's product. 19 WEP Key length: The 64 or 128-bits Wired Equivalent Privacy Algorithm. You can decide the network key to be encoded by ASCII characters or hexadecimal digitals. A key of 10 hexadecimal characters (0-9, A-F) is required if a 64-bit Key Length was selected. A key of 26 hexadecimal characters (0-9, A-F) is required if a 128-bit Key Length was selected. 4.1.2 Link Status You can see the below status:Status, Current Channel, Current TX Rate, throughput(Kbit/sec), Link Quality, Signal Strength. 20 4.1.3 Site Survey: Click the Site Survey; you can to see the signal strength, channel, Encryption, authentication and network type of available wireless network. The AP MAC address will also be displayed at the Preferred BSSID field. Select the AP you want to connect to and click connect to establish network. 21 4.1.4 Statistics You can see the information of transmit statistics and receive statistics in this screen : 22 4.1.5 Advance: Wireless Mode If there are 802.11b devices in your wireless network, choose b+g mixed mode. If all the devices in your wireless network are 802.11g ones, choose 802.11g mode to get better transfer rate. Tx Burst Enable this function to burst the transmit speed, but it may affect signal quality. Radio off You can stop wireless transmission by clicking this icon. Click again to resume wireless connection. 23 4.1.6 About This screen shows copyright, Utility / Driver version and MAC Address of this wireless LAN Card. 24 5. Glossary Ad-Hoc Mode An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. DSSS (Direct-Sequencing Spread-Spectrum) DSSS operate over the radio airwaves in the unlicensed ISM band (industrial, scientific, medical). DSSS uses a radio transmitter to spread data packets over a fixed range of frequency band. Encryption A security method that applies a specific algorithm to data in order to alter the data appearance and prevent other devices from reading the information. Firmware Program that is inserted into programmable read-only memory (programmable read-only memory), thus becoming a permanent part of a computing device. Fragmentation Threshold Value Indicates how much of the network resources is devoted to recovering packet errors. The value should remain at its default setting of 2,432. If you experience high packet error rates, you can decrease this value but it will likely decrease overall network performance. Only minor modifications of this value are recommended. Fragmentation Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet. IEEE The Institute of Electrical and Electronics Engineers IEEE 802.11b/g standard The IEEE 802.11b/g Wireless LAN standards subcommittee formulating standards for the industry. The objective is to enable wireless LAN hardware from different manufacturers to communicate. Infrastructure Mode A client setting providing connectivity to an Access Point. As compared to Ad-Hoc Mode where PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central Access Point. The Access Point not only mediates Wireless network traffic in the immediate neighborhood but also pro-vides communication with the wired network. An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. Roaming The ability to use a wireless device and be able to move from one access point range to another without losing the connection. 25 RTS/CTS Threshold Value Should remain at its default setting of 2,347. A preamble is a signal used to synchronize the transmission timing between two or more systems. A series of transmission pulses is sent before the data to indicate that someone is about transmit data.?This ensures that systems receiving the information correctly when the data transmission starts. Shared Key Is when both the sender and recipient share a secret key. Both units use this key for an extended length of time, sometimes indefinitely. Any eavesdropper that discovers the key may decipher all packets until the key is changed. Signal Strength The signal level indicates the strength of the signal as received at the wireless network interface. SSID (Service Set Identifier) Is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the network. It is case sensitive and must not exceed 32 characters. WEP (Wired Equivalent Privacy) A data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. The optional cryptographic confidentiality algorithm specified by IEEE 802.11 used to provide data confidentiality that is subjectively equivalent to the confidentiality of a wired LAN medium that does not employ cryptographic techniques to enhance privacy. WPA Wi-Fi Protected Access, a specification to improve the security level of wireless networks. It uses 802.1x and EAP to control network access. Temporal Key Integrity Protocol (TKIP) is used to secure data during transmission. 26 FCC Statement This device complies with FCC Rules Part 15. Operation is subject to the following two conditions: 1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with manufacturer's instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1. Re-orient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio/TV technician for help. WARNING! Any changes or modifications to this product not expressly approved by the manufacturer could void any assurances of safety or performance and could result in violation of Part 15 of the FCC Rules. CE Declaration of conformity This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022 class B for ITE and EN 50082-1. This meets the essential protection requirements of the European Council Directive 89/336/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Trademarks All company, brand, and product names are trademarks or registered trademarks of their respective companies. FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exxposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. 27 2-Year Limited Warranty Subject to the terms and conditions set forth herein, SURECOM provides this Limited warranty for its product only to the person or entity that originally purchased the product from SURECOM or its authorized reseller or distributor. SURECOM warrants that the hardware portion of the SURECOM products described below will be free from material defects in workmanship and materials from the date of original retail purchase of the product, for the period set forth below applicable to the product type (warranty Period?, except as otherwise stated herein. 2-Year Limited Warranty for the Product(s) is defined as follows: *Hardware (excluding power supplies and fans) One (2) Year *Power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase. *Spare parts and spare kits Ninety (90) days *Software portion of the product (Software? Ninety (90) days) 28
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Modify Date : 2005:02:24 17:02:27+08:00 Create Date : 2004:04:06 16:53:23+08:00 Page Count : 28 About : uuid:0dd421a9-87eb-11d8-a631-0000211fd02c Producer : Acrobat Distiller 6.0 (Windows) Creation Date : 2004:04:06 16:53:23+08:00 Mod Date : 2005:02:24 17:02:27+08:00 Author : Creator Tool : ADOBEPS4.DRV Version 4.53 Metadata Date : 2005:02:24 17:02:27+08:00 Document ID : uuid:01f18765-87eb-11d8-a631-0000211fd02c Format : application/pdf Title : Microsoft Word - 4819428GZ000.doc Creator : Has XFA : NoEXIF Metadata provided by EXIF.tools