U MEDIA Communications WUB710A 2.4GHz/5GHz Wireless USB Adapter User Manual WUB 710A

U-MEDIA Communications, Inc. 2.4GHz/5GHz Wireless USB Adapter WUB 710A

Manual

   2.4GHz/5GHz Wireless USB Adapter  Model: WUB-710A     User's Guide
 2 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of  the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if  not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If  this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off  and on, the user is encouraged to try to correct the interference by one of  the following measures: -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. For operation within 5.15 ~ 5.25GHz frequency range, it is restricted to indoor environment. This device complies with Part 15 of  the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. To maintain compliance with FCC RF exposure compliance requirements, please follow operation instruction as documented in this manual.   This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. SAR compliance has been established in typical laptop computer(s) with USB slot, and product could be used in typical laptop computer with USB slot. Other application like handheld PC or similar device has not been verified and may not compliance with related RF exposure rule and such use shall be prohibited. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. WUB-710A with Printed antenna and max. antenna gain is 1dBi in 2.4G and 2dBi in 5G.   CE Mark Warning This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
 3Table of Contents  Federal Communications Commission (FCC) Interference statement     CE Mark Warning                Chapter 1 – Wireless LAN Networking          Transmission Rate             Type of Wireless Networks              Ad-Hoc (IBSS) Network             Infrastructure (BSS) Network            Wireless LAN Security              Data Encryption with WEP            Chapter 2 - Getting Started About Your 2.4GHz/5GHz Wireless USB Adapter       Package Content              System Requirement             LED Definition              Wireless Utility and Adapter Hardware Installation             Using the Utility to Configure Your Network                Link Information              Site Survey               Profile                Chapter 3 – Maintenance Uninstalling the Driver and Utility                       Glossary
 4Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology.   THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The adapter provides various transmission (data) rate options for you to select. Options include Fully Auto, 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps and 108Mbps. In most networking scenarios, the factory default Fully Auto setting proves the most efficient. This setting allows your adapter to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the adapter automatically switches to a lower transmission (data) rate. Transmission at lower data speeds is usually more reliable. However, when the communication quality improves again, the adapter gradually increases the transmission (data) rate again until it reaches the highest available transmission rate. Types of Wireless Networks Wireless LAN networking works in either of  the two modes: ad-hoc and infrastructure. In infrastructure mode, wireless devices communicate to a wired LAN via access points. Each access point and its wireless devices are known as a Basic Service Set (BSS). An Extended Service Set (ESS) is two or more BSSs in the same subnet. In ad hoc mode (also known as peer-to-peer mode), wireless devices communicate with each other directly and do not use an access point. This is an Independent BSS (IBSS).  To connect to a wired network within a coverage area using access points, set the adapter operation mode to Infrastructure (BSS). To set up an independent wireless workgroup without an access point, use Ad-hoc (IBSS) mode.  AD-HOC (IBSS) NETWORK Ad-hoc mode does not require an access point or a wired network. Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS).  To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel for each.
  When a number of  wireless stations are connected using a single access point, you have a Basic Service Set (BSS).    6
7 In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
8 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the adapter automatically switches to the channel used in BSS (2).  Roaming in an ESS network diagram
 9WIRELESS LAN SECURITY Because wireless networks are not as secure as wired networks, it’s vital that security settings are clearly understood and applied. 1. The list below shows the possible wireless security levels on your adapter starting with the most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. EAP requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the WAN or the LAN to provide authentication service for wireless stations.   DATA ENCRYPTION WITH WEP The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted between the adapter and the access point or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.  There are two ways to create WEP keys in your adapter.  • Automatic WEP key generation based on a password phrase called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. • For WLAN adapters without the passphrase feature, you can still take advantage of  this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the wireless utility and entering them manually as the WEP keys in the other WLAN adapter(s). The adapter allows you to configure up to four WEP keys and only one key is used as the default transmit key at any one time. THE adapter SUPPORTS UP TO FOUR 64-BIT, 128-BIT, AND 152-BIT WEP KEYS. THE 152-BIT WEP MUST COMPLY WITH THE WEP SETTING OF YOUR ACCESS POINT OR ROUTER.    DO NOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A NETWORK WITHOUT AUTHORIZATION AND WITHOUT CLEARLY UNDERSTANDING THE SETTINGS YOU ARE APPLING. WITH POOR SECURITY SETTINGS, SENSITIVE DATA YOU SEND CAN BE SEEN BY OTHERS.
 10Chapter 2 - Getting Started  This chapter introduces the Adapter and prepares you to use the Wireless Utility.   2.1 About Your 2.4GHz/5GHz Wireless USB Adapter  The Adapter is an 802.11a, 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment.  The following lists the main features of your Adapter.  2.4GHz / 5GHz Dual-band design    Compliant to IEEE 802.11a, 802.11g & 802.11b standards  Compliant to IEEE 802.11n (Draft 2.0)  Compliant to USB 2.0 standard  Wire-free access to networked resources from anywhere beyond the PC with any USB host interface.  Support Infrastructure & Ad-Hoc mode  The WUB-710A / W211NU doesn’t have“Ad Hoc on non-US frequencies” and/or “on DFS frequencies”.  Delivers data rate up to 300 Mbps at receiving path in 11n mode.  For 802.11b/g, date rate dynamically shifts based on signal strength, for maximum availability and reliability of connection.  Support both 20MHz & 40MHz bandwidth  Support WEP 64/128, WPA, WPA2 encryption  Support QoS – WMM  Multi-path (1x2) design and two PCB antennas built-in design guarantee best transmitting / receiving quality.  Support Windows-base wireless LAN GUI  Support WPS enable on S/W utility  Support Windows XP, 2K & Vista  2.2 Package Content   2.4GHz/5GHz Wireless USB Adapter  Quick Start Guide   2.3 System Requirement   Pentium class notebook computers with at least one available USB slot  Microsoft Windows XP or 2K   2.4 LED Definition  Single LED for Wireless Link and Activity
 11  2.5 Wireless Utility & Adapter Hardware Installation  NOTE: If  you have connected the USB Adapter to your computer, please remove it first.  Follow the instructions below to install the USB Adapter and Utility.  STEP 1 Please insert your USB Adapter to your Laptop, and auto-install the driver and utility.     2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar.   Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client Utility.  The Wireless Client Utility window as shown below will appear.   The user can now use any of  the management functions available in the IEEE 802.11 Wireless Client Utility.    2.6.1 Link Information Click the Link Information tab to see general information about the program and its operations. The Link Information tab does not require any configuration.
 12     The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name   The name of  the current selected configuration profile.  Set up the configuration name on the Profile tab. SSID  Displays the wireless network name.    Link Status    Shows whether the station is associated to the wireless network.   Network Type  The type of network the station is connected to.   The options include:    Infrastructure (access point)    Ad Hoc   Wireless Mode    Displays the wireless mode. 802.11a or 802.11n or 802.11g or 11b Channel   Shows the currently connected channel. Transmit Rate  Displays the current transmit rate in Mbps. AP MAC Address Displays the MAC address of  the access point the wireless adapter is associated to. Signal Strength  Shows the strength of the signal.  Security Status Security  Shows the security type – Disable, WEP, WPA/WPA2, WAP-PSK/WAP2-PSK or 802.1X Authentication  Displays the authentication mode.     TCP/IP Status IP Address    Displays the computer's IP address.   Subnet Mask  Displays subnet mask   Gateway  Displays gateway address
 132.6.2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click Refresh to refresh the list at any time.        Connecting to a different network Hold your mouse pointer over the network icon, and click the right mouse button to select the network.  Click the Connect button to connect the available network. If  no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network. Follow the procedures to create profile for that network.   2.6.3 Profile
 14  To add a new configuration profile, click Add on the Profile tab.   To modify a configuration profile, select the configuration from the Profile list and click the Edit button.   Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time.    To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
 15 Click Next to continue the profile setting.   To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WPA/WPA2 Enables the use of  Wi-Fi Protected Access (WPA).   Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen. The options include:  TLS (Transport Layer Security) is a Point-to-Point Protocol (PPP) extension supporting additional authentication methods within PPP. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected cipher suite negotiation, and key exchange between two endpoints.  PEAP (EAP-GTC)  (Protected Extensible Authentication Protocol) authenticates wireless LAN clients using only server-side digital certificates by creating an encrypted SSL/TLS tunnel between the client and the authentication server. The tunnel then protects the subsequent user authentication exchange.  PEAP (EAP-MSCHAP V2) (Protected Extensible Authentication Protocol) To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager  TTLS  (Tunneled Transport Layer Security) An EAP variant that provides mutual authentication using a certificate for server authentication, and via a secure TLS tunnel for the client  LEAP  (Lightweight and Efficient Application Protocol) is the general framework for a set of high-performance, efficient protocols which are ideal for mobile and wireless applications. LEAP is designed to address all the technical requirements of  the wireless data communications industry, and is oriented towards providing the greatest benefit to the industry and the consumer
 16WPA-PSK/WPA2-PSK  Enables WPA/WPA2 Passphrase security.    Fill in the WPA/WPA2 Passphrase on Security Settings screen.   802.1x Enables 802.1x security.   This option requires IT administration.  Choosing 802.1x opens the 802.1x Security Settings screen. The options include:   TLS   PEAP   TTLS   LEAP    Advanced Settings After Security Settings finished, the Advanced Settings screen will be shown as following.  The following table describes the items found on the Advanced Settings screen. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. The options include: z Continuous Access Mode z Maximum Power Saving z Fast Power Saving 802.11b Preamble Displays the 802.11b preamble format.   The options include: z Long z Short z Auto RTS Threshold Value from 0 ~ 2347 FRAG Threshold Value from 256 ~ 2346 Wireless Mode Include: z 802.11b z 802.11g z 802.11n
 17After advance settings are finished, the following screen showed as below. You can activate the profile now or later.
 18Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. 3.1 Uninstall the Driver & Utilty Follow the steps below to remove (or uninstall) the USB Adapter driver from your computer.   Step 1.  To remove the driver from the OS, go to Start Æ Programs Æ Wireless Client Utility Step 2.  Double-click Uninstall Step 3.  It will auto-remove the driver and utility
 19Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of  a base station (access point).  Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS).  CHANNEL A radio frequency used by a wireless device is called a channel.  EAP AUTHENTICATION EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of  the IEEE802.1X transport mechanism in order to support multiple types of  user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication.  ENCRYPTION The reversible transformation of  data from the original to a difficult-to-interpret format. Encryption is a mechanism for protecting confidentiality, integrity, and authenticity of  data. It uses an encryption algorithm and one or more encryption keys.  FRAGMENTATION THRESHOLD This is the maximum data fragment size that can be sent before the packet is fragmented into smaller packets.  IEEE 802.1X The IEEE 802.1X standard outlines enhanced security methods for both the authentication of  wireless stations and encryption key management. Authentication can be done using an external RADIUS server.  INFRASTRUCTURE (BSS) When a number of  wireless stations are connected using a single AP, you have a Basic Service Set (BSS).
 20ROAMING In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network. This is roaming. As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors.  SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other.  TEMPORAL KEY INTEGRITY PROTOCOL (TKIP) Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server.  USER AUTHENTICATION WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. If  you do not have an external RADIUS server, use WPA-PSK/WPA2-PSK (WPA -Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, clients will be granted access to a WLAN.  WEP WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the WCB-321A and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.  WPA/WPA2 Wi-Fi Protected Access (WPA) and WPA2 (future upgrade) is a subset of  the IEEE 802.11 i security specification draft. Key differences between WPA and WEP are user authentication and improved data encryption. WPA2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA.

Navigation menu