U MEDIA Communications WUB710A 2.4GHz/5GHz Wireless USB Adapter User Manual WUB 710A

U-MEDIA Communications, Inc. 2.4GHz/5GHz Wireless USB Adapter WUB 710A

Manual

Download: U MEDIA Communications WUB710A 2.4GHz/5GHz Wireless USB Adapter User Manual WUB 710A
Mirror Download [FCC.gov]U MEDIA Communications WUB710A 2.4GHz/5GHz Wireless USB Adapter User Manual WUB 710A
Document ID922814
Application IDWq8FvOLVYTolXNCi95Q5fw==
Document DescriptionManual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize39.11kB (488840 bits)
Date Submitted2008-04-02 00:00:00
Date Available2008-04-02 00:00:00
Creation Date2008-04-02 15:45:06
Producing SoftwareAcrobat Distiller 8.1.0 (Windows)
Document Lastmod2008-04-02 18:22:56
Document TitleMicrosoft Word - WUB-710A User Manual.doc
Document CreatorPScript5.dll Version 5.2
Document Author: linda.sung

2.4GHz/5GHz Wireless USB Adapter
Model: WUB-710A
User's Guide
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one of the
following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
For operation within 5.15 ~ 5.25GHz frequency range, it is restricted to indoor environment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause undesired operation.
IMPORTANT NOTE:
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. End users must follow the specific operating instructions for satisfying RF
exposure compliance. To maintain compliance with FCC RF exposure compliance requirements,
please follow operation instruction as documented in this manual.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
SAR compliance has been established in typical laptop computer(s) with USB slot, and product
could be used in typical laptop computer with USB slot. Other application like handheld PC or
similar device has not been verified and may not compliance with related RF exposure rule and
such use shall be prohibited.
The availability of some specific channels and/or operational frequency bands are country
dependent and are firmware programmed at the factory to match the intended destination. The
firmware setting is not accessible by the end user.
WUB-710A with Printed antenna and max. antenna gain is 1dBi in 2.4G and 2dBi in 5G.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio interference,
in which case the user may be required to take adequate measures.
This transmitter must not be co-located or operation in conjunction with any other antenna or
transmitter.
Table of Contents
Federal Communications Commission (FCC) Interference statement
CE Mark Warning
Chapter 1 – Wireless LAN Networking
Transmission Rate
Type of Wireless Networks
Ad-Hoc (IBSS) Network
Infrastructure (BSS) Network
Wireless LAN Security
Data Encryption with WEP
Chapter 2 - Getting Started
About Your 2.4GHz/5GHz Wireless USB Adapter
Package Content
System Requirement
LED Definition
Wireless Utility and Adapter Hardware Installation
Using the Utility to Configure Your Network
Link Information
Site Survey
Profile
Chapter 3 – Maintenance
Uninstalling the Driver and Utility
Glossary
Chapter 1- Wireless LAN Networking
This section provides background information on wireless LAN networking technology.
THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING
NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD
ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR.
Transmission Rate (Transfer Rate)
The adapter provides various transmission (data) rate options for you to select. Options include Fully
Auto, 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36
Mbps, 48 Mbps, 54 Mbps and 108Mbps. In most networking scenarios, the factory default Fully Auto
setting proves the most efficient. This setting allows your adapter to operate at the maximum transmission
(data) rate. When the communication quality drops below a certain level, the adapter automatically
switches to a lower transmission (data) rate. Transmission at lower data speeds is usually more reliable.
However, when the communication quality improves again, the adapter gradually increases the
transmission (data) rate again until it reaches the highest available transmission rate.
Types of Wireless Networks
Wireless LAN networking works in either of the two modes: ad-hoc and infrastructure. In infrastructure
mode, wireless devices communicate to a wired LAN via access points. Each access point and its wireless
devices are known as a Basic Service Set (BSS). An Extended Service Set (ESS) is two or more BSSs in the
same subnet. In ad hoc mode (also known as peer-to-peer mode), wireless devices communicate with each
other directly and do not use an access point. This is an Independent BSS (IBSS).
To connect to a wired network within a coverage area using access points, set the adapter operation mode to
Infrastructure (BSS). To set up an independent wireless workgroup without an access point, use Ad-hoc
(IBSS) mode.
A D -H OC (IBSS) N ETWORK
Ad-hoc mode does not require an access point or a wired network. Two or more wireless stations
communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent
Basic Service Set (IBSS).
To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel
for each.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set
(BSS).
In the ESS diagram below, communication is done through the access points, which relay data packets to
other wireless stations or devices connected to the wired network. Wireless stations can then access
resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the
connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the adapter
automatically switches to the channel used in BSS (2).
Roaming in an ESS network diagram
W IRELESS LAN S ECURITY
Because wireless networks are not as secure as wired networks, it’s vital that security settings are clearly
understood and applied.
1. The list below shows the possible wireless security levels on your adapter starting with the most secure.
EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key
exchange. EAP requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server
DO NOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A
NETWORK WITHOUT AUTHORIZATION AND WITHOUT CLEARLY UNDERSTANDING
THE SETTINGS YOU ARE APPLING. WITH POOR SECURITY SETTINGS, SENSITIVE
DATA YOU SEND CAN BE SEEN BY OTHERS.
either on the WAN or the LAN to provide authentication service for wireless stations.
D ATA E NCRYPTION WITH W E P
The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make
wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted
between the adapter and the access point or other wireless stations to keep network communications
private. Both the wireless stations and the access points must use the same WEP key for data encryption
and decryption.
There are two ways to create WEP keys in your adapter.
•
Automatic WEP key generation based on a password phrase called a passphrase. The passphrase
is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the
same WLAN.
•
For WLAN adapters without the passphrase feature, you can still take advantage of this feature by
writing down the four automatically generated WEP keys from the Security Settings screen of the
wireless utility and entering them manually as the WEP keys in the other WLAN adapter(s).
The adapter allows you to configure up to four WEP keys and only one key is used as the default transmit
key at any one time.
THE adapter SUPPORTS UP TO FOUR 64-BIT, 128-BIT, AND 152-BIT WEP KEYS. THE 152-BIT
COMPLY WITH THE WEP SETTING OF YOUR ACCESS POINT OR ROUTER.
WEP MUST
Chapter 2 - Getting Started
This chapter introduces the Adapter and prepares you to use the Wireless Utility.
2.1
About Your 2.4GHz/5GHz Wireless USB Adapter
The Adapter is an 802.11a, 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you
can enjoy wireless mobility within almost any wireless networking environment.
The following lists the main features of your Adapter.
‹ 2.4GHz / 5GHz Dual-band design
‹ Compliant to IEEE 802.11a, 802.11g & 802.11b standards
‹ Compliant to IEEE 802.11n (Draft 2.0)
‹ Compliant to USB 2.0 standard
‹ Wire-free access to networked resources from anywhere beyond the PC with any USB host
interface.
‹ Support Infrastructure & Ad-Hoc mode
‹ The WUB-710A / W211NU doesn’t have“Ad Hoc on non-US frequencies” and/or “on DFS
frequencies”.
‹ Delivers data rate up to 300 Mbps at receiving path in 11n mode.
‹ For 802.11b/g, date rate dynamically shifts based on signal strength, for maximum availability
and reliability of connection.
‹ Support both 20MHz & 40MHz bandwidth
‹ Support WEP 64/128, WPA, WPA2 encryption
‹ Support QoS – WMM
‹ Multi-path (1x2) design and two PCB antennas built-in design guarantee best transmitting /
receiving quality.
‹ Support Windows-base wireless LAN GUI
‹ Support WPS enable on S/W utility
‹ Support Windows XP, 2K & Vista
2.2
Package Content
‹
‹
2.3
System Requirement
‹
‹
2.4
2.4GHz/5GHz Wireless USB Adapter
Quick Start Guide
Pentium class notebook computers with at least one available USB slot
Microsoft Windows XP or 2K
LED Definition
Single LED for Wireless Link and Activity
10
2.5
Wireless Utility & Adapter Hardware Installation
NOTE: If you have connected the USB Adapter to your computer, please remove it first.
Follow the instructions below to install the USB Adapter and Utility.
STEP 1
Please insert your USB Adapter to your Laptop, and auto-install the driver and utility.
2.6 Using the Utility to Configure Your Network
The following are explanations on how to configure and use the Utility program. After completing the
installation procedure, a new icon as shown below will automatically appear in the lower right tray bar.
Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client
Utility.
The Wireless Client Utility window as shown below will appear.
The user can now use any of the management functions available in the IEEE 802.11 Wireless Client
Utility.
2.6.1 Link Information
Click the Link Information tab to see general information about the program and its operations. The
Link Information tab does not require any configuration.
11
The following table describes the items found on the Link Information screen.
Wireless Network Status
Profile Name
The name of the current selected configuration profile. Set up the
configuration name on the Profile tab.
SSID
Displays the wireless network name.
Link Status
Shows whether the station is associated to the wireless network.
The type of network the station is connected to. The options include:
Network Type
Infrastructure (access point)
Ad Hoc
Wireless Mode
Displays the wireless mode. 802.11a or 802.11n or 802.11g or 11b
Channel
Shows the currently connected channel.
Transmit Rate
Displays the current transmit rate in Mbps.
AP MAC Address
Displays the MAC address of the access point the wireless adapter is
associated to.
Signal Strength
Shows the strength of the signal.
Security Status
Security
Shows the security type –
WAP-PSK/WAP2-PSK or 802.1X
Authentication
Displays the authentication mode.
Disable,
WEP,
WPA/WPA2,
TCP/IP Status
IP Address
Displays the computer's IP address.
Subnet Mask
Displays subnet mask
Gateway
Displays gateway address
12
2.6.2 Site Survey
Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click
Refresh to refresh the list at any time.
Connecting to a different network
Hold your mouse pointer over the network icon, and click the right mouse button to select the network.
Click the Connect button to connect the available network. If no configuration profile exists for that
network, the Profile Settings window opens to ask to create a profile for the network. Follow the
procedures to create profile for that network.
2.6.3 Profile
13
To add a new configuration profile, click Add on the Profile tab.
To modify a configuration profile, select the configuration from the Profile list and click the Edit button.
Scan Available Networks
Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc
networks. On this list, click Refresh to refresh the list at any time.
To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile
Settings.
14
Click Next to continue the profile setting.
To define the security mode, select the security button of the desired security mode. And then click Next
to continue. Please see following table for details of security modes.
WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA).
Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen. The
options include:
TLS (Transport Layer Security) is a Point-to-Point Protocol (PPP)
extension supporting additional authentication methods within PPP.
Transport Layer Security (TLS) provides for mutual authentication,
integrity-protected cipher suite negotiation, and key exchange between two
endpoints.
PEAP (EAP-GTC) (Protected Extensible Authentication Protocol)
authenticates wireless LAN clients using only server-side digital certificates by
creating an encrypted SSL/TLS tunnel between the client and the
authentication server. The tunnel then protects the subsequent user
authentication exchange.
PEAP (EAP-MSCHAP V2) (Protected Extensible Authentication
Protocol) To use PEAP (EAP-MSCHAP V2) security, the server
must have WPA-PEAP certificates, and the server properties must
already be set. Check with the IT manager
TTLS (Tunneled Transport Layer Security) An EAP variant that
provides mutual authentication using a certificate for server authentication,
and via a secure TLS tunnel for the client
LEAP (Lightweight and Efficient Application Protocol) is the
general framework for a set of high-performance, efficient protocols
which are ideal for mobile and wireless applications. LEAP is designed
to address all the technical requirements of the wireless data
communications industry, and is oriented towards providing the
greatest benefit to the industry and the consumer
15
WPA-PSK/WPA2-PSK Enables WPA/WPA2 Passphrase security.
Fill in the WPA/WPA2 Passphrase on Security Settings screen.
802.1x Enables 802.1x security. This option requires IT administration.
Choosing 802.1x opens the 802.1x Security Settings screen. The options
include:
TLS
PEAP
TTLS
LEAP
Advanced Settings
After Security Settings finished, the Advanced Settings screen will be shown as following.
The following table describes the items found on the Advanced Settings screen.
Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode.
The options include:
Continuous Access Mode
Maximum Power Saving
Fast Power Saving
802.11b Preamble Displays the 802.11b preamble format.
The options include:
Long
Short
Auto
RTS Threshold Value from 0 ~ 2347
FRAG Threshold Value from 256 ~ 2346
Wireless Mode Include:
802.11b
802.11g
802.11n
16
After advance settings are finished, the following screen showed as below.
You can activate the profile now or later.
17
Chapter 3 – Maintenance
This chapter describes how to uninstall or upgrade the Wireless Utility.
3.1
Uninstall the Driver & Utilty
Follow the steps below to remove (or uninstall) the USB Adapter driver from your computer.
Step 1. To remove the driver from the OS, go to Start Æ Programs Æ Wireless Client Utility
Step 2.
Double-click Uninstall
Step 3.
It will auto-remove the driver and utility
18
Glossary
For unfamiliar terms used below, look for entries elsewhere in the glossary.
AD-HOC (IBSS)
Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from
computer to computer without the use of a base station (access point).
Two or more wireless stations communicate directly to each other. An ad-hoc network may
sometimes be referred to as an Independent Basic Service Set (IBSS).
CHANNEL
A radio frequency used by a wireless device is called a channel.
EAP AUTHENTICATION
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1X transport mechanism in order to support multiple types of user authentication. By using
EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and
a RADIUS server perform authentication.
ENCRYPTION
The reversible transformation of data from the original to a difficult-to-interpret format. Encryption is
a mechanism for protecting confidentiality, integrity, and authenticity of data. It uses an encryption
algorithm and one or more encryption keys.
FRAGMENTATION THRESHOLD
This is the maximum data fragment size that can be sent before the packet is fragmented into smaller
packets.
IEEE 802.1X
The IEEE 802.1X standard outlines enhanced security methods for both the authentication of wireless
stations and encryption key management. Authentication can be done using an external RADIUS
server.
INFRASTRUCTURE (BSS)
When a number of wireless stations are connected using a single AP, you have a Basic Service Set
(BSS).
19
ROAMING
In an infrastructure network, wireless stations are able to switch from one BSS to another as they
move between the coverage areas. During this period, the wireless stations maintain uninterrupted
connection to the network. This is roaming. As the wireless station moves from place to place, it is
responsible for choosing the most appropriate AP depending on the signal strength, network
utilization among other factors.
SSID
The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network.
Wireless devices must have the same SSID to communicate with each other.
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed
by the authentication server.
USER AUTHENTICATION
WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless clients
using an external RADIUS database. If you do not have an external RADIUS server, use
WPA-PSK/WPA2-PSK (WPA -Pre-Shared Key) that only requires a single (identical) password entered
into each access point, wireless gateway and wireless client. As long as the passwords match, clients will be
granted access to a WLAN.
WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
WCB-321A and the AP or other wireless stations to keep network communications private. Both the
wireless stations and the access points must use the same WEP key for data encryption and decryption.
WPA/WPA2
Wi-Fi Protected Access (WPA) and WPA2 (future upgrade) is a subset of the IEEE 802.11 i security
specification draft. Key differences between WPA and WEP are user authentication and improved data
encryption. WPA2 is a wireless security standard that defines stronger encryption, authentication and
key management than WPA.
20

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print
XMP Toolkit                     : 3.1-701
Creator Tool                    : PScript5.dll Version 5.2
Modify Date                     : 2008:04:02 18:22:56+08:00
Create Date                     : 2008:04:02 15:45:06+08:00
Metadata Date                   : 2008:04:02 18:22:56+08:00
Format                          : application/pdf
Title                           : Microsoft Word - WUB-710A User Manual.doc
Creator                         : linda.sung
Producer                        : Acrobat Distiller 8.1.0 (Windows)
Document ID                     : uuid:2de444ea-11de-4fbf-ab1b-639d7be84de6
Instance ID                     : uuid:92be65e5-cc1d-4434-803a-e23b6b78cf37
Page Count                      : 20
Author                          : linda.sung
EXIF Metadata provided by EXIF.tools
FCC ID Filing: SI5WUB710A

Navigation menu