Wistron NeWeb RU8-1 IEEE 802.11g USB 2.0 Adapter User Manual

Wistron NeWeb Corporation IEEE 802.11g USB 2.0 Adapter Users Manual

Users Manual

802.11g USB2.0 WLAN AdapterUser’s GuideVersion: 1.0 — Dec. 2003
1Copyright StatementNo part of this publication may be reproduced, stored in a retrieval system, ortransmitted in any form or by any means, whether electronic, mechanical,photocopying, recording or otherwise without the prior writing of the publisher.Windows™ 98SE/2000/ME/XP are trademarks of Microsoft® Corp.Pentium is trademark of Intel.All copyright reserved.
2Regulatory InformationFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class Bdigital device, pursuant to Part 15 of the FCC Rules. These limits are designed toprovide reasonable protection against harmful interference in a residential installation.This equipment generates, uses and can radiate radio frequency energy and, if notinstalled and used in accordance with the instructions, may cause harmful interferenceto radio communications. However, there is no guarantee that interference will notoccur in a particular installation. If this equipment does cause harmful interference toradio or television reception, which can be determined by turning the equipment offand on, the user is encouraged to try to correct the interference by one of thefollowing measures:-  Reorient or relocate the receiving antenna.-  Increase the separation between the equipment and receiver.-  Connect the equipment into an outlet on a circuit different from that towhich the receiver is connected.-  Consult the dealer or an experienced radio/TV technician for help.FCC Caution: To assure continued compliance, (example - use only shieldedinterface cables when connecting to computer or peripheral devices) anychanges or modifications not expressly approved by the party responsible forcompliance could void the user's authority to operate this equipment.This device complies with Part 15 of the FCC Rules. Operation is subject to thefollowing two conditions: (1) This device may not cause harmful interference,and (2) this device must accept any interference received, includinginterference that may cause undesired operation.IMPORTANT NOTE:FCC Radiation Exposure Statement:This equipment complies with FCC radiation exposure limits set forth for anuncontrolled environment. This equipment should be installed and operatedwith minimum distance 20cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with anyother antenna or transmitter.
3Table of ContentsRegulatory Information ________________________________________________21. Welcome __________________________________________________________41.1 Kit Contents______________________________________________________51.2 Main Features of 802.11g USB 2.0 WLAN Adapter _____________________61.3 Wireless Networking Scenarios ______________________________________71.4 Advantages for Using Wireless Network_______________________________92. Quick Start to Wireless Networking____________________________________102.1 Installation______________________________________________________102.2 Connecting to an Existing Network__________________________________123. Step-by-Step Installation Guide _______________________________________143.1 Install the 802.11g USB2.0 adapter Driver / Utility _____________________153.1.1 Additional Setup Processes ________________________________193.1.2 Disable Windows XP Zero-Configuration __________________203.2 Verifying the Driver/Utility ________________________________________213.3 802.11g USB2.0 WLAN Utility______________________________________223.4 Basic Setting for Infrastructure Mode _______________________________233.5 Basic Setting for Peer-to-peer Mode _________________________________243.6 Remove your 802.11g USB 2.0 WLAN Adapter________________________253.7 Uninstall the 802.11g USB2.0 WLAN Utility / Driver ___________________264. Using the Utility ___________________________________________________274.1 Status Tab_______________________________________________________274.2 Configuration Tab________________________________________________294.3 WEP Tab _______________________________________________________304.4 Security Tab_____________________________________________________344.5 IBSS Tab _______________________________________________________414.6 Domain Tab _____________________________________________________424.7 About Tab_______________________________________________________445. Network Application________________________________________________455.1 Surveying the Network Neighborhood _______________________________455.2 File Sharing _____________________________________________________465.3 Using the Shared Folder___________________________________________476. Product Specifications ______________________________________________48
41. WelcomeThank you for purchasing our 802.11g USB 2.0 WLAN Adapter, and welcome toWireless LAN—the easy way to wireless networking.This user’s guide introduces to you the 802.11g USB 2.0 WLAN Adapter anddescribes the most common configurations, which will help you connect to yournetwork easily.Please read this manual to get familiar with the IEEE802.11g Wireless LAN. Thismanual contains detailed instructions in operation of this product.    Please keep thismanual for future reference.As this product is designed to run under Microsoft Windows, it is recommended thatto be installed by people who are familiar with the installation procedures for networkoperating systems under Microsoft Windows.
51.1 Kit ContentsThe 802.11g USB 2.0 WLAN Adapter kit should include the following items: One802.11g USB 2.0 WLAN Adapter with USB cable, one CD and one Quick StartGuide.a. One 802.11g USB 2.0 WLAN Adapterb. One USB cable   c. One Software CD including:1. Utility & Driver Installation Software2. Acrobat Reader3. User Manual PDF Filed. Quick Start GuideIf any of the items mentioned above are damaged or missing, please contact yourdistributor.
61.2 Main Features of 802.11g USB 2.0 WLAN AdapterA. Status LEDz Off: Power Off.z Blinking: The USB adapter is powered on butno wireless connection is made yet.z Steady Green: Wireless connection is linked.B. USB Connector802.11g USB 2.0 WLAN Adapter features:1. High-speed wireless connection, up to 54 Mbps2. IEEE802.11g (DSSS) standard for 2.4 GHz Wireless LAN3. Plug-and-Play installation4. Solid design with an integrated antenna5. Full mobility and seamless cell-to-cell roaming6. Automatic scale back at per packet level802.11g USB 2.0 WLAN Adapter supports:1. Automatic load balancing for optimized bandwidth2. Advanced power management3. Windows®98SE, ME, 2000 and XP (subject to availability).
71.3 Wireless Networking ScenariosAs our 802.11g USB 2.0 WLAN Adapter is interoperable and compatible with otherIEEE 802.11g compliant products from other manufacturers, it offers you the mostfreedom to establish your ideal wireless network.  Therefore, after installing 802.11gUSB 2.0 WLAN Adapter, you can connect your computer to:a. A Peer-to-Peer Workgroup of 802.11g compliant wireless devices.b. A LAN (Local Area Network) constructed by Access Point(s) or other 802.11gcompliant systems.c. Share your Internet access by using just one connection, share printers and otherperipheral devices, share data and image files between networked PCs, play multi-player games, and use other network enabled sharing resources.
8A. Peer-to-Peer Networking:An Ad Hoc Network could be easily set up with some PCs and this 802.11g USB2.0 WLAN Adapter or our other WLAN devices.    Therefore, it is very suitable tobuild a network for temporary use, such as for demonstration in exhibition, fornew sales point/branch use and alike.B. Cooperate LAN (Local Area Networking):With some 802.11g USB 2.0 WLAN Adapters and Access Points, it is easy toconstruct a LAN with access to Internet for enterprise use.The construction is quite easy that the 802.11g USB 2.0 WLAN Adapter andAccess Point will automatically work at the most suitable frequency when AccessPoint is set within the proper range.In addition, commonly manufacturers will bundle the Site-Survey tool for users tocheck the communication quality.
91.4 Advantages for Using Wireless Network802.11g USB 2.0 WLAN Adapter can wirelessly transmit and receive data,minimizing the need for wired connections, at a speed of up to eleven megabit persecond. With the 802.11g USB 2.0 WLAN Adapter you can locate your PC whereveryou want without wires and cables.The 802.11g USB 2.0 WLAN Adapter provides LAN users with an access to real-timeinformation anywhere in their organization. The mobility provides effectiveness andefficiency, which are not available under wired networks.The 802.11g USB 2.0 WLAN Adapter configuration is easy to switch between peer-to-peer networks, suitable for a small number of users, and full infrastructurenetworks of thousands of users that allow roaming around a broad area.Therefore, you may see many advantages for adopting Wireless Networking asfollows:- Less Space Limits: The 802.11g USB 2.0 WLAN Adapter provides access tonetwork services without wires; therefore, it gives you more freedom to allocateand style your living and working space. In addition, in some areas where is hardor expensive to connect to wired networks, such as historic buildings, classroomsor mobile connectivity, then you can count on wireless networking.- Flexible Workgroups and Lower Cost: For workspaces that are frequentlyreconfigured for temporarily use such as demo in exhibitions, wirelessnetworking is easy to set up of lower total cost—and all equipments arerecyclable. You do not have to remove the old wires and then build up the newones again and again.- Networked Conference Rooms: Users can access the network as they move froma meeting to another, getting the access to information/data and the ability tocommunicate decisions while “on the go”.- Ad Hoc Networking: On site consulting and small workgroups may increaseproductivity with quick network setup and collaboration software.- Branch office Networking: With an Access Point to bridge between the LAN andInternet, wireless networking provides an easy to install, use and maintainnetwork for a remote or sales office.- Campus-Wide Network Mobility: The roaming capabilities allow enterprise to setup easy to use wireless networks that cover the entire campus transparently.
102. Quick Start to Wireless Networking2.1 Installation1.  Insert the installation CD.    It automatically starts the setup program forWLAN Utility and Driver.2.  Follow the installation wizard to complete the software installation process andrestart your computer..3.  Connect the 802.11g USB 2.0 WLAN Adapter to your PC/notebook PC.Note! Please use USB extension cable to connect the 802.11g USB 2.0 WLANAdapter with your PC/Notebook during normal operation.
114.    Operation System will detect new device and verify the driver automatically.Note!  During installation procedure, each operating system may promptdifferent specific options:Windows 98SE: The system will request the original Windows CD during theinstallation process.    When the installation is finished, you’ll have to restart yourcomputer.Windows Me: Please restart your computer when the installation is finished.Windows 2000/XP: Select “Install the software automatically” when the windowwith this option appears, and then click “Next” to continue installation.Note! In Windows XP, it is recommended that you use the 802.11g USB2.0Utility.    Please check Chapter 3.1.2 to disable the Zero-Configurationbefore using the Utility.
122.2 Connecting to an Existing Network1.  Go to windows Startup > Program > 802.11g USB2.0 adapter Utility >802.11g USB2.0 adapter Utility to open the utility. The 802.11g USB2.0 adapterUtility window appears.    You can also see a small red icon   in WindowsSystem Tray.2.  Key in “Any” for Network name and click “Apply”. The 802.11g USB2.0adapter  will search an available network automatically. Once connected, theutility icon will becom   .     3    If you would like to connect with certain Access Point, you may contact with MISadministrator for Network Name.
134  Go to “Status” Tab to view network link status.5.  For details of each tab in 802.11g USB2.0 WLAN Utility, please read User’sGuide Chapter 4.
143. Step-by-Step Installation GuideThis section will lead you through the installation of 802.11g USB 2.0 WLANAdapter and IEEE802.11g WLAN software in detail.    People who are familiar withthe installation and settings of wireless device may refer to quick start guide toestablish a network in a snap.To establish your wireless network connection, the following steps should beexecuted:1. Install the software by using the installation CD.2. Install the 802.11g USB 2.0 WLAN Adapter.3. Install the required network protocols to communicate with your network.Mostly, you will need to set the TCP / IP protocol.The product is designed to operate under Windows 98SE, ME, 2000, XP andWindows CE (subject to availability).    The installation procedure is about the same.Please follow up the installation wizard that provided by your system to install thesoftware.
153.1 Install the 802.11g USB2.0 adapter Driver / UtilityNote!  Please install the 802.11g USB WLAN Driver & Utility before inserting the802.11g USB 2.0 WLAN Adapter.1. Insert the installation CD.  Insert the installation CD into your CD-ROMdrive.    The setup program automatically starts.2. Click “Next”.3. Click “Yes”.
164. Read the destination folder and click “Next”. The default destination folderis displayed in the setup dialog box.    Click “Next” to go on to Step 6. Youmay change the default folder by clicking “Browse” to select the destinationfolder you prefer (go on to Step 5). Click “ Next” to go to the next screen.5. Select the Program Folder and click “Next”.
176. Click “Next”.7.  Click “Finish”. The installation is complete.
188. Choose “Yes” to restart computer and click “Finish”.9. Connect the 802.11g USB 2.0 WLAN Adapter to your PC/notebook PC.    Toadjust the direction or position of the 802.11g USB 2.0 WLAN Adapter, pleaseuse the USB extension cable.              Notebook                             PCNote! Please use USB extension cable to connect your 802.11g USB 2.0 WLANAdapter with PC/Notebook during normal operation.
193.1.1 Additional Setup ProcessesDuring software installation procedure, each operating system may prompt differentspecific options. Mostly, you will be asked to add some necessary protocols and toedit some networking settings.1. Windows 98SE: The system may request the original Windows CD during theinstallation process. Please check with the network administrator for the values ofthe settings. When the installation is finished, you’ll have to restart your computer.2. Windows Me: Please check with the network administrator for the values of thesettings.    Please restart your computer when the installation is finished.3. Windows 2000: Please check with the network administrator for the values of thesettings.  Select “Install the software automatically” when the window with thisoption appears, and then click “Next” to continue installation.4. Windows XP: Select “Install the software automatically” when the window withthis option appears, and then click “Next” to continue installation.    Note thatbefore using the 802.11g USB2.0 WLAN Utility, please disable the Windows XPZero-Configuration first.
203.1.2 Disable Windows XP Zero-ConfigurationIn Windows XP, it is recommended that you use the 802.11g USB2.0 adapter Utility.Right after the installation, before opening the Utility, please follow the steps below todisable the Windows XP Zero Configuration:1. Go to “Control Panel” and double click “Network Connections”.2. Right-click “Wireless Network Connection” of 802.11g USB 2.0 WLAN Adapter,and select “Properties”.3. Select “Wireless Networks” tab, and uncheck the check box of “Use Windows toconfigure my wireless network settings”, and then click “OK”.
213.2 Verifying the Driver/Utility1. Windows 98SE/Me:Step 1.  Right-click “My Computer” icon on the desktop and choose “Properties”.Step 2.  Select “Device Manager” tab and open “Network adapters”.    You shouldsee your 802.11g USB 2.0 WLAN Adapter in the list.    Highlight it andclick “Properties” button.Step 3.  From the “Device status”, you should see the line “This device is workingproperly”.    If, instead, you see error messages displayed, please removethis Adapter (highlight this Adapter and click “Remove” button).    Restartyour PC and go through the installation process again.2. Windows 2000:Step 1.  Right-click “My Computer” icon on the desktop and choose “Properties”.Step 2.  Select “Hardware” tab and click “Device Manager”.  Open “Networkadapters”.    You should see your 802.11g USB 2.0 WLAN Adapter in thelist.  Right-click this Adapter and choose “Properties”.Step 3.  From the “Device status”, you should see the line “This device is workingproperly”.    If, instead, you see error messages displayed, please uninstallthis Adapter (right-click this Adapter from the “Network adapters” list andchoose “Uninstall”).  Restart your PC and go through the installationprocess again.3. Windows XP:Step 1.  Click “Start>Control Panel> System”.Step 2.  Select “Hardware” tab, and click “Device Manager”.  Open “Networkadapters”.    You should see your 802.11g USB 2.0 WLAN Adapter in thelist.  Right-click this Adapter and choose “Properties”.Step 3.  From the “Device status”, you should see the line “This device is workingproperly”.    If, instead, you see error messages displayed, please uninstallthis Adapter (right-click this Adapter from the “Network adapters” list andchoose “Uninstall”).  Restart your PC and go through the installationprocess again.
223.3 802.11g USB2.0 WLAN Utility802.11g USB 2.0 WLAN Adapter has its own management software, named 802.11gUSB2.0 Utility, and users can control all functions provided with it. The Utility iconappears in the Windows System Tray. The Utility includes seven tabs: Status,Configuration, WEP, Security, IBSS, Domain and About.The definition of the color of the Utility icon is as follows:  Connected (Green)   Low quality (Yellow)   Disconnected (Red)In Peer-to-peer (Ad Hoc) mode, in one workgroup, the Channel and SSID of eachstation must be the same—therefore they can communicate with each other within thelocal LAN properly. Moreover, all connected computers should have the same net IDand subnet ID.To open 802.11g USB2.0 Utility, you may double click the status icon in theWindows System Tray.
233.4 Basic Setting for Infrastructure ModeTo connect with an Access Point, please follow the process below:1. Select the “Configuration” tab2. Select “Access Point” for Network Type3. Select or enter the correct SSID (Network Name)4. Press the “Apply” button. SSID is the group name that will be shared by every member ofyour wireless network .You will only be able to connect with anAccess Point (AP), which has the same SSID. Note that the SSIDwill be case sensitivity. Profile allows you to save five sets of default settings.    Afterentering the values of the settings (SSID, Network Type, Channeletc.), set a name in the Profiles field.    Click “Apply” button.  You can key in “Any” for name work name so that the 802.11g USB2.0adapter can search for the available network automatically.
243.5 Basic Setting for Peer-to-peer ModeIf you have more computers and only want to place them in a local area network, oryou want to communicate directly without using an Access Point or any connection toa wired network, then you can select the “Peer-to-peer” mode on your WLAN Utility.A. Peer-to-peerPlease follow the procedures below to set the “Peer to peer”:1. Select “Configuration” tab.2. Select “Peer-to-peer” for Network Type.3. Type in the SSID and set a channel, which you want to use in your802.11 Wireless LAN.4. Press the “Apply” button. Every member of your peer-to-peer network must set to the samechannel and SSID, which is case sensitive.   You must select a SSID if you use the Peer-to-peer (802.11 Ad hoc) mode.
253.6 Remove your 802.11g USB 2.0 WLAN AdapterYou can remove the device after you finished the action with the device. However,in Windows XP/ME and Windows 2000, please follow the safe removal procedure.You can find a safe removal icon in your computer’s notification area.1. Double click the safe removal icon.2. The “Unplug or Eject Hardware” window will pop up. You can select thedevice you want to remove. Then, click the Stop button.Note! When removing the 802.11g USB 2.0 WLAN Adapter, you will lose yourconnection to the network. Make sure you have closed all files and networkapplications (such as e-mail) prior to removing the 802.11g USB 2.0 WLANAdapter.
263.7 Uninstall the 802.11g USB2.0 WLAN Utility / Driver1. Make sure the Utility is closed.2. Go to windows Startup > Program_>802.11g USB2.0 adapter Utility >Uninstall 802.11g USB2.0 adapter3. Follow the uninstall wizard to complete the uninstallation.4. Click “Finish” when uninstallation is completed.5. You should restart your computer.
274. Using the Utility4.1 Status TabThe Status menu displays information on the current status of your connection to thewireless LAN. You can display this menu by choosing the Wireless NetworkStatus... command from the pop-up menu, or by clicking on the Status tab when theConfiguration Utility is displayed on your desktop.The fields in this menu provide the following information: State: shows the association state of your computer with the wireless LAN.Possible values for this field are:• AdHoc: The adapter is operating in Peer-to-Peer mode. This field also shows thevirtual MAC address used by computers participating in the AdHoc network.• Associated: The adapter is operating in Infrastructure mode. This field alsoshows the MAC address of the Access Point with which you arecommunicating.• Listening: Indicates that the adapter is listening on all allowed channels, but hasnot yet found a peer-to-peer or infrastructure network with which to associate.• Stopped: The radio has been stopped by the Disable Radio Button.• Scanning: The adapter is scanning for transmissions by other wireless adapterson all channels.• Associating: The adapter is in the process of associating with a network
28• Not Associated: The adapter has not found any network with which to associate.• Hardware Radio Switch OFF: The radio has been disabled by moving thehardware radio switch to the off position. Note that not all adapters have ahardware switch. Current Tx Rate: shows the current transmit rate of the current association. Current Channel: shows the channel on which the connection is made. InInfrastructure mode, this number changes as the radio scans the availablechannels. Throughput: shows the short term transmit and receive throughput inbytes/second, and is continuously updated. Link Quality: is based on the quality of the received signal of the Access Pointbeacon. Signal Strength: is based on the received signal strength measurement of thebaseband processor of the Beacon signal.You can click the Disable Radio button to turn off the wireless radio. When you clickthis button, the State field indicates that the radio has been stopped and the remainingfields in this window display either a zero or Not Applicable. Click this button againto turn the radio back on. However, if the radio has been disabled by the hardwareswitch on the adapter, clicking this button displays a popup message telling you thatthe radio cannot be enabled.You can click the Rescan button to force the radio to rescan all available channels.If your link quality or signal strength is poor, rescanning can be used to push theradio off a weak Access Point and search for a better link with another AccessPoint.
294.2 Configuration TabThe Configuration tab shows information of Network Name, Network Type. AndProfiles allows you to save five sets of default settings. After entering the values ofthe settings (SSID, Network Type, Channel etc.), set a name in the Profiles field.
304.3 WEP TabYou may enhance the security of your network by enabling the “Encryption” function.The WEP Required Mode enables you to define the encryption keys that your 802.11gUSB2.0 Adapter should use.Caution:If you wish to enable the “Encryption” function, you must enable this functionfor all computers of your network, and the WEP key needs to be the same forall IEEE802.11g stations.Follow the steps below to set your WEP Required Mode:1. Select one mode from the drop down menu of WEP required Modeand set the WEP key.    Two modes are available:A. Manual 64 bitsB. Manual 128 bits2. Press “Apply” button when finish the WEP setting.
31a. Select “64 bit” vs “Alphanumeric” and enter 5-digit WEP key. b. Select “64 bit” vs “Hexadecimal” and enter 10-digit WEP key.
32c. Select “128 bit” vs “Alphanumeric” and enter 13 digit WEP key.d. Select “128 bit” vs “Hexadecimal” and enter 26 digit WEP key.
33d. You may choose “Create Keys with Passphrase”.
344.4 Security TabExcept WEP Tab in previous page, this Tab provides you the enhancement of WEPsecurity. You may choose the authentication type “MD5-Challenge”, “LEAP”,“TTLS”, “PEAP”, “TLS/Smartcard” or “WPA-PSK” which would require you toenter “Username”,“Password” and related data, please contact with MIS administratorfor the settings.
35a. MD5-Challenge: MD5 is an EAP-Type for authentication. It is analogous to thePPP CHAP protocol. A challenge string is sent from the Authentication Server tothe  Supplicant in the MD5-Challenge Request. The challenge string with the userpassword is hashed using MD5 and the hash is returned in the MD5-ChallengeResponse. The Authentication Server performs the same hash and compares the resultwith that returned by the Supplicant to determine whether the authentication is aSuccess or Failure.
36b. LEAP: LEAP (Lightweight Extensible Authentication Protocol) is a Ciscoproprietary EAP-Type. It is designed to overcome some basic wireless authenticationconcerns through Mutual Authentication and the use of dynamic WEP keys.
37C. TTLS: (Tunneled TLS) is an EAP-Type for authentication that employs a two-phase authentication process. In the first phase the Authentication Server isauthenticated to the Supplicant . Using TLS, a secure channel is established throughwhich the Supplicant can be authenticated to the Authentication Server using legacyPPP authentication protocols such as PAP, CHAP, and MS-CHAP. TTLS has theadvantage over TLS that it only requires a certificate at the Authentication Server. Italso makes possible forwarding of Supplicant requests to a legacy RADIUS server.TTLS also supports identity hiding where the Authenticator is only aware of theanonymous username used to establish the TLS channel during the first phase but notthe individual user authenticated during the second phase.
38d. PEAP: (Protected Extensible Authentication Protocol) is a two-phase authenticationlike TLS. In the first phase the Authentication Server is authenticated to theSupplicant. Using TLS, a secure channel is established through which any otherEAP-Type can be used to authenticate the Supplicant to the Authentication Serverduring the second phase. A certificate is only required at the Authentication Server.PEAP also supports identity hiding where the Authenticator is only aware of theanonymous username used to establish the TLS channel during the first phase but notthe individual user authenticated during the second phase.
39e. TLS/Smartcard: TLS is an EAP-Type for authentication based upon X.509certificates. Because it requires both the Supplicant and the Authentication Serverto have certificates, it provides explicit Mutual Authentication and is resilient toman-in-the-middle attacks. After successful authentication a secure TLS link isestablished to securely communicate a unique session key from the AuthenticationServer to the Authenticator.
40f. WPA-PSK: Wi-Fi Protected Access (WPA) is a replacement security standard forWEP. It is a subset of the IEEE 802.11i standard being developed. WPA makes useof TKIP to deliver security superior to WEP. 802.1X access control is still employed.The Authentication Server provides the material for creating the keys.
414.5 IBSS TabWhen communicating in a peer-to-peer network, you may specify a channel on whichyou prefer communications to take place. To specify a channel, click on the channelto select it, and then click the Apply button.Note that this is not necessarily the channel on which peer-to-peer communicationswill be established. If the IBSS network names (SSID) are the same for nodes in thepeer-to-peer network but they have different preferred channels, a network can still beestablished. In this case, if it cannot find a network with the specified network nameon the preferred channel, a station will scan other channels until it finds a peer-to-peernetwork with the specified network name on which to communicate.If you specified Access Point as the network type (in the Configuration Tab),choosing a channel in this field has no effect until you change the network type toPeer-to-Peer.
424.6 Domain TabA domain refers to a territory in which radio frequency transmissions must conform tothe standards set by a single regulatory agency. For example, in the United States, theallowed frequencies and channels for wireless data communications are set by theFCC. Every country is free to set its own standards, although in practice manycountries may use the same standards.The IEEE 802.11d standard provides a means for a wireless LAN adapter to detect thedomain in which it is located and conform its transmissions to the standards set by thecontrolling regulatory agency. Not all PRISM adapters include this mechanism,however, so the version of the Domain menu displayed by the Configuration Utilitydepends on the versions of driver and firmware for your adapter.-802.11d SupportIf you specify None in the 802.11d support field, you must then choose the county inthe  Countries/Domains field which corresponds to your location. In this case youradapter operates according to the standards set by the appropriate regulatory agency.Note: If you specify Peer-to-Peer as the network type, you must specify None in the802.11d support field.
43If you choose Strict  in the 802.11d support field, your adapter will onlycommunicate with Access Points which provide 802.11d support. In this case, theadapter scans all communications channels for an Access Point which providesinformation on the channels, frequencies, and power levels permitted in your location.Once it finds such an Access Point, the adapter conforms its operations to thesestandards. The adapter will not communicate with an Access Point that does notprovide this information, nor will it join or create a peer-to-peer network if Strict802.11d support is specified in this field.If you choose Flexible in this field, your adapter can communicate with any AccessPoint it finds. In this case, you must also choose the county in theCountries/Domains field which corresponds to your location. Your adapter thensearches for an Access Point which provides information on the channels, frequencies,and power levels permitted in your location. If it finds such an Access Point, theadapter conforms its operations to these standards.If it does not find an Access Point which provides this information, it then willestablish communications with any Access Point it finds.
444.7 About TabThis tab provides you the version information of Firmware, Driver and Utility.
455. Network ApplicationThis section consists of the network applications of 802.11g USB 2.0 WLAN Adapter,including:A. To Survey the network neighborhoodB. To Share Your Folder with Your Network Member(s)C. To Share Your Printer with Your Network Member(s)D. To Access the Shared Folder(s)/File(s) of Your Network Members(s)E. To Use the Shared Printer(s) of Your Network Member(s)In fact, the network applications of 802.11g USB 2.0 WLAN Adapter are the same asthey are in a wired network environment.  You may refer to the following 3examples of Surveying the Network Neighborhood, File Sharing and Using theShared Folder.5.1 Surveying the Network NeighborhoodWhen multiple base stations are up and running in your wireless network, you can usethe procedure described below to display the other computers:1. Double-click My Network Places to display all stations in your MicrosoftWindows Network Group.2. To display other workgroups in the network environment, double-click EntireNetwork.3. If there is a second network operating system running in your networkenvironment (for example a Novell NetWare network), the “Entire Network”window will also display available servers running under the second networkoperating system. If you click on these servers, you may be asked to enteryour user name and password that applies to the other network operatingsystem. If you cannot find it, verify whether the other wireless computers are:z Powered up and logged on to the network.z Configured to operate with identical Microsoft Network settingsconcerning: Networking Protocol. Wireless Network Name.To enable the sharing of Internet access, you should set your WLAN mode as“Infrastructure” and connect to the access point.
465.2 File Sharing802.11g USB 2.0 WLAN Adapter allows the sharing of files between computers thatare logged onto the same wireless network. If you want to share your folder “MyDocuments” with other computers of the wireless network, please highlight thefolder “My Documents” and drag it to Shared Documents folder.Sharing files in the IEEE802.11g wireless network will be like sharing files on awired LAN.
475.3 Using the Shared FolderIf you would like to access a shared folder stored in other stations of same network,please follow the process below:1. Double-click the “My Network Places” icon, and then double-click thecomputer where the shared folder is located.2. Double-click the folder you want to connect to.3. Now you may open the needed file(s).Note!  If a password is required, the Windows will prompt a password column to you.Then you need to enter the password that had been assigned to this sharedfolder.
486. Product SpecificationsItem Key specificationsFrequency range ¾ U-NII: 2.412 ~ 2.484Ghz¾ Europe: 2.412 ~ 2.484Ghz¾ Japan: 2.471 ~ 2.497GhzModulation technique ¾ 802.11b: DSSS (CCK, BPSK, QPSK)¾ 802.11g: OFDMHost interface ¾ USB 2.0Channels support ¾ US/Canada: 11 (1 ~ 11)¾ Major European country: 13 (1 ~ 13)¾ France: 4 (10 ~ 13)¾ Japan: 14 (1~13 or 14th)Operation voltage ¾ 5V +/- 10%Current consumption ¾ Transmission mode    467mA  @ 5VDC(Ave) ¾ Receive mode        506mA  @ 5VDC(Ave) ¾ standby mode        384 mA @5VDC(Ave)Outputpower(preliminary)¾ 13 dBm@ 802.11g mode  ¾ 18 dBm@ 802.11b modeOperation distance(preliminary)¾ Indoor: 0-80m¾ Outdoor: 50-350mOperation Systemsupported¾ Windows 98SE, Me, 2K, XPDimension ¾ 72mm ( L) *    49mm(W) * 13mm(H)Security WEP ¾ 64-bit WEP,128-bit WEPOperation mode ¾ Infrastructure & Ad-hoc modeTransfer data rate ¾ 802.11g:             54, 48, 36, 24, 18, 12, 9, 6Mbps, auto-fallback ¾ 802.11b:11, 5.5, 2, 1Mbps, auto-fallback  LED indicator ¾ WLAN activity indicatorOperation temperature ¾ 0o ~ 55o CStorage temperature ¾ -25o ~ 70o CWi-Fi¾ WiFi Alliance CompliantWHQL ¾ Microsoft XP, 2K ComplaintEMC certificate ¾ FCC part 15 (USA)¾ IC RSS210 (Canada)¾ Telec (Japan)¾ ETSI (Europe)¾ The above regulation depends on customer’s request

Navigation menu