Zowee Technology USBWL170G WIRELESS USB ADAPTER User Manual WL 150G 1

Shenzhen Zowee Technology Co., Ltd. WIRELESS USB ADAPTER WL 150G 1

Users Manual

WL-170G-CUser Manual Version 1.0USB  Adapter
Table of Contents1. Installation instruction.............................................................21.1 System requirement..........................................................................21.2 Packing content.................................................................................22. Installation...............................................................................22.1 The installation of the adapter............................................................32.2 The installation of the driver and utility...............................................32.3 The confirmation of the installation of TCP/IP....................................73. Usage of utility.........................................................................93.1 Open the utility...................................................................................93.2 Main window information.................................................................103.3 More Settings..................................................................................124.  AP function...........................................................................184.1 Switch to AP mode...........................................................................184.2  AP mode main interface...................................................................194.3 Network Advanced settings.............................................................194.4 Encryption........................................................................................205. Product Specifications.................................................................21
21. Installation Guide1.1 System requirementsBefore the installation, please confirm your system meets the following requirements:     At least 300MHz CPU     At least 32MB RAM      Window XP/2000/ME/98SE operation system     CD-ROM (In order to install drivers)1.2 Packing ContentsThe following contents should be found in your box. If any of the listed contents are damaged or missing, please contact the retailer from whom you purchased the adapter for assistance.Standard contents˖Wireless USB adapterDriver and utility CD.    Quick Installation Guide2. Installation This chapter describes how to install the adapter, driver and utility.The adapter is compatible to Windows 98/Me/2000/XP systemDŽThis guide guide you the installation of the software and hardware on Windows XP.
32.1 The installation of the adapterInsert adapter to the USB port on the computer, and check if the connection is ok.2.2 The installation of the driver and utilityFollow the following steps:  1. Insert adapter to the USB port, figure 2-1 will appear.After a second, the found new hardware guide dialog box should be appear, please click ‘cancel’ to dismiss it. See figure 2-2.Figure 2-1 Found New HardwareFigure 2-2 Found New Hardware Wizard
42. Please Insert the CD which contains driver and utilityto CD-ROM, and choose ZD1211BWinPkgS_6_8_0_0.exe to execute it. Figure 2-3, install the program.Figure 2-3 Execute the driver and Utility program3. Choose ‘Next’ in figure 2-4 proceed to the installation, or choose cancel to quit the installation.Figure 2-4 ZyDAS Utility installation
54. You can change the install destination fold by click ‘Browse’ in figure 2-5.Figure 2-5 select the install destination folderNote: In the installation process, if you were prompted that the program has not passed the Microsoft Logo Test, don’t mind it, please click ‘continue anyway’ as shown in Figure 2-6.Figure 2-6 Hardware Installation
65 Click ‘Finish” in Figure 2-7 to complete the installation.Figure 2-7 Installation Finish6. You can check if the Driver is well installed. Select [My Computer] icon on the desktop, right-click it and select [Attribute] icon, then select [Hardware] tab, click [Device Manager] icon. If your hardware driver has been installed ok, you can see the information as Figure 2-8.Figure 2-8 Device manage window
72.3 Check if TCP/IP Protocol is installedTo ensure the adapter works well, your operation system should has been installed TCP /IP protocol. On Windows XP platform, TCP/IP Protocol is a default setting. (You can skip this section). If you are on other operation systems, please check first if this protocol is installed. On Windows XP platform, please check as the following steps:  &OLFN>6WDUW@ĺ>&RQQHFWWR@ĺ>'LVSOD\DOOFRQQHFWLRQV@You will see the Network Connection as Figure 2-9.Figure 2-9 Network Connection Windows2. Right click and select [Attribute], the network connection properties will appear as figure 2-10, you can check if the TCP/IP Protocol has installed.
8Note: If there is no TCP/IP Protocol been installed in your operation system, you should insert the OS CD to install it before you can use you Adaptor to connect Network. You can refer to other relevant document for installation.Figure 2-10 TCP/IP protocol
93. Usage of utilityUtility is a tool to manage the adapter. Using it, you can check and adjust the settings, or control the working status of the adapter.  3.1 Open the UtilityAfter the opening of the utility, the following icon (as figure3-1) will appear at the task bar at right bottom of screen.Figure 3-1 Utility IconDouble-Click the icon to open the Main Window of this program as shown in  figure 3-2.Figure 3-2 Utility Main Window
103.2 Main Window informationMain Window of the utility shows the connection status of the wireless adapter to Wireless Networking (If the communication has been setup) as Figure 3-2.Mode – This selection frame is to choose the working mode for wireless adapter. You can choose Station or Access Point. In Station mode, the device can build connection to the surrounding AP. In Access Point, the equipment can be accessed to the point, and also other equipment can build connections with the access point.  See figure 3-3.Figure 3-3 Work Mode SwitchSID- It shows the wireless network name has connected or is ready to connect. The figure 3-2 shows the Wireless adapter has connected to the wireless network - default 001.BSSID –It means the MAC Address of its connected AP or the Ad Hoc of the basic service system (BSS) ID Strength - It means the signal intensity of the access point. It indicates the signal intensity of different networking in order that the user can auto choose the good networking to build up connection.
11The current networking connection information includes the networking signal channel, network topology structure, data transmission ratio, and encryption mode. Signal Channel - It shows the current signal channel. The figure can vary, because the equipment will scan the usable signal channel and it also varies. Encryption-- Wireless adapter encrypts the information. All the devices in network should use the same encryption to ensure thecommunication.Two kinds network topology structure:      basic structure      point to point structureBasic structure -- It means to build connection with AP. Once the connection is built, AP will allow you to visit any wireless LAN or Wired LAN (Ethernet)Point to Point -- It means the connection to wireless end user without AP. The connection can be built very quickly, without any pre-configure, eg, all the meeting attendee can share the meeting content. Connection Status — it shows the connection status of wireless adapter and BSSID. Rescan - Wireless adapter will re-search all Wireless Network, if the current connection is too low, the signal strength is weak or want to find the other wireless Network, the re-scan will let the adapter to connect to equipment with better signal quality.
123.4 More settingsMore settings — This website allows user to adjust the current working attribute , including transmission ratio, input networking SSID, networking topology structure, identity authentication and encryption mode , etc. User can also set up different working mode in one networking, and save them as different profile, avoid set up repeatedly when you re-using. [Normal connection setting]Tx Rate: Set-up the valid ratio, including: 54,48,36,24,18,12,9,6,11,5.5,2,1Mbps or automatically, normally use automatically.  See Figure 3-4.Networking Type: change the network topology between Infrastructure and Ad Hoc Mode.Figure 3-4 More setting
13Authenticate and encrypt the set-up: As to the safety in Wireless environment, IEE 802.11 stipulates WEP(Wire Equivalent encryption) , the agreement is made to ensure the transmission security. WEP uses the keys to encrypt or decode the data package. The encryption process interrupted the frame order in order to be leaked. The WPA /WPA2 is used to develop 802.11 security system to overcome the defectiveness of WEP. Due to the inaccurate boundary of Wireless networking, the user should add some specific set-up to ensure the security. The identification way in build up wireless connection level provides different levels security method , eg, open system  , share key, auto , WPA, WEP-PSK, WPA2, WPA2-PSK. See figure 3-5.Figure 3-5 Authentication ConfigurationsOpen system — this selection will make network in open system mode, and will not use any identification method. Open system and AP will identify each other. If WEP key exists, identification is also unnecessary. Shared Key — This selection will make network in shared key mode. In Shared Key identification system, you should use 4 step frames’ exchange to make sure if AP uses the same WEP key
14WPA-PSK This selection allows to use WPA Pre-Shared key. It allows user and AP to use WPA –PSK /WPA2-PSK encryption way. WPA/WPA2- The networking use IEEE 802.1x identification method. This method will use in RADIUS˄Remote Access Dial-in User Serviceˈlong-distance dial the user environment. RADIUS environment support EAP, including PEAP, TLS/Smart Card, TTLS and LEAP. Data EncryptionThe encryption method includes WEPˈ Temporal Key Integrity Protocol encryption and Advanced Encryption Standard (AES). See Figure 3-6.Figure 3-6 Encryption configurationsProhibit - Prohibit encryption function. WEP --  WEP is to encrypt before data wireless transmission, and use the  same WEP wireless equipment to communicate. TKIP  --  TKIP use the sticker encryption rule than WEP to encrypt. It also uses the WLAN arithmetic  to encryption. TKIP will test the security setting once the encryption key is confirmed. AES – AES is a symmetrical 128 bit encryption technology. It can works in multi-layer in networking[WEP KEY Setting]This selection can set-up WEP KEY SETTING. WEP KEY is a cluster of 64 bytes(5 bites) , 128 bytes (13 bits) or 256 bytes (39 bits) , 16 hexadecimal figures to key or decode data package. See Figure 3-7.
15Figure 3-7 WEP Key settingThe KEY mode can be set-up as hexadecimal mode: When you select “WPA” OR “WPA2” in identification mode, the setting this time will be valid. If you select “Open” or “Shared Key”, the setting here will not be valid. Valid modes include: TLS, PEAP and TTLS. See figure 3-8.Figure 3-8 WPA Encryption setting
16TLS/Smart Card—TLS( Transport Layer Security ) is used to create an encryption channel and get the identification of the Tech service, like SSL(Secure Sockets Layer) agreement ‘s web interface service validation. This method uses the figure to check the identity of the end user and service. TTLS -- TTLS validation uses the certificates to validate the service identity. Meanwhile, it saves the TLS security attribute. E.g., validate each other or share WEP Key secret. PEAP  --  PEAP (Protected Extensible Authentication Protocol) validation is another version of EAP ˄ Extensible Authentication Protocol˅. EAP ensures the connection of the wireless end user and service in the network operation Advanced SettingThis interface is mainly used to set up the language, area, power consumption, service mode and TRS /Frame figure in the user interface. See Figure 3-9.Power consumption setting can be set according to your working environment, including Continuous Access mode, Maximum Power- saving mode and Power-saving mode.
17Figure 3-9 Advanced SettingFrame Threshold -- Frame Threshold will show that 802.11 were divided into small parts, and deliver them to their destination. You can set the up and down limitation to each package to start the division function. If there is big conflict in the wireless networking, you can set different up and down limitation for testing to ensure the reliability. For the common use, you can only use default figure. RTS Threshold -- RTS/CTS (Request to Send/Clear to send) function is used to decrease the conflict between the wireless station to the minimum. When RTS/CTS is started, Router will continuously send the figures to another RTS/CTS. And you can also set different up and down limitation to start RTS/CTS .You are suggested to use Default figure (2347).
184. AP functionThis wireless LAN card has two working modes: Station and Access Point. When switched to AP mode, LAN Card will be an AP point, then it can accept the connect request from other wireless equipment. 4.1 Switch To AP Mode In the main window’s Mode slide down frame, click Access Point, switch to AP mode. See Figure 4-1.Figure 4-1 Work Mode Switch
194.2 AP mode main interfaceFigure 4-2 AP mode Configuration StatusAs figure 4-2, it shows the current network configuration information, including Network working channel, SSID, encryption mode, delivering signal level, all of which can be adjusted by More Setting. See Figure 4-3.4.3 Network Advanced settingsFigure 4-3 Access Point More Settings
20As figure 4-3, when the equipment is in Access Point Mode, the user can set the working mode, including network mode, working signal channel, transmission power, identification mode, encryption mode, frame figure and RTS/CTS frame figure. 4.4 EncryptionWEP Key setting: If you need to encrypt the network, you can select key setting mode. The figure 4-4 shows the mode after WEP key setting. You can set the password to the networking setting. Figure 4-4 WEP Key Settings
215. Product SpecificationsGeneral FeaturesStandards IEEE 802.11g; IEEE 802.11bInterface USB 1.1/2.0OS Windows 98/SE/ME,Windows 2000/XP, Linux, MAX OSXUser interface Easy to use user configuration softwareTransmit distance indoor up to 40 meters and outdoor up to 200 meters (standardtransmit distance is limited to the environments)roaming Support multipoint auto roaming and configuration; Supportwireless network environments auto detect.LED Link status indicatorAntenna type Omni-directional interior AntennaRF and baseband Technical FeaturesFrequency range 2.4~2.4835GHzRadio data rate 11gġ54/48/36/24/18/12/9/6Mďauto adaptiveĐ;11bġ11/5.5/2/1Mďauto adaptiveĐModulation BPSK, QPSK, CCK and OFDM (BPSK/QPSK/16-QAM/64-QAM)Spectrum SpreadTechnology DSSSTransmit power 16-17dBmď11gĐē18-20dBmď11bĐChannel 13Media Access ProtocolCSMA/CA with ACKData security WPA/WPA2; 64/128/152-bit WEP; TKIP/AESEnvironmental and PhysicalOperation Temp. 0ć-40ćStorage Temp. -40ć-70ćOperationHumidity 10% - 95% RH, Non-condensingdimension 75mm x 25mm x 10mm
FEDERAL COMMUNICATIONS COMMISSION (FCC) STATEMENT   This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: ---Reorient or relocate the receiving antenna. ---Increase the separation between the equipment and receiver. ---Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ---Consult the dealer or an experienced radio/TV technician for help.   Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)This device may not cause harmful interference. (2)This device must accept any interference received, including interference that may cause undesired operation. FCC RF RADIATION EXPOSURE STATEMENT: This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter. IMPORTANT NOTE: This device has been tested for compliance with FCC RF Exposure (SAR) limits in the typical laptop computer configuration and this device can be used in desktop or laptop computers with side mounted USB slots. This device and its antenna must not be co-located or operated in conjunction with any other antenna or transmitter.

Navigation menu