Zowee Technology USBWL170G WIRELESS USB ADAPTER User Manual WL 150G 1

Shenzhen Zowee Technology Co., Ltd. WIRELESS USB ADAPTER WL 150G 1

Users Manual

Download: Zowee Technology USBWL170G WIRELESS USB ADAPTER User Manual WL 150G 1
Mirror Download [FCC.gov]Zowee Technology USBWL170G WIRELESS USB ADAPTER User Manual WL 150G 1
Document ID861981
Application IDcDzmsPRFoLq3L2JjVs0BzA==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize27.94kB (349225 bits)
Date Submitted2007-10-31 00:00:00
Date Available2007-11-05 00:00:00
Creation Date2007-06-18 11:21:19
Producing SoftwareAcrobat Distiller 6.0 (Windows)
Document Lastmod2007-10-11 16:37:59
Document TitleWL-150G(1
Document CreatorAdobe Illustrator CS2
Document Author: user

USB Adapter
WL-170G-C
User Manual
Version 1.0
Table of Contents
1. Installation instruction.............................................................2
1.1 System requirement..........................................................................2
1.2 Packing content.................................................................................2
2. Installation...............................................................................2
2.1 The installation of the adapter............................................................3
2.2 The installation of the driver and utility...............................................3
2.3 The confirmation of the installation of TCP/IP....................................7
3. Usage of utility.........................................................................9
3.1 Open the utility...................................................................................9
3.2 Main window information.................................................................10
3.3 More Settings..................................................................................12
4. AP function...........................................................................18
4.1 Switch to AP mode...........................................................................18
4.2 AP mode main interface...................................................................19
4.3 Network Advanced settings.............................................................19
4.4 Encryption........................................................................................20
5. Product Specifications.................................................................21
1. Installation Guide
1.1 System requirements
Before the installation, please confirm your system meets the following
requirements:
At least 300MHz CPU
At least 32MB RAM
Window XP/2000/ME/98SE operation system
CD-ROM (In order to install drivers)
1.2 Packing Contents
The following contents should be found in your box. If any of the listed
contents are damaged or missing, please contact the retailer from
whom you purchased the adapter for assistance.
Standard contents˖
Wireless USB adapter
Driver and utility CD.
Quick Installation Guide
2. Installation
This chapter describes how to install the adapter, driver and utility.
The adapter is compatible to Windows 98/Me/2000/XP systemDŽ
This guide guide you the installation of the software and hardware
on Windows XP.
2.1 The installation of the adapter
Insert adapter to the USB port on the computer, and check if the
connection is ok.
2.2 The installation of the driver and utility
Follow the following steps:
1. Insert adapter to the USB port, figure 2-1 will appear.
After a second, the found new hardware guide dialog box should be
appear, please click ‘cancel’to dismiss it. See figure 2-2.
Figure 2-1 Found New Hardware
Figure 2-2 Found New Hardware Wizard
2. Please Insert the CD which contains driver and utility
to CD-ROM, and choose ZD1211BWinPkgS_6_8_0_0.exe to execute
it. Figure 2-3, install the program.
Figure 2-3 Execute the driver and Utility program
3. Choose ‘Next’ in figure 2-4 proceed to the installation, or choose
cancel to quit the installation.
Figure 2-4 ZyDAS Utility installation
4. You can change the install destination fold by click ‘Browse’ in figure
2-5.
Figure 2-5 select the install destination folder
Note: In the installation process, if you were prompted that the program
has not passed the Microsoft Logo Test, don’t mind it, please click ‘continue
anyway’ as shown in Figure 2-6.
Figure 2-6 Hardware Installation
5 Click ‘Finish” in Figure 2-7 to complete the installation.
Figure 2-7 Installation Finish
6. You can check if the Driver is well installed. Select [My Computer]
icon on the desktop, right-click it and select [Attribute] icon, then select
[Hardware] tab, click [Device Manager] icon.
If your hardware driver has been installed ok, you can see the
information as Figure 2-8.
Figure 2-8 Device manage window
2.3 Check if TCP/IP Protocol is installed
To ensure the adapter works well, your operation system should has
been installed TCP /IP protocol. On Windows XP platform, TCP/IP
Protocol is a default setting. (You can skip this section). If you are on
other operation systems, please check first if this protocol is installed.
On Windows XP platform, please check as the following steps:
&OLFN>6WDUW@ĺ>&RQQHFWWR@ĺ>'LVSOD\DOOFRQQHFWLRQV@
You will see the Network Connection as Figure 2-9.
Figure 2-9 Network Connection Windows
2. Right click and select [Attribute], the network connection
properties will appear as figure 2-10, you can check if the TCP/IP
Protocol has installed.
Figure 2-10 TCP/IP protocol
Note: If there is no TCP/IP Protocol been installed in your operation
system, you should insert the OS CD to install it before you can use you
Adaptor to connect Network. You can refer to other relevant document
for installation.
3. Usage of utility
Utility is a tool to manage the adapter. Using it,
you can check and adjust the settings, or control the working
status of the adapter.
3.1 Open the Utility
After the opening of the utility, the following icon (as figure
3-1) will appear at the task bar at right bottom of screen.
Figure 3-1 Utility Icon
Double-Click the icon to open the Main Window of this program as
shown in figure 3-2.
Figure 3-2 Utility Main Window
3.2 Main Window information
Main Window of the utility shows the connection status of
the wireless adapter to Wireless Networking (If the communication has
been setup) as Figure 3-2.
Mode – This selection frame is to choose the working mode for wireless
adapter. You can choose Station or Access Point. In Station mode, the
device can build connection to the surrounding AP. In Access Point,
the equipment can be accessed to the point, and also other equipment
can build connections with the access point. See figure 3-3.
Figure 3-3 Work Mode Switch
SID- It shows the wireless network name has connected or is ready to
connect. The figure 3-2 shows the Wireless adapter has connected to
the wireless network - default 001.
BSSID –It means the MAC Address of its connected AP or the Ad Hoc
of the basic service system (BSS) ID
Strength - It means the signal intensity of the access point. It indicates
the signal intensity of different networking in order that the user can
auto choose the good networking to build up connection.
10
The current networking connection information includes the networking
signal channel, network topology structure, data transmission ratio, and
encryption mode.
Signal Channel - It shows the current signal channel. The figure can
vary, because the equipment will scan the usable signal channel and it
also varies.
Encryption-- Wireless adapter encrypts the information. All the devices
in network should use the same encryption to ensure the
communication.
Two kinds network topology structure:
basic structure
point to point structure
Basic structure -- It means to build connection with AP. Once the
connection is built, AP will allow you to visit any wireless LAN or Wired
LAN (Ethernet)
Point to Point -- It means the connection to wireless end user without
AP. The connection can be built very quickly, without any pre-configure,
eg, all the meeting attendee can share the meeting content.
Connection Status — it shows the connection status of wireless adapter
and BSSID.
Rescan - Wireless adapter will re-search all Wireless Network, if the
current connection is too low, the signal strength is weak or want to find
the other wireless Network, the re-scan will let the adapter to connect to
equipment with better signal quality.
11
3.4 More settings
More settings —
This website allows user to adjust the current working
attribute , including transmission ratio, input networking SSID,
networking topology structure, identity authentication and encryption
mode , etc. User can also set up different working mode in one
networking, and save them as different profile, avoid set up repeatedly
when you re-using.
[Normal connection setting]
Tx Rate:Set-up the valid ratio, including:
54,48,36,24,18,12,9,6,11,5.5,2,1Mbps or automatically, normally use
automatically. See Figure 3-4.
Networking Type:change the network t opology between Infrastructure
and Ad Hoc Mode.
Figure 3-4 More setting
12
Authenticate and encrypt the set-up:
As to the safety in Wireless environment, IEE 802.11 stipulates
WEP(Wire Equivalent encryption) , the agreement is made to ensure
the transmission security. WEP uses the keys to encrypt or decode the
data package. The encryption process interrupted the frame order in
order to be leaked. The WPA /WPA2 is used to develop 802.11 security
system to overcome the defectiveness of WEP.
Due to the inaccurate boundary of Wireless networking, the user should
add some specific set-up to ensure the security. The identification way
in build up wireless connection level provides different levels security
method , eg, open system , share key, auto , WPA, WEP-PSK, WPA2,
WPA2-PSK. See figure 3-5.
Figure 3-5 Authentication Configurations
Open system —
this selection will make network in open system mode,
and will not use any identification method. Open system and AP will
identify each other. If WEP key exists, identification is also unnecessary.
Shared Key —
This selection will make network in shared key mode. In
Shared Key identification system, you should use 4 step frames’
exchange to make sure if AP uses the same WEP key
13
WPA-PSK This selection allows to use WPA Pre-Shared key. It allows
user and AP to use WPA P
– SK /WPA2-PSK encryption way.
WPA/WPA2- The networking use IEEE 802.1x identification method. This
method will use in RADIUS˄Remote Access Dial-in User Serviceˈ
long-distance dial the user environment. RADIUS environment support
EAP, including PEAP, TLS/Smart Card, TTLS and LEAP.
Data Encryption
The encryption method includes WEPˈ Temporal Key Integrity Protocol
encryption and Advanced Encryption Standard (AES). See Figure 3-6.
Figure 3-6 Encryption configurations
Prohibit - Prohibit encryption function.
WEP -- WEP is to encrypt before data wireless transmission, and use
the same WEP wireless equipment to communicate.
TKIP -- TKIP use the sticker encryption rule than WEP to encrypt. It
also uses the WLAN arithmetic to encryption. TKIP will test the security
setting once the encryption key is confirmed.
AES –AES is a symmetrical 128 bit encryption technology. It can works
in multi-layer in networking
[ EP KEYSetting]
This selection can set-up WEP KEYSETTING. WEP KEYis a cluster of
64 bytes(5 bites) , 128 bytes (13 bits) or 256 bytes (39 bits) , 16
hexadecimal figures to key or decode data package. See Figure 3-7.
14
Figure 3-7 WEP Key setting
The KEYmode can be set-up as hexadecimal mode:
When you select W
“ PA”OR “WPA2”in identification mode, the setting
this time will be valid. If you select O
“ pen”or “Shared Key”, the setting
here will not be valid.
aVlid modes include:TLS, PEAP and TTLS. See figure 3-8.
Figure 3-8 WPA Encryption setting
15
TLS/Smart Card—
TLS( Transport Layer Security ) is used to create an
encryption channel and get the identification of the Tech service, like
SSL(Secure Sockets Layer) agreement ‘s web interface service
validation. This method uses the figure to check the identity of the end
user and service.
TTLS -- TTLS validation uses the certificates to validate the service
identity. Meanwhile, it saves the TLS security attribute. E.g., validate
each other or share WEP Key secret.
PEAP -- PEAP (Protected Extensible Authentication Protocol)
validation is another version of EAP ˄ Extensible Authentication
Protocol˅. EAP ensures the connection of the wireless end user and
service in the network operation
Advanced Setting
This interface is mainly used to set up the language, area, power
consumption, service mode and TRS /Frame figure in the user
interface. See Figure 3-9.
Power consumption setting can be set according to your working
environment, including Continuous Access mode, Maximum Powersaving mode and Power-saving mode.
16
Figure 3-9 Advanced Setting
Frame Threshold -- Frame Threshold will show that 802.11 were divided
into small parts, and deliver them to their destination. oYu can set the
up and down limitation to each package to start the division function. If
there is big conflict in the wireless networking, you can set different up
and down limitation for testing to ensure the reliability. For the common
use, you can only use default figure.
RTS Threshold -- RTS/CTS (Request to Send/Clear to send) function is
used to decrease the conflict between the wireless station to the
minimum. When RTS/CTS is started, Router will continuously send the
figures to another RTS/CTS. And you can also set different up and
down limitation to start RTS/CTS .Y
ou are suggested to use Default
figure (2347).
17
4. AP function
This wireless LAN card has two working modes:Station and Access
Point. When switched to AP mode, LAN Card will be an AP point, then it
can accept the connect request from other wireless equipment.
4.1 Switch To AP Mode
In the main window’s Mode slide down frame, click Access Point, switch
to AP mode. See Figure 4-1.
Figure 4-1 Work Mode Switch
18
4.2 AP mode main interface
Figure 4-2 AP mode Configuration Status
As figure 4-2, it shows the current network configuration information,
including Network working channel, SSID, encryption mode, delivering
signal level, all of which can be adjusted by More Setting. See Figure
4-3.
4.3 Network Advanced settings
Figure 4-3 Access Point More Settings
19
As figure 4-3, when the equipment is in Access Point Mode, the user
can set the working mode, including network mode, working signal
channel, transmission power, identification mode, encryption mode,
frame figure and RTS/CTS frame figure.
4.4 Encryption
WEP Key setting:
If you need to encrypt the network, you can select key setting mode.
The figure 4-4 shows the mode after WEP key setting. oYu can set the
password to the networking setting.
Figure 4-4 WEP Key Settings
20
5. Product Specifications
General Features
Standards
Interface
OS
User interface
Transmit distance
roaming
LED
Antenna type
IEEE 802.11g; IEEE 802.11b
USB 1.1/2.0
Windows 98/SE/ME,Windows 2000/XP, Linux, MAX OSX
Easy to use user configuration software
indoor up to 40 meters and outdoor up to 200 meters (standard
transmit distance is limited to the environments)
Support multipoint auto roaming and configuration; Support
wireless network environments auto detect.
Link status indicator
Omni-directional interior Antenna
RF and baseband Technical Features
Frequency range
Radio data rate
Modulation
2.4~2.4835GHz
11gġ54/48/36/24/18/12/9/6Mďauto adaptiveĐ;
11bġ11/5.5/2/1Mďauto adaptiveĐ
BPSK, QPSK, CCK and OFDM (BPSK/QPSK/16-QAM/
64-QAM)
Spectrum Spread
DSSS
Technology
Transmit power
16-17dBmď11gĐē18-20dBmď11bĐ
Channel
Media
Access
Protocol
Data security
13
CSMA/CA with ACK
WPA/WPA2; 64/128/152-bit WEP; TKIP/AES
Environmental and Physical
Operation Temp.
0ć - 40ć
Storage Temp.
Operation
Humidity
dimension
-40ć - 70ć
10% - 95% RH, Non-condensing
75mm x 25mm x 10mm
21
FEDERAL COMMUNICATIONS COMMISSION (FCC) STATEMENT
This equipment has been tested and found to comply with the limits for a class B digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
---Reorient or relocate the receiving antenna.
---Increase the separation between the equipment and receiver.
---Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
---Consult the dealer or an experienced radio/TV technician for help.
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions:
(1)This device may not cause harmful interference.
(2)This device must accept any interference received, including interference that may cause
undesired operation.
FCC RF RADIATION EXPOSURE STATEMENT:
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This device and its antenna must not be co-located or operating in conjunction
with any other antenna or transmitter.
IMPORTANT NOTE:
This device has been tested for compliance with FCC RF Exposure (SAR) limits in the
typical laptop computer configuration and this device can be used in desktop or laptop
computers with side mounted USB slots. This device and its antenna must not be co-located
or operated in conjunction with any other antenna or transmitter.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
XMP Toolkit                     : 3.1-701
About                           : uuid:e870e88f-18d1-4c00-9c45-c936ff0910f8
Producer                        : Acrobat Distiller 6.0 (Windows)
Creator Tool                    : Adobe Illustrator CS2
Create Date                     : 2007:06:18 11:21:19+08:00
Modify Date                     : 2007:10:11 16:37:59+08:00
Metadata Date                   : 2007:10:11 16:37:59+08:00
Thumbnail Width                 : 228
Thumbnail Height                : 256
Thumbnail Format                : JPEG
Thumbnail Image                 : (Binary data 14126 bytes, use -b option to extract)
Document ID                     : uuid:C987892EF008DC11AF038B14B2EDD1CC
Instance ID                     : uuid:aa4611b9-de39-4da5-880f-b8a3f6bbcc74
Derived From Instance ID        : uuid:b5d4992b-0160-481b-9cde-3b4a06c49454
Derived From Document ID        : uuid:3B3FF32B2808DC11ABA1A5540671AF16
Format                          : application/pdf
Title                           : WL-150G(1
Creator                         : user
Has XFA                         : No
Page Count                      : 23
Author                          : user
EXIF Metadata provided by EXIF.tools
FCC ID Filing: T5QUSBWL170G

Navigation menu