ZyXEL Communications B-120 802.11b Mobile Module User Manual ZyAIR Wireless Utility OEM

ZyXEL Communications Corporation 802.11b Mobile Module ZyAIR Wireless Utility OEM

Revised Installation Guide

Download: ZyXEL Communications B-120 802.11b Mobile Module User Manual ZyAIR Wireless Utility OEM
Mirror Download [FCC.gov]ZyXEL Communications B-120 802.11b Mobile Module User Manual ZyAIR Wireless Utility OEM
Document ID368141
Application IDc1XD5DskkyLcygja0uEY8w==
Document DescriptionRevised Installation Guide
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize107.56kB (1344459 bits)
Date Submitted2003-10-24 00:00:00
Date Available2003-10-24 00:00:00
Creation Date2003-10-21 13:23:39
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2003-10-22 09:32:48
Document TitleZyAIR Wireless Utility OEM
Document CreatorAcrobat PDFMaker 5.0 for Word
Document Author: Cindy Yang

Wireless LAN Utility
User's Guide
Version 2.0
September 2003
Note to OEMs: ZyXEL provides this document as a sample User’s Guide. This User’s Guide may require
customization to reflect your own company name, product name and/or document style.
Possible words you may want to change: OEM, WLAN Adapter, WLAN Utility
Wireless LAN Utility
Copyright
Copyright ©2003 by the Original Equipment Manufacturer (OEM)
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a
retrieval system, translated into any language, or transmitted in any form or by any means, electronic,
mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written
permission of the OEM.
Published by the OEM. All rights reserved.
Disclaimer
The OEM does not assume any liability arising out of the application or use of any products, or software
described herein. Neither does it convey any license under its patent rights nor the patents' rights of others.
The OEM further reserves the right to make changes in any products described herein without notice. This
publication is subject to change without notice.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only and may be properties
of their respective owners.
ii
Copyright
Wireless LAN Utility
Limited Warranty
Limited Warranty
iii
Wireless LAN Utility
Information for Canadian Users
The Industry Canada label identifies certified equipment. This certification means that the equipment meets
certain telecommunications network protective operation and safety requirements. The Industry Canada
does not guarantee that the equipment will operate to a user's satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the facilities
of the local telecommunications company. The equipment must also be installed using an acceptable
method of connection. In some cases, the company's inside wiring associated with a single line individual
service may be extended by means of a certified connector assembly. The customer should be aware that
compliance with the above conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated
by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions,
may give the telecommunications company cause to request the user to disconnect the equipment.
For their own protection, users should ensure that the electrical ground connections of the power utility,
telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution
may be particularly important in rural areas.
Caution
Users should not attempt to make such connections themselves, but should contact the appropriate
electrical inspection authority, or electrician, as appropriate.
Note
This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus
set out in the radio interference regulations of Industry.
iv
Information for Canadian Users
Wireless LAN Utility
Federal Communications Commission
(FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired
operations.
This equipment has been tested and found to comply with the limits for a CLASS B digital device pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency
energy, and if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of
the following measures:
•
Reorient or relocate the receiving antenna.
•
Increase the separation between the equipment and the receiver.
•
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio/TV technician for help.
Caution
This device is intended only for OEM integrators under the following conditions:
1. This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits,
human proximity to the antenna (installed to end product) shall not be less than 20 cm (8 inches)
during normal operation.
2. This Transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter
As long as the 2 conditions above are met, further transmitter testing will not be required. However, the
OEM integrator is still responsible for testing their end-product for any additional compliance requirements
required with this module installed (for example, digital device emission, PC peripheral requirements, etc.).
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate the equipment.
Additional Information to OEM Integrators
FCC Statement
Wireless LAN Utility
The end user should NOT be provided any instructions on how to remove or install the device.
End Product Labeling
This transmitter module is authorized only for use in devices where the antenna may be installed such that
20 cm may be maintained between the antenna and users (for example access points, routers, wireless
ASDL modems, and similar equipment). The final end product must be labeled in a visible area with the
following: Contains TX FCC ID: I88B-120
IMPORTANT NOTE
1. In the event that these conditions can not be met (for example certain laptop configurations or colocation with another transmitter), then the FCC authorization is no longer considered valid and the
FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be
responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC
authorization.
2. To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must
be installed to provide a separation distance of at least 20 cm from all persons and must not be colocated or operating in conjunction with any other antenna or transmitter."
Certifications
Refer to the product page at OEM web site.
vi
FCC Statement
Wireless LAN Utility
Customer Support
When contacting your Customer Support Representative, please have the following information ready:
Product model and serial number.
Warranty Information.
Date you received your product.
Brief description of the problem and the steps you took to solve it.
METHOD
E-MAIL
SUPPORT/SALES
TELEPHONE/FAX
WEB SITE/ FTP SITE
REGULAR MAIL
LOCATION
Customer Support
vii
Wireless LAN Utility
Table of Contents
Copyright .......................................................................................................................................................ii
Limited Warranty ........................................................................................................................................iii
Information for Canadian Users.................................................................................................................iv
Federal Communications Commission (FCC) Interference Statement....................................................v
Customer Support.......................................................................................................................................vii
List of Figures...............................................................................................................................................xi
List of Tables ................................................................................................................................................xi
Preface..........................................................................................................................................................xii
Chapter 1 Wireless Network Basics .........................................................................................................1-1
1.1
Introduction..................................................................................................................................1-1
1.2
Benefits of a Wireless LAN .........................................................................................................1-1
1.3
Applications .................................................................................................................................1-1
1.3.1
Ad-hoc..................................................................................................................................1-1
1.3.2
Infrastructure ........................................................................................................................1-2
Chapter 2 Disable Windows XP Configuration Tool..............................................................................2-1
Chapter 3 Using the Wireless LAN Utility...............................................................................................3-1
3.1
Accessing the WLAN Utility .......................................................................................................3-1
3.2
Viewing Current Configuration ...................................................................................................3-1
3.2.1
Common Screen Command Buttons ....................................................................................3-3
3.3
The About Screen.........................................................................................................................3-3
3.4
Wireless LAN Parameters............................................................................................................3-5
3.4.1
SSID .....................................................................................................................................3-5
3.4.2
Channel ................................................................................................................................3-5
3.4.3
Tx Rate.................................................................................................................................3-5
3.5
Wireless Network Type................................................................................................................3-5
3.5.1
Ad-Hoc (IBSS).....................................................................................................................3-5
3.5.2
Infrastructure ........................................................................................................................3-6
3.6
Roaming .......................................................................................................................................3-7
3.7
The Site Survey Screen ................................................................................................................3-8
3.7.1
Connecting to a Network....................................................................................................3-10
3.8
Configuring the Wireless Parameters.........................................................................................3-11
3.9
Network Configuration Profile Setting ......................................................................................3-12
3.9.1
Resetting to Factory Default Values ..................................................................................3-12
3.9.2
Saving the Current Setting to a Profile...............................................................................3-13
3.9.3
Using a Pre-configured Profile...........................................................................................3-13
3.9.4
Deleting a Profile ...............................................................................................................3-13
Chapter 4 Wireless LAN Security ............................................................................................................4-1
4.1
Introduction..................................................................................................................................4-1
4.2
Data Encryption with WEP ..........................................................................................................4-1
Table of Contents
ix
Wireless LAN Utility
4.2.1
Authentication Mode ...........................................................................................................4-1
4.2.2
Configuring the WEP Encryption ........................................................................................4-1
Chapter 5 Advanced Configuration .........................................................................................................5-1
5.1
Overview......................................................................................................................................5-1
5.1.1
Threshold Control ................................................................................................................5-1
5.1.2
Authentication Mode ...........................................................................................................5-2
5.1.3
Preamble Type .....................................................................................................................5-2
5.2
The Advanced Screen ..................................................................................................................5-3
Chapter 6 Removing and Upgrading the WLAN Utility........................................................................6-1
6.1
Removing the WLAN Utility.......................................................................................................6-1
6.2
Upgrading the WLAN Utility ......................................................................................................6-1
Chapter 7 Troubleshooting .......................................................................................................................7-1
7.1
Problems Starting the WLAN Utility Program............................................................................7-1
7.2
Problems Communicating With Other Computers ......................................................................7-2
7.3
Problem with the Link Status.......................................................................................................7-2
Index ............................................................................................................................................................. A
Table of Contents
Wireless LAN Utility
List of Figures
Figure 1-1 Ad-hoc Application Example .....................................................................................................1-2
Figure 1-2 Infrastructure Application Example............................................................................................1-2
Figure 2-1 Windows XP: System Tray Icon.................................................................................................2-1
Figure 2-2 Windows XP: Wireless Network Connection Status ..................................................................2-2
Figure 2-3 Windows XP: Connect to Wireless Network..............................................................................2-2
Figure 2-4 Windows XP: Wireless Network Connection Properties............................................................2-3
Figure 3-1 WLAN Utility System Tray Icon................................................................................................3-1
Figure 3-2 WLAN Utility: WLAN Status ....................................................................................................3-2
Figure 3-3 WLAN Utility: About.................................................................................................................3-4
Figure 3-4 Ad-hoc Network Example ..........................................................................................................3-6
Figure 3-5 BSS Example..............................................................................................................................3-6
Figure 3-6 Infrastructure Network Example ................................................................................................3-7
Figure 3-7 Roaming Example ......................................................................................................................3-8
Figure 3-8 WLAN Utility: Site Survey ........................................................................................................3-9
Figure 3-9 Site Survey Warning.................................................................................................................3-10
Figure 3-10 WLAN Utility: Network Configuration .................................................................................3-11
Figure 4-1 WLAN Utility: Security .............................................................................................................4-2
Figure 5-1 RTS Threshold............................................................................................................................5-1
Figure 5-2 WLAN Utility: Advanced...........................................................................................................5-3
List of Tables
Table 3-1 System Tray Icon Description......................................................................................................3-1
Table 3-2 WLAN Utility: WLAN Status......................................................................................................3-2
Table 3-3 Common Screen Command Buttons ............................................................................................3-3
Table 3-4 WLAN Utility: About ..................................................................................................................3-4
Table 3-5 WLAN Utility: Site Survey..........................................................................................................3-9
Table 3-6 Color Indicator for Link Quality/Link Strength .........................................................................3-10
Table 3-7 WLAN Utility: Network Configuration.....................................................................................3-12
Table 4-1 WLAN Utility: Security...............................................................................................................4-2
Table 5-1 WLAN Utility: Advanced ............................................................................................................5-4
Table 7-1 Troubleshooting Starting WLAN Utility Program .......................................................................7-1
Table 7-2 Troubleshooting Communication Problems.................................................................................7-2
Table 7-3 Troubleshooting Link Quality ......................................................................................................7-2
List of Figures/Tables
xi
Wireless LAN Utility
Preface
Congratulations on the purchase of your new Wireless LAN Adapter!
About This User's Guide
A practical and comprehensive tool, this guide provides information about the Wireless LAN Utility
operation.
This guide is for wireless devices that uses the Wireless LAN Utility program, thus the model name shown
in the screens may vary from what you actually purchased.
Familiarize yourself with the Syntax Conventions listed for better and faster understanding.
Related Documentation
Support Disk
Refer to the included CD for support documents and device drivers.
Quick Installation Guide
Our Quick Installation Guide is designed to help you get your Wireless LAN Adapter up and
running right away. It contains a detailed easy-to-follow connection diagram and information on
installing your Wireless LAN Adapter.
Glossary and Web Site
Please refer to OEM web site for an online glossary of networking terms and additional support
documentation.
Syntax Conventions
xii
•
“Type” or “Enter” means for you to type one or more characters. "Select" or "Choose" means for
you to use one of the predefined choices.
•
Window and command choices are in Bold Times New Roman font. Predefined field choices are
in Bold Arial font.
•
The Wireless LAN Adapter is referred to as the WLAN Adapter or, simply, as the Adapter in this
guide.
•
The Wireless LAN Utility may be referred to as the WLAN Utility in this guide.
Preface
Wireless LAN Utility
Chapter 1
Wireless Network Basics
This chapter gives you an overview of what a wireless network is, its advantages and
applications.
1.1
Introduction
A wireless LAN (WLAN) provides a flexible data communication system that you can use to access
various services (navigating the Internet, email, printer services, etc.) on the wired network without
additional expensive network cabling infrastructure. In effect, a wireless LAN environment provides you
the freedom to stay connected to the wired network while moving in the coverage area.
1.2
Benefits of a Wireless LAN
Access to network services in areas otherwise hard or expensive to wire, such as historical
buildings, buildings with asbestos materials and classrooms.
Doctors and nurses can access a complete patient’s profile on a handheld or notebook computer
upon entering a patient’s room.
It allows flexible workgroups a lower total cost of ownership for networks that are frequently
reconfigured.
Conference room users can access the network as they move from meeting to meeting- accessing
up-to-date information that facilitates the ability to communicate decisions “on the fly”.
It provides campus-wide networking coverage, allowing enterprises the roaming capability to set
up easy-to-use wireless networks that transparently covers an entire campus.
1.3
Applications
Unlike wired networks, you can set up wireless networks in two different modes: infrastructure and ad-hoc.
Set up your wireless network depending on your network needs. The following sections describe each
network mode.
1.3.1 Ad-hoc
An ad-hoc network consists of two or more computers communicating with one another through the
wireless network. No access points (APs) or existing wired networks are needed. An access point acts as a
bridge between the wireless and wired networks
Wireless Network Basics
1-1
Wireless LAN Utility
Figure 1-1 Ad-hoc Application Example
1.3.2 Infrastructure
When wireless clients wish to access and share resources on the wired network, they should use
infrastructure mode. Wireless clients may move from one coverage area to another seamlessly without
network interruption. This is called roaming.
The figure below depicts an infrastructure network example
Figure 1-2 Infrastructure Application Example
1-2
Wireless Network Basics
Wireless LAN Utility
Chapter 2
Disable Windows XP Configuration Tool
Windows XP includes a basic configuration tool for wireless devices.
DO NOT use the Windows XP configuration tool together with the WLAN Utility. It
is recommended you use the WLAN Utility to configure the WLAN Adapter.
Follow the steps below to disable the configuration tool in Windows XP after you install the WLAN
Utility.
Step 1.
Double-click on the network icon for wireless connection in the system tray. Proceed to Step 2
if the icon is not present. Otherwise go to Step 5.
Figure 2-1 Windows XP: System Tray Icon
Step 2.
If the icon for the wireless network connection is not in the system tray, click start, Control
Panel and double-click on Network Connections.
Disable Windows XP
2-1
Wireless LAN Utility
Step 3.
Double-click on the icon for wireless network connection to display a status window as shown
next.
Figure 2-2 Windows XP: Wireless Network Connection Status
Step 4.
Click Properties and click the Wireless Networks tab. Then go to Step 6.
Step 5.
When a Connect to Wireless Network window displays, click Advanced….
Figure 2-3 Windows XP: Connect to Wireless Network
2-2
Disable Windows XP
Wireless LAN Utility
Step 6.
In the Wireless Network Connection Properties window, make sure the Use Windows to
configure my wireless network settings check box is not selected. Click OK.
Figure 2-4 Windows XP: Wireless Network Connection Properties
Disable Windows XP
2-3
Wireless LAN Utility
Chapter 3
Using the Wireless LAN Utility
This chapter shows you basic wireless LAN configuration using the Wireless LAN Utility.
Install the WLAN Adapter before you proceed. Refer to the Quick Installation Guide.
For Windows XP users: disable the Windows XP wireless configuration tool first
before you proceed. Refer to Chapter 2.
Screen shots for Windows XP are shown unless otherwise specified.
3.1
Accessing the WLAN Utility
After the Wireless LAN Utility is installed, an icon appears in the system tray.
If the WLAN Utility system tray icon displays, the WLAN Adapter is installed
properly.
Figure 3-1 WLAN Utility System Tray Icon
The color of the WLAN Utility system tray icon indicates the status of the WLAN Adapter. Refer to the
following table for details.
Table 3-1 System Tray Icon Description
COLOR
DESCRIPTION
Yellow
The WLAN Adapter is working properly but is not connected to any AP or wireless station.
Green
The WLAN Adapter is connected to a wireless network.
Double click on the Wireless LAN Utility icon in the system tray to open the WLAN Utility.
3.2
Viewing Current Configuration
When the WLAN Utility starts, the WLAN Status screen displays, showing the current configuration of
your WLAN Adapter.
Using the Wireless LAN Utility
3-1
Wireless LAN Utility
Figure 3-2 WLAN Utility: WLAN Status
When the WLAN Adapter is turned on for the first time, the WLAN Adapter
automatically scans and connects to a network with the best link quality and link
strength.
Once you connect to a wireless network, the WLAN Adapter will connect to that
network each time the WLAN Adapter is turned on.
The following table describes the labels in this screen.
Table 3-2 WLAN Utility: WLAN Status
LABEL
3-2
DESCRIPTION
Using the Wireless LAN Utility
Wireless LAN Utility
Table 3-2 WLAN Utility: WLAN Status
LABEL
DESCRIPTION
Device
Select an available wireless card from the drop-down list menu if you have more than
one wireless cards in your computer.
Re-Connect
Click Re-Connect to re-establish connection to the wireless device whose SSID is
shown in the Current Service Set Identifier field.
Current Channel
This field displays the radio channel the WLAN Adapter is currently using.
Current Transfer
Rate
This field displays the current transmission rate of the WLAN Adapter in megabits per
second.
Current Service
Set Identifier
This field displays the name of the wireless device to which the WLAN Adapter is
associated.
Tx/Rx Frame
Transmitted
Received
This field displays the number of data frames transmitted.
This field displays the number of data frames received.
Link Quality
The status bar and the percentage number show the quality of the signal.
Link Strength
The status bar and the percentage number or a number in dBm show the strength of the
signal.
Percent/dBm
Click this button to display either percentages in the Link Quality and Link Strength
fields or a number in dBm in the Link Strength field.
3.2.1 Common Screen Command Buttons
The following table describes common command buttons on all WLAN Utility screens.
Table 3-3 Common Screen Command Buttons
BUTTON
DESCRIPTION
OK
Click OK to save all changes and close the WLAN Utility.
Cancel
Click Cancel to discard changes and close the WLAN Utility.
Help
Click Help to display the on-line help window.
3.3
The About Screen
The About screen displays related version numbers of the WLAN Adapter. You may click Help to view
related help topics.
Using the Wireless LAN Utility
3-3
Wireless LAN Utility
Figure 3-3 WLAN Utility: About
The following table describes the read-only labels in this screen.
Table 3-4 WLAN Utility: About
FIELD
DESCRIPTION
Driver Version
This field displays the version number of the WLAN Adapter’s driver.
Utility Version
This field displays the version number of the WLAN Utility.
Firmware
Version
This field displays the version of the firmware on which the driver and the utility are
based.
3-4
Using the Wireless LAN Utility
Wireless LAN Utility
3.4
Wireless LAN Parameters
This section describes each wireless LAN parameter.
3.4.1 SSID
The SSID (Service Set IDentity) is a unique name shared among all wireless devices in a wireless network.
Wireless devices must have the same SSID to communicate with each other.
3.4.2 Channel
A range of radio frequencies used by IEEE 802.11b wireless devices is called a channel.
3.4.3 Tx Rate
The WLAN Adapter provides various transmission (data) rate options for you to select. Options include
Fully Auto, 1 M bit/sec, 2 M bit/sec, 5.5M bit/sec and 11M bit/sec. In most networking scenarios, the
factory default Fully Auto setting proves the most efficient. This setting allows your WLAN Adapter to
operate at the maximum transmission (data) rate. When the communication quality drops below a certain
level, the WLAN Adapter automatically switches to a lower transmission (data) rate. Transmission at lower
data speeds is usually more reliable. However, when the communication quality improves again, the
WLAN Adapter gradually increases the transmission (data) rate again until it reaches the highest available
transmission rate.
If you wish to balance speed versus reliability, you can select any of the above options 11M bit/sec or
5.5M bit/sec is used in a networking environment where you are certain that all wireless devices can
communicate at the highest transmission (data) rate. 1M bit/sec or 2M bit/sec are used often in networking
environments where the range of the wireless connection is more important than speed.
3.5
Wireless Network Type
Wireless LAN works in either of the two modes: ad-hoc and infrastructure.
To connect to a wired network within a coverage area using Access Points (APs), set the WLAN Adapter’s
operation mode to Infrastructure. An AP acts as a bridge between the wireless stations and the wired
network. In case you do not wish to connect to a wired network, but prefer to set up a small independent
wireless workgroup without an AP, use the Ad-hoc (IBSS) (Independent Basic Service Set) mode.
3.5.1 Ad-Hoc (IBSS)
Ad-hoc mode does not required an AP or a wired network. Two or more wireless clients communicate
directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service
Set (IBSS).
Using the Wireless LAN Utility
3-5
Wireless LAN Utility
Figure 3-4 Ad-hoc Network Example
To set up an ad-hoc network, configure all wireless clients in ad-hoc network type
and use the same SSID and channel.
3.5.2
Infrastructure
When a number of wireless clients are connected using a single AP, you have a Basic Service Set (BSS).
Figure 3-5 BSS Example
A series of overlapping BSS and a network medium, such as an Ethernet forms an Extended Service Set
(ESS) or infrastructure network. All communication is done through the AP, which relays data packets to
other wireless clients or devices connected to the wired network. Wireless clients can then access resource,
such as the printer, on the wired network.
3-6
Using the Wireless LAN Utility
Wireless LAN Utility
Figure 3-6 Infrastructure Network Example
3.6
Roaming
In an infrastructure network, wireless clients are able to switch from one AP to another as they move
between the coverage areas. During this period, the wireless client maintains uninterrupted connection to
the network. This is roaming. As the wireless client moves from place to place, it is responsible for
choosing the most appropriate AP depending on the signal strength, network utilization or other factors.
The following figure depicts a roaming example. When Wireless Client B moves to position X, the
WLAN Adapter in Wireless Client B automatically switches the channel to the one used by Access Point
2 in order to stay connected to the network.
Using the Wireless LAN Utility
3-7
Wireless LAN Utility
Figure 3-7 Roaming Example
3.7
The Site Survey Screen
Use the Site Survey screen to scan for and connect to a wireless network automatically.
3-8
Using the Wireless LAN Utility
Wireless LAN Utility
Figure 3-8 WLAN Utility: Site Survey
The following table describes the fields in the Available Network table.
Table 3-5 WLAN Utility: Site Survey
FIELD
DESCRIPTION
SSID
This field displays the SSID (or name) of each wireless network.
BSSID
This field displays the MAC address of the wireless network.
Channel
This field displays the channel number used by each wireless network.
Signal
This field displays the signal strength of each wireless network.
Using the Wireless LAN Utility
3-9
Wireless LAN Utility
Table 3-5 WLAN Utility: Site Survey
FIELD
DESCRIPTION
WEP
This field shows whether the WEP data encryption is activated (Enable) or inactive
(Disable).
Search
Click Search to scan for available wireless device within transmission range.
Connect
Click Connect to associate to the selected wireless device.
The following table describes the colors used for the entries in the Site Survey screen.
Table 3-6 Color Indicator for Link Quality/Link Strength
COLOR
Green
DESCRIPTION
Excellent link quality or link strength.
Blue
Good link quality or link strength.
Red
Poor link quality or link strength.
3.7.1 Connecting to a Network
Follow the steps below to connect to a network.
Step 1. Click Rescan to scan for all available wireless networks within range.
Step 2. To join a network, either click an entry in the Available Network table to select a wireless
network and then click Connect or double-click an entry.
Step 3. If the WEP Status field is Enable for the selected wireless network, the following screen
displays.
Figure 3-9 Site Survey Warning
Step 4.
3-10
Click OK to display the Security screen and refer to Section 4.2 to set up WEP keys. Otherwise
click Cancel and connect to another wireless network without WEP encryption.
Using the Wireless LAN Utility
Wireless LAN Utility
Step 5.
3.8
To verify that you have successfully connected to the selected network, check the network
information in the Link Info screen.
Configuring the Wireless Parameters
Click Network Configuration in the WLAN Utility program to display the Network Configuration
screen as shown next.
Figure 3-10 WLAN Utility: Network Configuration
Follow the instructions in the table below to configure the wireless LAN related parameters. Refer to the
next section for Profile field descriptions.
Using the Wireless LAN Utility
3-11
Wireless LAN Utility
Table 3-7 WLAN Utility: Network Configuration
FIELD
DESCRIPTION
Configuration
Operating Mode
Select Infrastructure(BSS) or Ad-Hoc(IBSS) from the drop-down list box.
Select Infrastructure(BSS) to associate to an AP.
Select Ad-Hoc(IBSS) to associate to a peer ad-hoc computer.
Refer to the Wireless Network Type section for more information.
Service Set
Identifier (SSID)
Enter the SSID of the AP or the peer ad-hoc computer to which you want to associate in
this field. To associate to an ad-hoc network, you must enter the same SSID as the peer
ad-hoc computer.
Enter Any to associate to or roam between any infrastructure wireless networks. This is
the default setting.
Transfer Rate
Select a transmission speed from the drop-down list box. Choose from Fully Auto
(default), 1M bit/sec, 2M bit/sec, 5.5M bit/sec and 11M bit/sec.
Channel
Select the channel number from the drop-down list box. To associate to an ad-hoc
network, you must use the same channel as the peer ad-hoc computer.
Power Saving
Mode
Select Enable from the drop-down list menu to save power (especially for laptop
computers). This forces the WLAN Adapter to go to sleep mode when it is not
transmitting data.
When you select Disable, the WLAN Adapter will never go to sleep mode.
Restore Default
Click Restore Default to reset all fields back to factory default values.
Undo Changes
Click Undo Changes to start configuring the fields again.
Apply Changes
Click Apply Changes to save the changes back to WLAN Adapter.
3.9
Network Configuration Profile Setting
The Profile in the Configuration screen allows you to save the wireless network settings in the
Configuration screen, use one of the pre-configured network profiles or reset the settings in the
Configuration screen to the factory default values.
3.9.1 Resetting to Factory Default Values
To reset the fields in the Configuration screen back to factory default values select Default from the dropdown list menu and click Activate.
3-12
Using the Wireless LAN Utility
Wireless LAN Utility
3.9.2 Saving the Current Setting to a Profile
To save the current settings in the Configuration screen to a new profile enter a descriptive name in the
field provided and click Create.
3.9.3 Using a Pre-configured Profile
To use a previously saved network profile select the profile file name from the drop-down list box and click
Activate.
3.9.4 Deleting a Profile
To delete an existing wireless network configuration select a profile from the drop-down list box and click
Remove.
Using the Wireless LAN Utility
3-13
Wireless LAN Utility
Chapter 4
Wireless LAN Security
This chapter shows you how to set up the wireless LAN security available in the WLAN Adapter.
4.1
Introduction
Wireless LAN security is vital to your network to protect wireless communication between wireless clients
and the wired network.
Configure the wireless LAN security using the Security screen. If you do not enable any wireless security
on your WLAN Adapter, communication between the WLAN Adapter and the wired network is accessible
to any wireless networking device that is in the coverage area.
4.2
Data Encryption with WEP
WEP (Wired Equivalent Privacy) encryption scrambles the data transmitted between the WLAN Adapter
and the AP or other wireless stations to keep network communications private. It encrypts unicast and
multicast communications in a network. Both the wireless clients and the access points must use the same
WEP key for data encryption and decryption.
Your WLAN Adapter allows you to configure up to four 64-bit or 128-bit WEP keys but only one key can
be enabled at any one time.
4.2.1 Authentication Mode
The IEEE 802.11b standard describes a simple authentication method between the wireless clients and AP.
Three authentication modes are defined: Auto, Open and Shared.
Open authentication mode is implemented for ease-of-use and when security is not an issue. The wireless
station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen
to any data transmitted plaintext.
Shared authentication mode involves a shared secret key to authenticate the wireless station to the AP. This
requires you to enable a security feature and specify a shared secret key (usually the WEP encryption and
WEP key) on both the wireless station and the AP.
Auto authentication mode allows the WLAN Adapter to switch between the open and shared key
authentication modes automatically. Use the auto mode if you do not know the authentication mode of the
other wireless clients.
4.2.2 Configuring the WEP Encryption
Click the Security tab to display the Security screen as shown below.
Wireless LAN Security
4-1
Wireless LAN Utility
Figure 4-1 WLAN Utility: Security
Follow the instructions in the table to configure the WEP encryptions.
Table 4-1 WLAN Utility: Security
FIELD
DESCRIPTION
Encryption (WEP)
Select either 64 Bits or 128 Bits from the drop-down list box to activate WEP
encryption and then fill in the related fields.
Select Disable to deactivate the WEP encryption.
WEP Key Entry
The WEP keys are used to encrypt data before it is transmitted. The values for the keys must be set up
exactly the same on the APs or other peer ad-hoc wireless computers as they are on the WLAN Adapter.
Key Type
4-2
Select either the HEX or ASCII WEP key type.
Wireless LAN Security
Wireless LAN Utility
Table 4-1 WLAN Utility: Security
FIELD
Key 1 … 4
DESCRIPTION
Enter the WEP keys in the fields provided.
If you select 64 Bits in the Encryption field.
Enter either 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9”
(e.g. 11AA22BB33) for HEX key type
or
Enter 5 printable ASCII characters (case sensitive) ranging from “a-z”,
“A-Z” and “0-9” (e.g. MyKey) for ASCII key type.
If you select 128 Bits in the Encryption field,
Enter either 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9”
(for example, 00112233445566778899AABBCC) for HEX key type
or
Enter 13 printable ASCII characters (case sensitive) ranging from “az”, “A-Z” and “0-9” (for example, MyKey12345678) for ASCII key type.
You must configure all four WEP keys the first time you
use the WLAN Adapter.
ASCII WEP keys are case sensitive.
Restore Default
Click Restore Default to reset all fields back to factory default values.
Undo Changes
Click Undo Changes to start configuring the fields again.
Apply Changes
Click Apply Changes to save the changes back to WLAN Adapter.
Wireless LAN Security
4-3
Wireless LAN Utility
Chapter 5
Advanced Configuration
This chapter shows you how to configure advanced features of the WLAN Adapter.
5.1
Overview
The following sections introduce the advanced features you can configure.
5.1.1 Threshold Control
Fragmentation Threshold
A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be
sent in the wireless network before the WLAN Adapter will fragment the packet into smaller data frames.
A large Fragmentation Threshold is recommended for networks not prone to interference while you
should set a smaller threshold for busy networks or networks that are prone to interference.
If the Fragmentation Threshold value is smaller than the RTS/CTS Threshold value (see previously)
you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames
will be fragmented before they reach RTS/CTS Threshold size.
RTS/CTS Threshold
A hidden node occurs when two stations are within range of the same access point, but are not within range
of each other. The following figure illustrates a hidden node. Both stations are within range of the access
point (AP) or wireless gateway, but out-of-range of each other, so they cannot “hear” each other, that is
they do not know if the channel is currently being used. Therefore, they are considered hidden from each
other.
Figure 5-1 RTS Threshold
Advanced Configuration
5-1
Wireless LAN Utility
When station A sends data to the AP, it might not know that the station B is already using the channel. If
these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP
at the same time, resulting in a loss of messages for both stations.
RTS/CTS Threshold is designed to prevent collisions due to hidden nodes. An RTS/CTS Threshold
defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send)
handshake is invoked.
When a data frame exceeds the RTS/CTS Threshold value you set (between 0 to 2432 bytes), the station
that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for
permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within
its range to notify them to defer their transmission. It also reserves and confirms with the requesting station
the time frame for the requested transmission.
Stations can send frames smaller than the specified RTS/CTS Threshold directly to the AP without the
RTS (Request To Send)/CTS (Clear to Send) handshake.
You should only configure RTS/CTS Threshold if the possibility of hidden nodes exists on your network
and the “cost” of resending large frames is more than the extra network overhead involved in the RTS
(Request To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS Threshold value is greater than the Fragmentation Threshold value (see next), then the
RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented
before they reach RTS/CTS Threshold size.
Enabling the RTS Threshold causes redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
5.1.2 Authentication Mode
The IEEE 802.11b standard describes a simple authentication method between the wireless clients and AP.
Three authentication modes are defined: Auto, Open and Shared.
Open authentication mode is implemented for ease-of-use and when security is not an issue. The wireless
station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen
to any data transmitted plaintext.
Shared authentication mode involves a shared secret key to authenticate the wireless station to the AP. This
requires you to enable a security feature and specify a shared secret key (usually the WEP encryption and
WEP key) on both the wireless station and the AP.
Auto authentication mode allows the WLAN Adapter to switch between the open and shared key
authentication modes automatically. Use the auto mode if you do not know the authentication mode of the
other wireless clients.
5.1.3 Preamble Type
A preamble is a signal used to synchronize the transmission timing in your wireless network. There are two
preamble modes: Long and Short.
5-2
Advanced Configuration
Wireless LAN Utility
Long preamble mode allows more processing time for each transmitted data packet. Short preamble mode
allows less processing time for the transmitted data packets.
Using short preamble mode may minimize overhead and maximize network throughput. However, short
preamble mode is supported by IEEE 802.11b compliant wireless devices, thus wireless stations using short
preamble mode cannot communicate with wireless stations using the original IEEE 802.11 standard.
5.2
The Advanced Screen
To set the advanced features on the WLAN Adapter, click the Advanced tab.
Figure 5-2 WLAN Utility: Advanced
The following table describes the fields in this screen.
Advanced Configuration
5-3
Wireless LAN Utility
Table 5-1 WLAN Utility: Advanced
FIELD
DESCRIPTION
Transmit Threshold Control
Fragmentation
Threshold
RTS/CTS Threshold
The threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent.
Move the slider to set the fragmentation threshold.
Data with its frame size larger than this value will perform the RTS/CTS handshake.
Setting this attribute to be larger than the maximum MSDU (MAC service data unit)
size turns off the RTS/CTS handshake. Setting this attribute to zero turns on the
RTS/CTS handshake.
Move the slider to set the RTS/CTS threshold.
Security
Shared Mode
(Authenticate Access
Point)
Select this checkbox to use a shared key to authenticate the access point.
Refer to Section 5.1.2 for more information.
Preamble Type
Select a preamble type from the drop-down list menu. Choices are Long Preamble,
Short Preamble and Auto.
The default setting is Auto.
Refer to Section 5.1.3 for more information.
Restore Default
Click Restore Default to reset all fields back to factory default values.
Undo Changes
Click Undo Changes to start configuring the fields again.
Apply Changes
Click Apply Changes to save the changes back to WLAN Adapter.
5-4
Advanced Configuration
Wireless LAN Utility
Chapter 6
Removing and Upgrading the WLAN
Utility
This chapter describes how to uninstall or upgrade the WLAN Utility.
6.1
Removing the WLAN Utility
Follow the steps below to remove (or uninstall) the WLAN Utility from your computer.
Step 1. Click Start, Programs, IEEE 802.11bWireless LAN Utility, Uninstall IEEE 802.11b
Package.
Step 2. When prompted, click Yes to remove the driver and the utility software.
Step 3.
6.2
When prompted to restart your computer, click Yes and then click Finish.
Upgrading the WLAN Utility
The WLAN Utility continually improves and changes with new driver upgrades. Visit OEM web site to
find the most recent upgrades and information.
Before you uninstall the driver, save the current network configuration.
To perform the upgrade, follow the steps below.
Step 1. Download the latest version of the driver save the file on your computer.
Step 2. Follow the steps in the Removing the WLAN Utility section to remove the current WLAN
Utility from your computer.
Step 3. Restart the computer when prompted.
Step 4. After restarting, refer to the procedure in the Quick Installation Guide to install the new utility
software.
Step 5. Check the version numbers in the About screen to make sure the new driver is installed
properly.
Removing and Upgrading the WLAN Utility
6-1
Wireless LAN Utility
Chapter 7
Troubleshooting
This chapter covers potential problems and the possible remedies. After each problem description, some
instructions are provided to help you to diagnose and to solve the problem.
7.1
Problems Starting the WLAN Utility Program
Table 7-1 Troubleshooting Starting WLAN Utility Program
Cannot start the WLAN
Utility.
Make sure the WLAN Adapter is properly inserted and the LED(s) is on. Refer
to the Quick Installation Guide for the LED descriptions.
Use the Device Manager to check for possible hardware conflicts.
Click Start, Settings, Control Panel, System, Hardware and Device
Manager. Verify the status of the WLAN Adapter under Network Adapter.
(Steps may vary depending on the version of Windows).
Install the WLAN Adapter in another computer.
If the error persists, you may have a hardware problem. In this case, you
should contact your local vendor.
Troubleshooting
7-1
Wireless LAN Utility
7.2
Problems Communicating With Other Computers
Table 7-2 Troubleshooting Communication Problems
PROBLEM
CORRECTIVE ACTION
The WLAN Adapter
computer cannot
communicate with the other
computer.
A.
B.
7.3
Infrastructure
Ad-Hoc (IBSS)
Make sure that the AP and the associated computers are turned on and
working properly.
Make sure the WLAN Adapter computer and the associated AP use the
same SSID.
Make sure that the computer and the AP share the same security option
and key.
Verify the settings in the Security screen.
Verify that the peer computer(s) is turned on.
Make sure the WLAN Adapter computer and the peer computer(s) are
using the same SS ID and channel.
Make sure that the computer and the peer computer(s) share the same
security option and key.
Change the wireless clients to use another radio channel if interference is
high.
Problem with the Link Status
Table 7-3 Troubleshooting Link Quality
PROBLEM
CORRECTIVE ACTION
The Link Quality bar
indicator is red all the time.
Move your computer closer to the AP or the peer computer(s) within the
transmission range.
There is too much radio interference (for example microwave) around
your wireless network. Relocate or reduce the radio interference.
The Link Strength bar
indicator is red all the time.
Move your computer closer to the AP or peer computer(s) within the
transmission range.
There is too much radio interference (for example microwave) around
your wireless network. Relocate or reduce the radio interference.
7-2
Troubleshooting
Wireless LAN Utility
Table 7-3 Troubleshooting Link Quality
PROBLEM
The Survey screen displays
all entries in red.
Troubleshooting
CORRECTIVE ACTION
Move your computer closer to the AP or peer computer(s) within the
transmission range.
There is too much radio interference (for example microwave) around
your wireless network. Relocate or reduce the radio interference.
7-3
Wireless LAN Utility
Index
Access Point....................................................1-1
Accessing the WLAN Utility ..........................3-1
Additional Information to OEM Integrators ..... vi
Advanced Configuration .................................5-1
AP ............................................. See Access Point
Applications
Ad-hoc ........................................................1-1
Infrastructure...............................................1-2
Authentication Mode............................... 4-1, 5-2
Auto .................................................... 4-1, 5-2
Open.................................................... 4-1, 5-2
Shared ................................................. 4-1, 5-2
Auto authentication mode ....................... 4-1, 5-2
End Product Labeling........................................vi
ESS..................................................................3-6
Extended Service Set...............................See ESS
Basic Service Set.................................... See BSS
BSS .................................................................3-6
Certifications..................................................... vi
Common Screen Command Buttons ...............3-3
Communication Problem ................................7-2
Ad-hoc(IBSS) .............................................7-2
Infrastructure...............................................7-2
Connecting to a Network ..............................3-10
Copyright ...........................................................ii
Disclaimer ......................................................ii
Trademarks ....................................................ii
CTS (Clear to Send .........................................5-2
Customer Support ............................................vii
FCC ....................................................................v
Federal Communications Commission (FCC)
Interference Statement....................................v
Fragmentation Threshold ................................5-1
Hidden node ....................................................5-1
IBSS ................................................................3-5
Important Note ..................................................vi
IMPORTANT NOTE........................................vi
Independent Basic Service Set .............. See IBSS
Information for Canadian Users ........................iv
Caution ..........................................................iv
Note...............................................................iv
Network Configuration Profile......................3-12
Reset to factory defaults............................3-12
Saving........................................................3-13
Using pre-configured profile .....................3-13
Network Type .................................................3-5
Ad-Hoc(IBSS).............................................3-5
Infrastructure ...............................................3-6
Notice .................................................................v
Data encryption...............................................4-1
Index
Wireless LAN Utility
Open authentication mode .......................4-1, 5-2
Operating Mode ......................See Network Type
Power Saving Mode...................................... 3-12
Preamble Mode............................................... 5-2
Long............................................................ 5-3
Short............................................................ 5-3
Preface ............................................................. xii
problem description ........................................ 7-1
Profile
Network Configuration ............................. 3-12
Rate
Transmission............................................... 3-5
Related Documentation.................................... xii
Roaming
Example ...................................................... 3-7
RTS (Request To Send) .................................. 5-2
RTS/CTS handshake....................................... 5-2
RTS/CTS Threshold ....................................... 5-1
Shared authentication mode.....................4-1, 5-2
Site Survey...................................................... 3-9
Syntax Conventions ......................................... xii
System tray Icon Color Description................ 3-1
Transfer Rate ................................................ 3-12
Transmission Speed ...................................... 3-12
Troubleshooting.............................................. 7-1
Checking Hardware Conflict ...................... 7-1
Communication problems........................... 7-2
Radio interference................................7-2, 7-3
Starting the WLAN Utility ......................... 7-1
Survery........................................................7-3
Using the WLAN Utility.................................3-1
Note.............................................................3-1
Viewing Current Configuration ......................3-2
Warranty ...........................................................iii
WEP................................................................4-1
WEP Data Encryption
Configuring.................................................4-1
WEP Data Encryption with.............................4-1
WEP Key ........................................................4-2
Type ............................................................4-2
Wired Equivalent Privacy ..................... See WEP
Wireless LAN .................................................1-1
Applications ................................................1-1
Benefits .......................................................1-1
Wireless LAN Parameters...............................3-5
Channel .......................................................3-5
Configuring...............................................3-11
Network Type .............................................3-5
SSID............................................................3-5
Tx Rate........................................................3-5
Wireless LAN Security ...................................4-1
Data Encryption with WEP.........................4-1
WLAN ....................................See Wireless LAN
WLAN Utility
About ..........................................................3-4
Before you upgrade.....................................6-1
Remove and Upgrade..................................6-1
Removing....................................................6-1
Site Survey..................................................3-9
Upgrading ...................................................6-1
WLAN Status..............................................3-2
Index

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2003:10:22 09:32:48+08:00
Subject                         : Version 2.1
Create Date                     : 2003:10:21 13:23:39+08:00
Page Count                      : 48
Creation Date                   : 2003:10:21 13:23:39+08:00
Mod Date                        : 2003:10:22 09:32:48+08:00
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Author                          : Cindy Yang
Metadata Date                   : 2003:10:22 09:32:48+08:00
Creator                         : Cindy Yang
Title                           : ZyAIR Wireless Utility OEM
Description                     : Version 2.1
Page Mode                       : UseOutlines
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88B-120

Navigation menu