ZyXEL Communications NWD3105 Wireless N-lite PCI Express Adapter User Manual NWD3105

ZyXEL Communications Corporation Wireless N-lite PCI Express Adapter NWD3105

NWD3105_User Manual

 NWD3105  Wireless N-lite PCI Express Adapter                                      Default Login Details          Version 1.0.0 Edition 1, 11/2011     www.zyxel.com                                         Copyright © 2011 ZyXEL Communications Corporation
  FCC STATEMENT  This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference  will  not  occur  in  a  particular  installation.  If  this  equipment  does  cause  harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:   Reorient or relocate the receiving antenna.   Increase the separation between the equipment and receiver.   Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.     Consult the dealer or an experienced radio/ TV technician for help. This  device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: 1)  This device may not cause harmful interference. 2)  This device must accept any interference received, including interference that may cause undesired operation. Any  changes or  modifications not expressly  approved by the party responsible for compliance could void the user‟s authority to operate the equipment. In the U.S., Channel 12 and Channel 13 are banned to use according to the act of FCC. So please kindly make sure your AP is working on other channel before you use it. Note: The manufacturer is not responsible for any radio or tv interference caused by unauthorized modifications to this equipment. Such modifications could void the user‟s authority to operate the equipment. FCC RF Radiation Exposure Statement: This  equipment  complies  with  FCC  RF  radiation  exposure  limits  set  forth  for  an  uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter.
  “To  comply  with  FCC  RF  exposure  compliance  requirements,  this  grant  is  applicable  to  only Mobile  Configurations.  The  antennas  used  for  this  transmitter  must  be  installed  to  provide  a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.” CE Mark Warning  This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. National restrictions This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Country Restriction Reason/remark Bulgaria None General authorization required for outdoor use and public service France Outdoor  use  limited  to  10 mW  e.i.r.p.  within  the  band 2454-2483.5 MHz Military  Radiolocation  use.  Refarming  of  the  2.4  GHz band has been ongoing in recent years to allow current relaxed regulation. Full implementation planned 2012 Italy None If used outside of own premises, general authorization is required Luxembourg None General  authorization required for network  and service supply(not for spectrum) Norway Implemented This subsection does not apply for the geographical area within a radius of 20 km from the centre of Ny-Ålesund Russian Federation None Only for indoor applications Note: Please don‟t use the product outdoors in France.
 I  CONTENTS Package Contents..................................................................................................... 1 Chapter 1 Introduction ......................................................................................... 2 1.1 Overview of the product ..................................................................................................... 2 1.2 Features ............................................................................................................................. 2 1.3 LED Status ......................................................................................................................... 3 Chapter 2 Installation Guide ................................................................................ 4 2.1 Hardware Installation ......................................................................................................... 4 2.2 Software Installation........................................................................................................... 4 2.2.1 Overview.......................................................................................................................4 2.2.2 Software Installation for Windows XP ............................................................................4 2.2.3 Software Installation for Windows Vista .........................................................................9 2.2.4 Software Installation for Windows 7 ............................................................................. 12 Chapter 3 Configuration for Windows XP ........................................................ 15 3.1 Current Status .................................................................................................................. 15 3.2 Profile Management ......................................................................................................... 17 3.2.1 Add or Modify a Configuration Profile .......................................................................... 17 3.2.2 Remove a profile ......................................................................................................... 22 3.2.3 Switch another Profile ................................................................................................. 22 3.2.4 Export a Profile ........................................................................................................... 22 3.2.5 Import a Profile............................................................................................................ 22 3.2.6 Scan Available Networks ............................................................................................. 23 3.2.7 Auto Profile Selection Management ............................................................................. 23 3.3 Diagnostics....................................................................................................................... 25 3.3.1 Check Driver Information ............................................................................................. 25 3.3.2 Check Receive and Transmit Statistical Information .................................................... 26
 II Chapter 4 Configuration for Windows Vista .................................................... 27 Chapter 5 Configuration for Windows 7 ........................................................... 30 Chapter 6 WPS configuration ............................................................................ 32 6.1 PBC (Push Button Configuration) method ....................................................................... 32 6.2 PIN method ...................................................................................................................... 34 6.2.1 Enter a PIN into your AP device .................................................................................. 35 6.2.2 Enter the PIN from your AP device .............................................................................. 36 Appendix A: Specifications ................................................................................... 37 Appendix B: Glossary ............................................................................................ 38
 1 Package Contents The following contents should be found in your box:  One NWD3105 Wireless N-lite PCI Express Adapter  Quick Installation Guide  One Resource CD for NWD3105, including:   AR52 Wireless Lite-N Client Utility (AWCU) and Drivers   User Guide   Other Helpful Information  Note: Make sure that the package contains the above items. If any of the listed items are damaged or missing, please contact with your distributor. Conventions: The  „Adapter‟  mentioned  in  this  user  guide  stands  for  NWD3105 Wireless  N-lite  PCI  Express Adapter without any explanations.
 2 Chapter 1  Introduction Thank you for choosing NWD3105 Wireless N-lite PCI Express Adapter. 1.1  Overview of the product The adapter is designed to provide a high-speed and unrivaled wireless performance for your PC. With a faster wireless connection, you can get a better Internet experience, such as downloading, gaming, video streaming and so on. The NWD3105‟s auto-sensing capability allows high packet transfer rate of up to  150Mbps for maximum throughput. It has good capability on anti-jamming; it can also interoperate with other wireless  (802.11n/g/b)  products.  The  adapter  supports  WEP,  WPA  and  WPA2  encryption  to prevent outside intrusion and protect your personal information from being exposed. The  Quick  Setup  Wizard  guides  you  step  by  step  through  the  installation  process;  the  AR52 Wireless Lite-N Client Utility helps you create a wireless connection immediately. With unmatched wireless performance, reception, and security protection, the NWD3105 is the best choice for easily adding or upgrading wireless connectivity. 1.2  Features   IEEE 802.11n, IEEE 802.11g, IEEE 802.11b standards   Supports WPA/WPA2 data security, IEEE 802.1x authentication, TKIP/AES encryption, WEP encryption   Make  use  of  IEEE  802.11n  wireless  technology  to  provide  a  wireless  data  rate  of  up  to 150Mbps     supports automatically adjust to lower speeds due to distance or other operating limitations   Provides PCI-E interface   Supports Ad-Hoc and Infrastructure modes   Good capability on anti-jamming   Supports roaming between access points when configured in Infrastructure mode   Easy to configure and provides monitoring information   Supports Windows 2000/XP/Vista/7
 3  Note: This  device leverages some  802.11n features  to provide improved performance and  coverage compared to 802.11a/g devices, and fully interoperates with 802.11n products if they are Wi-Fi CERTIFIED, but it does not conform to all of the requirements in the IEEE specification and is not classified as "n" in the Wi-Fi CERTIFIED program. 1.3  LED Status Status Working Status Off The driver has not been installed. Flashing Slowly The driver has been installed but there is no data being transmitted or received. Flashing Quickly There is data being transmitted or received.
 4 Chapter 2  Installation Guide 2.1  Hardware Installation To install the adapter, follow these steps listed below: 1.  Turn off your desktop PC and disconnect the power. 2.  Remove your PC case and locate an available PCI-E slot on the mainboard. Remove the metal  slot  cover  on  the  back  of  the  PC.  Check  with  your  computer  manufacturer  for instructions if needed. 3.  Slide the PCI-E Adapter into the PCI-E slot. Make sure that all of its pins are touching the slot's  contacts.  Once  the  adapter  is  firmly  in  place,  secure  its  fastening  tab  to  your  PC's chassis with a mounting screw. Then, close your PC case. 4.  Reconnect your PC‟s power and turn on your desktop PC. 2.2  Software Installation 2.2.1  Overview The Adapter‟s Setup Wizard will guide you through the Installation procedure for Windows XP. The Setup Wizard will install the AR52 Wireless Lite-N Client Utility (AWCU) and drivers. When  you  install  the  hardware  prior  to  before  installing  the  software,  the  system  will  prompt “Found New Hardware Wizard”, click Cancel, and run the Setup Wizard program on the CD-ROM.   The Setup steps for Windows 2000 and XP are similar with each other. This user guide takes Windows XP for example. 2.2.2  Software Installation for Windows XP 1.  Insert the Resource CD into your CD-ROM drive. To continue, find the CD/DVD drive where the installation CD was placed. Open NWD3105 folder, and double-click Setup.exe. Then the following screen for preparing setup will appear.
 5  Figure 2-1 2.  Soon, XFigure 2-2X will display after a moment. Click Next to continue.  Figure 2-2 3.  After that, you should choose a Setup type. It is recommended that you select Install Client Utilities  and  Driver. Select  Install  Driver  Only  to  install  driver  only, select  Make  Driver Installation Diskette(s) to make the diskette(s) as the installation driver (shown in XFigure 2-3). Click Next to continue.
 6  Figure 2-3 4.  Click Browse to change the destination location for the software, then click Next in the screen below (shown in XFigure 2-4).  Figure 2-4 5.  After that, select the program folder, you should create a new folder name or select one from the Existing Folders list. It is recommended that you keep the default setting. Click Next to continue the installation.
 7  Figure 2-5 6.  Choose  configuration tool,  if  you are  not sure, please leave it default.  Then  click  Next  to continue.  Figure 2-6
 8 7.  Click OK to continue the Installation. Wait a while for the setup as shown in Figure 2-7 X.  Figure 2-7  Note: For Windows XP, the Setup Wizard will notify you of how to proceed with the installation  during these steps (shown in XFigure 2-8X). Our drivers have been tested thoroughly, and are able to work with the operating system. Click Continue Anyway to continue the Installation.  Figure 2-8
 9 8.  After all the steps above, you will see the screen below, click Finish to reboot the system.  Figure 2-9 2.2.3  Software Installation for Windows Vista 1.  Insert the Resource CD into your CD-ROM drive. To continue, find the CD/DVD drive where the installation CD was placed. Open NWD3105 folder, and double-click Setup.exe. Then the following screen for preparing setup will appear.  Figure 2-10
 10 2.  Soon, Figure 2-11 will display after a moment. Click Next to continue.  Figure 2-11 3.  Click Yes to continue.  Figure 2-12 4.  The following page will display and please wait a moment.
 11  Figure 2-13  Note: For Windows Vista, the Setup Wizard will notify you of how to proceed with the installation during these steps (shown in Figure 2-14). Our drivers have been tested thoroughly, and are able to work with the operating system. Click Install this driver software anyway to continue the Installation.  Figure 2-14 5.  Click Finish to complete the installation.
 12  Figure 2-15 2.2.4  Software Installation for Windows 7 1.  Insert the Resource CD into your CD-ROM drive. To continue, find the CD/DVD drive where the installation CD was placed. Open NWD3105 folder, and double-click Setup.exe. Then the following screen for preparing setup will appear.  Figure 2-16 2.  Soon, Figure 2-17 will display after a moment. Click Next to continue.
 13  Figure 2-17 3.  Wait a while for the setup as shown in Figure 2-18.  Figure 2-18  Note: For Windows 7, the Setup Wizard will notify you about the Windows Security with the installation during these steps (shown in Figure 2-19). Our drivers have been tested thoroughly, and are able
 14 to work with the operating system. Click Installation this driver software anyway to continue the installation.  Figure 2-19 4.  Then you will see Figure 2-20. Click Finish to complete.  Figure 2-20
 15 Chapter 3  Configuration for Windows XP NWD3105 can be configured by AR52 Wireless Lite-N Client Utility (AWCU) in Windows XP & 2000.  This  chapter  describes  how  to  configure  your  Adapter  for  wireless  connectivity  on  your Wireless Local Area Network (WLAN) and use the data security encryption features.   The configuration of the adapter in Windows XP is similar with that of Windows 2000. This User Guide takes Windows XP for example. After Installing the Adapter, the Adapter‟s tray icon    will appear in your system tray. It appears at the bottom of the screen, and shows the signal strength using color and the received signal strength indication (RSSI).  If the icon is gray, there is no connection.   If the icon is red, there is poor signal strength and the RSSI is less than 5dB.   If the icon is yellow, there is poor signal strength and the RSSI is between 5dB and 10dB.   If the icon is green, there is good signal strength and the RSSI is between 10dB and 20dB.   If the icon is green, there is excellent signal strength and the RSSI is more than 20dB. Double-click the icon and the AWCU will run. You can also run the utility by clicking the Start  →Wireless  → All  Programs  →      AR52  Wireless  Lite-N  Client  Utility.  The  AWCU  provides some integrated and easy tools to:   Display current status information   Edit and add configuration profiles   Display current diagnostics information The section below introduces these above capabilities. 3.1  Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab needn‟t any configurations.
 16  Figure 3-1 The following table describes the items found on the Current Status screen.  Profile  Name  -  This  shows  the  name  of  current  selected  configuration  profile.  The configuration of Profile name will be described on the General tab of Profile Management.    Link Status - This shows whether the station is associated to the wireless network.  Wireless Mode - Here displays the wireless mode.  Network Type - The type of network and the station currently connected are shown here. The options include:   Infrastructure (access point)   Ad Hoc  Note: You  can  configure  the  network  type  and  wireless  mode  on  the  Advanced  tab  of  Profile Management.  IP Address - This displays the computer‟s IP address.  Control Channel - This shows the currently connected channel.  Data Encryption - Here displays the encryption type the driver is using. You can configure it on the Security tab of Profile Management.  Server Based Authentication - This shows whether the server based authentication is used.  Signal Strength - This shows the strength of the signal. Click Advanced on the screen above, you can see advanced information about the program and its operations.
 17 3.2  Profile Management Click the Profile Management tab of the AWCU and the next screen will appear (shown in XFigure 3-2X). The Profile Management screen provides tools to:   Add a new profile   Modify a profile   Remove a profile   Activate a Profile   Import a Profile   Export a Profile   Scan Available Networks   Order profiles  Figure 3-2 3.2.1  Add or Modify a Configuration Profile To  add  a  new  configuration  profile,  click  New  on  the  Profile  Management  tab.  To  modify  a configuration profile, select the configuration profile from the Profile list and click Modify. Then you will see the Management dialog box (shown in XFigure 3-3). 1.  Edit the General tab  Profile Name - Please enter the Profile name which identifies the configuration profile. This name must be unique. Note that the profile names are not case-sensitive.  Client Name - Please enter the Profile name which identifies the client machine.  Network Names (SSIDs) - Please enter the IEEE 802.11 wireless network name. This field
 18 has a maximum limit of 32 characters.  Figure 3-3 2.  Edit the Security tab Select the Security tab in the screen above, and then you can edit the fields to configure the profile. To define the security mode, select the radio button of the desired security mode as follows.  Figure 3-4  WPA/WPA2: Wi-Fi Protected Access
 19  WPA/WPA2 Passphrase: Wi-Fi Protected Access Passphrase  802.1x: Enables 802.1x security.  Pre-Shared Key (Static WEP): Enables the use of shared keys that are defined on both the access point and the station. To define shared encryption keys, choose the Shared Key radio button and click Configure to fill in the Define Shared Keys window (shown in Figure 3-5X).  None: No security (not recommended).  Note: If the access point which the Adapter is associated has WEP set and the client has WEP enabled, make  sure  that  Allow  Association  to  Mixed  Cells  is  checked  on  the  HSecurity  tabH  to  allow association.  To  complete  WEP  encryption  configuration,  you  must  select  the  802.11 Authentication Mode as appropriate on the Advanced tab of this Profile Management dialog. To configure the Encryption Keys under the Pre-Shared keys (Static WEP) Security mode:  Figure 3-5  Note: Select different Security Options, the configurations are different; you can select the appropriate security option and configure the exact key as your need. 3.  Edit the Advanced tab This screen below allows you to make advanced configuration for the profile.
 20  Figure 3-6  Power Save Mode - Please select the power save mode in the drop-down list.  Maximum - Selects maximum mode to let the access point buffer incoming messages for the  Adapter.  The  Adapter  will  detect  the  access  point  if  any  messages  are  waiting periodically.  Normal - Normal mode uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets.  Off - Turns power saving off, thus powering up the Wireless PCI-E Adapter continuously for a short message response time.  Network Type: There are basically two modes of networking:  Infrastructure - All wireless clients will connect to an access point or wireless router.  Ad-Hoc -  Directly  connecting  to  another  computer,  for  peer-to-peer  communication, using wireless  network  adapters  on  each  computer,  such  as  two  or  more  NWD3105 wireless adapters.  Note: 1)  An Infrastructure network contains an Access Point or wireless router. All the wireless devices or clients will connect to the wireless router or access point. 2) An Ad-Hoc network contains only clients, such as laptops with wireless desktop adapters. All the adapters must be in Ad-Hoc mode to communicate. 3)  In the U.S., Channel 12 and Channel 13 are banned to use according to the act of FCC. So
 21 please kindly make sure your AP is working on other channel before you use it.  Wireless  Mode:  Specifies  2.4  GHz  150  Mbps,  2.4  GHz  54  Mbps  or  2.4  GHz  11  Mbps operation in an access point network. The Wireless adapter must match the wireless mode of the access point with which it associates.  Wireless Mode when Starting an HAd HocH Network: Specifies 2.4 GHz 54/11 Mbps to start an Ad Hoc network if no matching network name is found after scanning all available modes. This  mode  also  allows  the  selection  of  the  channel  that  the  Wireless  Adapter  uses.  The channels available depend on the regulatory domain. If the adapter finds no other ad hoc adapters,  the  channel  that  the  adapter  starts  the  ad  hoc  network  with  will  be  selected automatically.  The  Adapter  must  match  the  wireless  mode  and  channel  of  the  clients  it associates.  802.11  Authentication Mode:  Select which mode the Adapter uses to  authenticate to an access point:  Auto  -  Automatic  causes  the  adapter  to  attempt  authentication  using  shared,  but switches it to open authentication if shared fails.  Open - Open System enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match.  Shared - Shared-key only allows the adapter to associate with access points that have the same WEP key. For infrastructure (access point) networks, click Preferred APs… to specify four access points at most to the client adapter that attempts to be associated to the access points. The four access points have different priorities; the frontal has the higher priority.  Figure 3-7
 22 3.2.2  Remove a profile 1.  Go to the Profile Management tab (shown in XFigure 3-2X). 2.  Select the profile name in the Profiles List. 3.  Click Remove.  Note: The profile being used can‟t be removed. 3.2.3  Switch another Profile 1.  Go to the Profile Management screen (shown in XFigure 3-2X). 2.  Select the profile name required in the Profiles List. 3.  Click Activate. 3.2.4  Export a Profile 1.  From the Profile Management screen (shown in XFigure 3-2X), highlight the profile to export. 2.  Click Export…, the Export Profile window will then appear below. 3.  Browse the directory to export the profile to. 4.  Click Save. The profile should then be exported to the specified location.  Figure 3-8 3.2.5  Import a Profile 1.  From the Profile Management screen (shown in XFigure 3-2), click Import…. Then the Import Profile will appear below. 2.  Browse to the directory where the profile is located. 3.  Highlight the profile name.
 23 4.  Click Open, the imported profile will then appear in the Profiles List.  Figure 3-9 3.2.6  Scan Available Networks 1.  Click  Scan  on  the  Profile  Management  screen  (shown  in  XFigure  3-2X),  the  Available Infrastructure and Ad Hoc Networks window will appear below. 2.  Click Refresh to refresh the list at any time. 3.  Highlight  a  network  name  and  click  Activate  to  connect  to  an  available  network.  If  no configuration  profile exists  for that network,  the Profile Management window will  open the General tab screen. Fill in the Profile name and click OK to create the configuration profile for that network.  Figure 3-10 3.2.7  Auto Profile Selection Management The  auto  selection feature  allows  the  adapter  to  automatically  select  a  profile from  the  list  of
 24 profiles and use it to connect to the network. To add a new profile into the Auto Selected Profiles list, please follow these steps. 1.  On the Profile Management screen (shown in XFigure 3-2X), click Order Profiles…. 2.  The Auto Profiles Selection management window will appear (shown in XFigure 3-11) with a list of all created profiles in the Available Profiles.  Figure 3-11 3.  Highlight the profiles to add to auto profile selection, and click Add. The profile will appear in the Auto Selected Profiles box. 4.  Highlight a profile in the Auto Selected Profiles box. 5.  Click Move Up or Move Down as appropriate.    Note: The first profile in the Auto Selected Profiles box has highest priority, while the last profile has the lowest priority. 6.  Click OK. 7.  Check the Auto Select Profiles checkbox on the Profile Management tab (shown in XFigure 3-2).  Note: When  auto  profile  selection  is  enabled  by  checking  Auto  Select  Profiles on  the  Profile Management tab, the client adapter will scan for an available network. The profile with the highest priority and the same SSID as one of the found networks will be used to connect to the network. If
 25 the connection fails, the client adapter will try the next highest priority profile that matches the SSID until an available network is found. 3.3  Diagnostics The Diagnostics tab of the AR52 Wireless Lite-N Client Utility (AWCU) provides buttons used to retrieve  receiving  and  transmitting  statistics.  The  Diagnostics  tab  does  not  require  any configuration. The Diagnostics tab lists the following receiving and transmitting diagnostics for frames received or transmitted by the wireless network adapter:   Multicast frames transmitted and received     Broadcast frames transmitted and received     Unicast frames transmitted and received     Total bytes transmitted and received  Figure 3-12 3.3.1  Check Driver Information Click the Adapter Information button in the screen above, you will see the adapter information, including general information about the wireless network adapter and the Network Driver Interface Specification (NDIS) driver. Access the adapter information from the Diagnostics tab.  Card Name - The name of the wireless network adapter.    MAC Address - The MAC address of the wireless network adapter.    Driver - The driver name and path of the wireless network adapter driver.
 26  Driver Version - The version of the wireless network adapter driver.  Driver Date - The creation date of the wireless network adapter driver.  Client Name - The name of the client computer. 3.3.2  Check Receive and Transmit Statistical Information The  Advanced  Statistics  show  receiving  and  transmitting  statistical  information  about  the following  receiving  and  transmitting  diagnostics  for  frames  received  by  or  transmitted  to  the wireless network adapter.  Figure 3-13
 27 Chapter 4  Configuration for Windows Vista AR52  Wireless  Lite-N  Client  Utility  (AWCU)  is  not  available  for  Windows  Vista.  So  after  the Adapter's driver has been installed, we have to use Windows WLAN Autoconfig to establish a connection. Please follow the steps below.   1.  Right-click  the icon    at the bottom of  your  screen  in your system  tray  and  then select “Connect to a network”.  Figure 4-1 2.  This page will then display  and you will see the available wireless network list. Select  the SSID of your Access Point, take test for example. Click Connect.  Figure 4-2 Select A Network
 28 3.  Enter the passphrase, take 1234567890 for example. And then click Connect.  Figure 4-3 Enter Passphrase 4.  If the key entered is correct, you will successfully connect to the network.  Figure 4-4 Connecting
 29 5.  Click Close to finish.  Figure 4-5 successfully Connected
 30 Chapter 5  Configuration for Windows 7 AR52 Wireless Lite-N Client Utility (AWCU) is not available for Windows 7. So after the Adapter's driver has been installed, we have to use Windows WLAN Autoconfig to establish a connection. Please follow the steps below.   1.  Right-click the icon    at the bottom of your screen in your system tray and then you will see the available wireless network list. Select the SSID of your Access Point, take test for example. Click Connect.  Figure 5-1 Select A Network
 31 2.  If your wireless network is secured, you will be required to enter the security key as shown in Figure 5-2. Enter the passphrase, take 1234567890 for example. And then click OK.  Figure 5-2 Enter Passphrase 3.  If the key entered is correct, you will successfully connect to the network as shown in Figure 5-3.  Figure 5-3 Connecting
 32 Chapter 6  WPS configuration WPS (Wi-Fi Protected  Setup) function allows you to add a new wireless device to an existing network quickly.  Note: WPS function is not supported in Windows 7 OS. If  the  wireless  Router  supports  Wi-Fi  Protected  Setup  (WPS),  you  can  establish  a  wireless connection between wireless adapter and router using either Push Button Configuration (PBC) method or PIN method. First, the WPS software should be installed. Insert the Resource CD into your CD-ROM drive, and open  the  folder  named  NWD3105.  Double-click  WPS.exe  in  the  proper  folder  to  start  the installation, then the following screen for preparing setup will appear.  Figure 6-1 Then, please follow the clue of the Operation System to complete the WPS installation. After that, WPS  function  can  be  enabled.  Here  we  will  introduce  how  to  configure  the  WPS  (For  the configuration of WPS, here takes the Wireless Router of our company for example). 6.1  PBC (Push Button Configuration) method 1.  Firstly, press the WPS button directly on the front panel of the Router shown in X Figure 6-2.
 33  Figure 6-2 2.  Double click the icon    on the desktop to open the WPS Utility and then you can see the welcome screen shown as Figure 6-3. Click Next to continue.    Figure 6-3 3.  Then select Push the button on my access point in the next screen shown in Figure 6-4 and click Next.
 34  Figure 6-4 4.  Then wait a minute until Figure 6-5 appears. Click Finish to complete the WPS configuration.  Figure 6-5 6.2  PIN method There are two ways to configure the WPS by PIN method: 1  Enter a PIN into your AP device.
 35 2  Enter the PIN from your AP device.   Following are the detailed configuration procedure of each way.   6.2.1  Enter a PIN into your AP device 1.  Double click the icon    on the desktop to open the WPS Utility and then you can see the welcome screen shown as Figure 6-3 Click Next to continue. Figure 6-6 will appear. Select the second option and you will see the PIN value of the adapter which is randomly generated. Click Next.  Figure 6-6 2.  Open  the  Router‟s  Web-based  Utility  and  click  WPS  link  on  the  left  of  the  main  menu. Then XFigure 6-7 will appear.    Figure 6-7 3.  Click Add device, then you can see XFigure 6-8. Select Enter the new device’s PIN and
 36 enter the PIN value of the adapter shown in Figure 6-6, click Connect.  Figure 6-8 4.  When Figure 6-5 appears, the WPS configuration is complete. 6.2.2  Enter the PIN from your AP device 1.  Open the WPS Utility and you will see Figure 6-3 . Click Next to continue. Then Figure 6-9 will appear. Select  the third option  and enter the PIN  value which  is generally labeled on the bottom of the router. Click Next.  Figure 6-9 2.  When Figure 6-5 appears, the WPS configuration is complete.  Note: If you generate a new PIN code for your Router, please enter the new one instead.
 37 Appendix A: Specifications Normal Interface PCI-E Interface Standards IEEE 802.11n; IEEE 802.11g; IEEE 802.11b; Operating System Windows 2000 / Windows XP / Windows Vista / Windows 7 Radio Data Rate 11b: 1/2/5.5/11Mbps 11g: 6/9/12/18/24/36/48/54Mbps 11n: Up to 150Mbps Modulation 11b: CCK, QPSK, BPSK; 11g: OFDM; 11n: QPSK, BPSK, 16-QAM, 64-QAM; Media Access Protocol CSMA/CA with ACK Data Security WPA/WPA2; 64/128/152-bit WEP; TKIP/AES Spread Spectrum Direct Sequence Spread Spectrum (DSSS) Safety & Emissions FCC, CE  Environmental and Physical Operating Temp. 0℃~40℃ (32℉~104℉) Storage Temp. -40℃~ 70℃ (-40℉~158℉) Working Humidity 10% ~ 90% RH, Non-condensing Storage Humidity 5% ~ 90% RH, Non-condensing
 38 Appendix B: Glossary  802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps using direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks.  802.11g -  specification  for  wireless  networking  at  54  Mbps  using  direct-sequence spread-spectrum  (DSSS)  technology,  using  OFDM  modulation  and  operating  in  the unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, and WEP encryption for security.  Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers operate on a peer-to-peer basis, communicating directly with each other without the use of an access point. Ad-hoc  mode  is  also  referred  to  as  an  Independent  Basic  Service  Set  (IBSS)  or  as peer-to-peer mode, and is useful at a departmental scale or SOHO operation.    DSSS - (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS signal is recognized as the only valid signal, and interference is inherently rejected (ignored).  FHSS  -  (Frequency  Hopping  Spread  Spectrum)  -  FHSS  continuously  changes  (hops)  the carrier  frequency  of  a  conventional  carrier  several  times  per  second  according  to  a pseudo-random  set  of  channels.  Because  a  fixed  frequency  is  not  used,  and  only  the transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.  Infrastructure Network - An infrastructure network is a group of computers or other devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, the  wireless  devices  communicate  with  each  other  and  to  a  wired network  by  first  going through an access point. An infrastructure wireless network connected to a wired network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation scale, or when it is necessary to connect the wired and wireless networks.    Spread Spectrum - Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There
 39 are  two  main  alternatives,  Direct  Sequence  Spread  Spectrum  (DSSS)  and  Frequency Hopping Spread Spectrum (FHSS).  SSID - A  Service  Set Identification is a thirty-two character (maximum)  alphanumeric key identifying  a  wireless  local  area  network.  For  the  wireless  devices  in  a  network  to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the  wireless Access Point  and  to  the wireless network name.  See  also Wireless Network Name and ESSID.  WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the  key  length.  128-bit  encryption  requires  a  longer  key  than  64-bit  encryption.  Keys  are defined by entering in a string in HEX (hexadecimal  - using characters 0-9, A-F) or ASCII (American  Standard  Code  for  Information  Interchange  –  alphanumeric  characters)  format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily.  Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 802.11b devices.  WLAN  -  (Wireless  Local  Area  Network)  -  A  group  of  computers  and  associated  devices communicate with each other wirelessly, which network serving users are limited in a local area.  WPA  -  (Wi-Fi  Protected  Access)  -  A  wireless  security  protocol  use  TKIP  (Temporal  Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.

Navigation menu