background image

 

 

Parameter Description 

Data Encryption 

WEP

 – In WPA or WPA-PSK mode, WEP is also able to be the 

encryption method for the transmission data. 

 

TKIP

 – TKIP (Temporal Key Integrity Protocol) changes the 

temporal key every 10,000 packets (a packet is a kind of message 

transmitted over a network.) This insures much greater security 

than the standard WEP security. 

 

AES

 – AES has been developed to ensure the highest degree of 

security and authenticity for digital information and it is the most 

advanced solution defined by IEEE 802.11i for the security in the 

wireless network.   

 

Note: All devices in the network should use the same encryption 

method to ensure the communication. 

 

 

3.3 Link 

Status 

From the “Link Status” option, you can view all the information of the network you are connecting to. 

 

 

 

Parameter Description 

Status 

Display the SSID and MAC ID of the network the card is 

connecting to. 

 

 

Current Channel 

Display the number of the radio channel and the frequency used 

for the networking. 

 

 

14

 

Summary of Contents for WP440G

Page 1: ...8 80 02 2 1 11 1g g W Wi ir re el le es ss s L LA AN N P PC CI I C Ca ar rd d User Manual Version 1 0 April 2004 ...

Page 2: ...warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Furth...

Page 3: ... is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of hands wrist and feet during wireless modes of operation This device complies with Part 15 of the FCC ...

Page 4: ... of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use i...

Page 5: ... 1 1 3 Package Contents 2 2 INSTALLATION PROCEDURE 3 3 CONFIGURATION UTILITY 3 3 1 Site Survey 6 3 2 Profile 7 3 2 1 Configure the Profile 8 3 2 2 Enable WPA in Windows XP 12 3 3 Link Status 14 3 4 Statistics 15 3 5 Advance 16 3 6 About 17 4 TROUBLESHOOTING 18 ...

Page 6: ...ty in the wireless network The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowing user customizes the way of saving the power from his her portable or handheld devices This card is cost effective together with the versatile features it is the best solution for you to build your wireless network 1 1 Features Works with both IE...

Page 7: ... OFDM 10 PER 70dBm 11Mbps CCK 8 PER 86dBm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 127 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items One PCI Card One Extendable Antenna 94cm One CD Driver Utility User s Manual One ...

Page 8: ...version first Hardware Installation A Turn off your computer and remove its cover B Insert the PCI card to an available PCI slot firmly C Secure this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Turn on the computer Software Installation A A Found New Hardware Wizard is displayed after the PCI card is installed and the ...

Page 9: ...arts to install the software of the card Please wait a moment E The current setting of the Country Channel of the card is displayed for your reference If you are in different country please change the Country Channel from the drop down menu and click Next 4 ...

Page 10: ...F Click Finish to complete the installation G The RaConfig is displayed and you can start to configure the card 5 ...

Page 11: ...the configuration utility Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool Exit Select Exit to close the Configuration Utility tool 3 1 Site Survey When you open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your card and automatically connect to the wireless device wi...

Page 12: ...tton to collect the information of all the wireless networks nearby Connect Button Click Connect to connect to the selected network Add to Profile Button Add the selected network to Profiles list 3 2 Profile The Profiles List is for you to manage the networks you connect to frequently You are able to Add Delete Edit Activate a profile Parameter Description Profiles List The profiles list display a...

Page 13: ... the card If you want to add one of the networks nearby to the profile list pull down the menu all the networks nearby will be listed and you can add one of them to the profile list Power Saving Mode The power saving function is only available when the network type is in Infrastructure CAM Constantly Awake Mode The card will always set in active mode Power Saving Mode Enable the card in the power ...

Page 14: ...l auto switch the preamble mode depending on the wireless stations which the card is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send For packets smaller than this threshold an RTS is not sent and the packet is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value d...

Page 15: ... for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the network WPA takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network whil...

Page 16: ...ame encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from eight to 64 characters and can be letters or numbers This same key must be used on all of the wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default encryption k...

Page 17: ... A pre shared key is a password that each wireless station uses the same key to access the network Typically this mode will be used in a home environment To enable the WPA function in Windows XP the following software systems are required 1 Windows XP Service Pack 1 with Windows XP Support Patch for Wi Fi Protected Access program in addition 2 Configure the card by Wireless built in utility Wirele...

Page 18: ...s Server WPA enabled access point and a WPA enabled client Once WPA is enabled all clients and access points on the network must be WPA enabled in order to access the network WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their acc...

Page 19: ... the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communication 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to Parameter Des...

Page 20: ...trength in the unit of dBm select this check box Signal Strength This bar shows the signal strength level The higher percentage shown in the bar the more radio signal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation 3 4 Statistics This option enables you to view the available statistic information with its Tx counts Tx ...

Page 21: ...k you can set the card to this mode Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and environment B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protectio...

Page 22: ...in the network the shorter distance is allowed between the card and the wireless stations When the wireless mode is 802 11 B only the maximum data rate is 11Mbps 11b so that there are only Auto 1 2 5 5 11Mbps options you can select Turn Off RF Button If you want to turn off the radio of the card temporarily click this button To turn on the radio click this button again 3 6 About By choosing this o...

Page 23: ...ncludes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wirele...

Page 24: ...th Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhan...

Page 25: ...ther words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Di...

Reviews: