background image

 

4 Troubleshooting 

 

This chapter provides solutions to problems usually encountered during the installation and operation 

of the adapter.   

 

1.  What is the IEEE 802.11g standard? 

802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for 

up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream 

wireless LAN technology for the home, office and public networks.   

802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.11a for 

the 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as IEEE 802.11b. 

The 802.11g standard requires backward compatibility with 802.11b. 

 

The standard specifically calls for:   

A.  A new physical layer for the 802.11 Medium Access Control (MAC) in the 2.4 GHz frequency 

band, known as the extended rate PHY (ERP). The ERP adds OFDM as a mandatory new 

coding scheme for 6, 12 and 24 Mbps (mandatory speeds), and 18, 36, 48 and 54 Mbps 

(optional speeds). The ERP includes the modulation schemes found in 802.11b including 

CCK for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps. 

B.  A protection mechanism called RTS/CTS that governs how 802.11g devices and 802.11b 

devices interoperate. 

 

2.  What is the IEEE 802.11b standard? 

The IEEE 802.11b Wireless LAN standard subcommittee, which formulates the standard for the 

industry. The objective is to enable wireless LAN hardware from different manufactures to 

communicate. 

 

3.  What does IEEE 802.11 feature support

 

The product supports the following IEEE 802.11 functions: 

z

 

CSMA/CA plus Acknowledge Protocol 

z

 

Multi-Channel Roaming 

z

 

Automatic Rate Selection 

z

 

RTS/CTS Feature 

z

 

Fragmentation 

z

 

Power Management 

 

4. What 

is 

Ad-hoc? 

An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, 

Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a 

departmental scale for a branch or SOHO operation. 

 

5.  What is Infrastructure

 

An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. 

Infrastructure is applicable to enterprise scale for wireless access to central database, or 

wireless application for mobile workers. 

30

 

Summary of Contents for HWPG1

Page 1: ......

Page 2: ...ipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of...

Page 3: ...r to obtain a Return Authorization number Warranty is for repair or replacement only Hawking Technology does not issue any refunds BE SURE TO HAVE YOUR PROOF OF PURCHASE RETURN REQUESTS CAN NOT BE PRO...

Page 4: ...y 10 3 2 Profile 11 3 2 1 Configure the Profile 12 3 2 1 0 Configuration 12 3 2 1 1 Authentication vs Security 15 3 2 1 2 802 1x Setting Certification 18 3 2 1 3 802 1x Setting CA Server 20 3 3 Link S...

Page 5: ...dvanced solution defined by IEEE 802 11i for security in wireless networks The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowi...

Page 6: ...Bm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 130 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE IC 1 3 Package Contents Before you begin the installation ple...

Page 7: ...Windows 98SE Me 2000 Note2 If you have installed a Wireless PCI Card driver utility before please uninstall them first before continuing with the HWPG1 software installation Software Installation A I...

Page 8: ...C Click Yes to process the installation if you accept the license agreement D Choose Hawking Configuration Tool and click next 4...

Page 9: ...E The system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue F Please wait while the HWPG1 is configuring your software installation 5...

Page 10: ...re this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Restart your computer Software Installation Continue A After you hav...

Page 11: ...C Now you have completed the software installation Select Finish 7...

Page 12: ...utomatically This card will auto connect to wireless device which has better signal strength and no wireless security setting The Configuration Utility appears as an icon on the system tray of Windows...

Page 13: ...ect Exit to close the Configuration Utility tool In Windows XP there is a Windows Zero Configuration Tool for you to setup wireless clients By default this Windows Zero Configuration Tool is enabled I...

Page 14: ...Configuration Utility the system will scan all wireless channels to find all access points stations within the accessible range of your card and automatically connect to the wireless device with the...

Page 15: ...etworks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the information of all the wireless n...

Page 16: ...escription Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID p...

Page 17: ...nother wireless station in the Wireless LAN network without going through an Access Point or Router Peer to Peer Transmit Power If you wish to lower the transmit power of the card to save the power of...

Page 18: ...t is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any pa...

Page 19: ...prises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WP...

Page 20: ...tandard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the s...

Page 21: ...n Protocol EAP a method of authentication that has been in use for a number of years on networks that provide Point to Point Protocol PPP support as many internet service providers and enterprises do...

Page 22: ...APv2 PAP and EAP MD5 PEAP specifies that an EAP compliant authentication protocol must be used this card supports EAP MSCHAP v2 EAP TLS Smart card and Generic Token Card The client certificate is opti...

Page 23: ...ficate Store and made available to the RADIUS server for certification Parameter Description Tunnelled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol to be used...

Page 24: ...3 2 1 3 802 1x Setting CA Server 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to 20...

Page 25: ...Status from the system tray The icon in your system tray will display different colors to help you distinguish the status of your wireless network Follow the table to the right to understand what eac...

Page 26: ...with its Tx counts Tx success Tx error RTS Success and RTS Failed and its Rx counts Rx success Rx error You may reset the counters by clicking Reset Counter 3 5 Advanced This option enables you to con...

Page 27: ...Turbo Mode Turbo Mode enables the card to deliver the better throughput in the same period and environment 23...

Page 28: ...24...

Page 29: ...l 3 7 Setting Up A Static IP Address Generally your IP settings will be assigned automatically However if your network doesn t support this capability please enter in the appropriate IP settings The I...

Page 30: ...b Go to your Control Panel Select Network Connections Right click on the Wireless Connection Properties 2 Select Internet Protocol TCP IP and Properties 26...

Page 31: ...ress 3 8 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this featu...

Page 32: ...rofile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connect...

Page 33: ...B Click Configure C Select Advanced page enable the WMM Capable 29...

Page 34: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 35: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 36: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: