background image

iB-WPA300N 

300M MIMO Wireless-N PCI-E Adapter

 

 

37

more BSS in a single network is referred to as an Extended Service Set (ESS). 
Infrastructure mode is useful at a corporation scale, or when it is necessary to connect 
the wired and wireless networks.   

¾

 

Spread Spectrum -

 Spread Spectrum technology is a wideband radio frequency 

technique developed by the military for use in reliable, secure, mission-critical 
communications systems. It is designed to trade off bandwidth efficiency for reliability, 
integrity, and security. In other words, more bandwidth is consumed than in the case of 
narrowband transmission, but the trade off produces a signal that is, in effect, louder and 
thus easier to detect, provided that the receiver knows the parameters of the 
spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, 
a spread-spectrum signal looks like background noise. There are two main alternatives, 
Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum 
(FHSS). 

¾

 

SSID - 

S

ervice 

S

et 

Id

entification is a thirty-two character (maximum) alphanumeric key 

identifying a wireless local area network. For the wireless devices in a network to 
communicate with each other, all devices must be configured with the same SSID. This 
is typically the configuration parameter for a wireless PC card. It corresponds to the 
ESSID in the wireless Access Point and to the wireless network name. 

See also 

Wireless 

Network Name and ESSID. 

¾

 

WEP - 

(

W

ired 

E

quivalent 

P

rivacy) 

-

 A data privacy mechanism based on a 64-bit or 

128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To 
gain access to a WEP network, you must know the key. The key is a string of characters 
that you create. When using WEP, you must determine the level of encryption. The type 
of encryption determines the key length. 128-bit encryption requires a longer key than 
64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using 
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – 
alphanumeric characters) format. ASCII format is provided so you can enter a string that 
is easier to remember. The ASCII string is converted to HEX for use over the network. 
Four keys can be defined so that you can change keys easily. 

¾

 

Wi-Fi - 

A trade name for the 802.11b wireless networking standard, given by the 

Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry 
standards group promoting interoperability among 802.11b devices. 

¾

 

WLAN -

 (

W

ireless 

L

ocal 

A

rea 

N

etwork) - A group of computers and associated devices 

communicate with each other wirelessly, which network serving users are limited in a 
local area. 

¾

 

WPA - 

(

W

i-Fi 

P

rotected 

A

ccess) 

-

 A wireless security protocol uses TKIP (Temporal Key 

Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server. 

 

Summary of Contents for iB-WPA300N

Page 1: ...300M MIMO Wireless N PCI E Adapter Model No iB WPA300N 1910020629 Ver 1 0 0...

Page 2: ...xposure compliance requirements this grant is applicable to only Mobile Configurations The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from...

Page 3: ...on method 12 3 2 2 PIN method 13 3 3 To connect using Windows built in wireless utility 16 3 3 1 In Windows 7 16 3 3 2 In Windows Vista 17 3 3 3 In Windows XP 19 Chapter 4 Management 22 4 1 Profile 22...

Page 4: ...rce CD for iB WPA300N including iBall Baton 300M MIMO Wireless N PCI E Adapter Drivers Wireless Utility User Guide Note If any of the listed contents are damaged or missing please contact the vendor f...

Page 5: ...ur personal information from being exposed With unmatched wireless performance reception and security protection the iB WPA300N is the best choice for easily adding or upgrading wireless connectivity...

Page 6: ...verview LED status Status Working Status Off The driver has not been installed The adapter s radio has been disabled Flashing Slowly The driver has been installed but no data is being transmitted or r...

Page 7: ...acturer for instructions if needed 3 Insert the PCI Express adapter into the PCI Express slot Make sure that all of its pins have touched the slot s contacts Once the adapter has been firmly inserted...

Page 8: ...ures for Windows 7 Windows Vista and Windows XP The procedures in different systems are quite similar therefore here takes the procedures in Windows XP for example 1 Insert the Resource CD into your C...

Page 9: ...mmended to select Install iB WPA300N Wireless Utility and Driver Selecting Install Driver Only can only install driver Click Next to continue Figure 2 5 4 Click Change to specify the destination locat...

Page 10: ...7 Figure 2 6 5 Click Install to continue the setup Figure 2 7 6 The utility and drivers will install It may take 1 2 minutes Figure 2 8 Note During this process if prompted a window as shown in Figure...

Page 11: ...the screen below Click Finish to complete the setup Figure 2 10 8 After installation the utility configuration page will automatically pop up as shown in the following figure and the icon will appear...

Page 12: ...iB WPA300N 300M MIMO Wireless N PCI E Adapter 9 Figure 2 11...

Page 13: ...orts Method III To connect using Windows built in wireless utility Windows users may use the built in wireless utility to connect to a wireless network For specific operations please go to Section 3 3...

Page 14: ...shown in Figure 3 3 Or you can push the WPS button on your Router if it features the WPS function to quickly build a connection without entering the security key password Figure 3 3 Note The security...

Page 15: ...isting network quickly If your wireless Router supports WPS Quick Security Setup you can establish a wireless connection between wireless card and Router using either Push Button Configuration PBC met...

Page 16: ...ng to the target network Figure 3 7 4 When the following window appears you have successfully connected to the network Figure 3 8 3 2 2 PIN method There are two ways to configure the WPS by PIN method...

Page 17: ...51602 for example If you have generated a new PIN code for your Router please enter the new one instead Click Connect to continue Figure 3 9 2 The adapter will be connecting to the target network Figu...

Page 18: ...the following figure will appear Enter the PIN value of the adapter in the empty field beside PIN and then click Connect Figure 3 12 3 When Connect successfully app creen as shown in Figure 3 16 the...

Page 19: ...wireless networks in your area Highlight the wireless network displayed using the SSID to be connected and then click Connect Figure 3 15 2 If the network you would like to connect is encrypted enter...

Page 20: ...use the built in wireless utility Follow the steps below 1 Open the wireless utility by right clicking on the wireless computer icon in your system tray as shown in the figure below Select Connect to...

Page 21: ...rk you would like to connect is security enabled enter the same security key or passphrase that is on your Router If the network to be connected is not secure the connection will be built without ente...

Page 22: ...click on the utility icon in your system tray lower right corner Select Switch to Windows wireless configuration tool Figure 3 22 Or double click the utility icon to load the utility configuration pa...

Page 23: ...ight click on the wireless computer icon in your system tray lower right corner Select View Available Wireless Networks Figure 3 25 3 The utility will display any available wireless networks in your a...

Page 24: ...IMO Wireless N PCI E Adapter 21 Figure 3 26 4 If the network is security enabled you will be prompted to enter the key as shown below If not you will connect to the network directly without entering a...

Page 25: ...ed to the adapter Double clicking on the icon on your desktop will start the utility 4 1 Profile Your wireless networks may vary in different places like home office or coffee shop With Profile manage...

Page 26: ...passphrase or key to authenticate your wireless connection The key must be the exact same key entered on your wireless router or access point None stands for no security It is recommended to enable W...

Page 27: ...e You may edit an existing profile by clicking the Modify button from the Profile page For instance you may like to change the profile name from Home to Home1 or you may want to specify another SSID f...

Page 28: ...ion tool Here you can decide which tool to use either the IB WPA300N Wireless Utility or the Windows wireless configuration tool This option is available only in Windows XP 2 To switch to another wire...

Page 29: ...O Wireless N PCI E Adapter 26 4 3 About The About screen gives you some information about the Driver and Utility versions of the adapter Right click the icon in your system tray and select About from...

Page 30: ...e configured as an AP under the Soft AP mode saving you the trouble of having to get a separate access point or a Router With this feature a computer can use a single physical wireless adapter to conn...

Page 31: ...The security type here is set to be WPA2 PSK which is based on 802 11i and uses Advanced Encryption Standard instead of TKIP It was designed to improve the security features of WEP WPA2 PSK uses a pa...

Page 32: ...ick the Start button click All programs iBall Baton iB WPA300N and then click Uninstall iB WPA300N Wireless Utility Figure 6 1 Uninstall Utility 2 Click Yes to start uninstalling the utility software...

Page 33: ...On the Windows taskbar click the Start button click All programs iBall Baton iB WPA300N and then click Uninstall iB WPA300N Driver Figure 6 5 Uninstall Driver 2 Click Yes to start uninstalling the dri...

Page 34: ...iB WPA300N 300M MIMO Wireless N PCI E Adapter 31 Figure 6 7 4 Click Finish when the figure below appears Figure 6 8...

Page 35: ...Rate 11b 1 2 5 5 11Mbps 11g 6 9 12 18 24 36 48 54Mbps 11n Up to 300Mbps Modulation 11b CCK QPSK BPSK 11g OFDM 11n QPSK BPSK 16 QAM 64 QAM Media Access Protocol CSMA CA with ACK Data Security 62 128 b...

Page 36: ...ng directly with each other without the use of an access point Ad hoc mode is also referred to as an Independent Basic Service Set IBSS or as peer to peer mode and is useful at a departmental scale or...

Page 37: ...card It corresponds to the ESSID in the wireless Access Point and to the wireless network name See also Wireless Network Name and ESSID WEP Wired Equivalent Privacy A data privacy mechanism based on a...

Page 38: ...iB WPA300N 300M MIMO Wireless N PCI E Adapter 38 Appendix C Contact Information For any help on iBall products please contact support iballbaton com www iBallBaton com...

Reviews: