background image

Intel® PRO/Wireless 2011B LAN USB Device

User’s Guide

Summary of Contents for PRO/Wireless 2011B LAN USB Device WUD2011BSG

Page 1: ...Intel PRO Wireless 2011B LAN USB Device User s Guide ...

Page 2: ... 5 229 591 5 230 088 5 235 167 5 243 655 5 247 162 5 250 791 5 250 792 5 260 553 5 262 627 5 262 628 5 266 787 5 278 398 5 280 162 5 280 163 5 280 164 5 280 498 5 304 786 5 304 788 5 306 900 5 321 246 5 324 924 5 337 361 5 367 151 5 373 148 5 378 882 5 396 053 5 396 055 5 399 846 5 408 081 5 410 139 5 410 140 5 412 198 5 418 812 5 420 411 5 436 440 5 444 231 5 449 891 5 449 893 5 468 949 5 471 042...

Page 3: ...n combination with another keystroke angles indicates mandatory parameters in syntax brackets for command line indicates available parameters in configuration files brackets act as separators for options GUI Screen text indicates the name of a control in a GUI based application Italics indicates the first use of a term book title variable or menu title Bold indicates important user information lic...

Page 4: ...ng for certain conditions or information indicates tips or special requirements indicates conditions that can cause equipment damage or data loss indicates a potentially dangerous condition or procedure that only Intel PRO Wireless 2011B LAN USB Device trained personnel should attempt to correct or perform ...

Page 5: ...N Configuration Utility 4 2 1 Viewing the Status Icon 4 2 2 Viewing Information about the Network Connection 5 2 3 Changing Network Settings 6 2 4 Implementing Security 8 2 5 Viewing Driver and Firmware Information 9 2 6 Downloading Drivers and Firmware 9 Chapter 3 Troubleshooting 10 Chapter 4 Customer Support 12 4 1 Intel Automated Customer Support 12 4 1 1 User Guide on Your Product CD ROM 12 4 ...

Page 6: ...Contents vi Intel PRO Wireless 2011B LAN USB Device User s Guide ...

Page 7: ...end and receive information through access points When a wireless client communicates with another it transmits to the access point The access point receives the information and rebroadcasts it Then the other device receives the information Access points are strategically located within an area to provide optimal coverage for wireless clients A large WLAN uses multiple access points to provide cov...

Page 8: ...intercept the information A common way of implementing security and protecting information is encryption Before sending information the wireless client or access point encrypts or scrambles information using an encryption key The device receiving the information uses the same key to decrypt or unscramble the information The information is only readable to wireless devices that have the correct enc...

Page 9: ...l range is country dependent 1 7 Intel PRO Wireless LAN USB Software Intel PRO Wireless LAN USB software consists of the Windows device drivers for the USB Device and the Wireless LAN Configuration Utility The configuration utility allows you to evaluate device performance and display and modify the wireless LAN settings for the Intel PRO Wireless 2011B LAN USB Device Settings include the operatin...

Page 10: ...icon is not present do the following 1 Click the Windows Start menu and click Programs 2 Click the Intel PRO Wireless 2011B LAN USB software menu 3 Click the Wireless LAN Configuration Utility The following colors on the taskbar icon show the status of the wireless device Color Infrastructure mode Ad hoc mode Green Communicating successfully with an access point Connected to another wireless clien...

Page 11: ... The client is not connected to the wireless network Rescan button Click to re establish a connection with a wireless network When you click this button the wireless client is briefly disconnected from the network and begins searching for an access point with a stronger signal in the specified wireless network Current Channel Displays the channel currently used for receiving and transmitting wirel...

Page 12: ...ates that the device is communicating directly with other computers without using an access point SSID The SSID also referred to as Network Name or Network ID is the specific wireless network the device is part of Tx Rate Shows the maximum achievable data rate allowed for this location The data transmit rate is automatically negotiated between wireless clients and access points and changes dynamic...

Page 13: ...n the SSID field enter the SSID The SSID is case sensitive and must not exceed 30 characters This SSID must be the same as the SSID assigned to all other computers in your wireless network 5 Select a channel you want to use for receiving and transmitting wireless data communication Wireless clients using the same channel communicate with each other If you set the transmission rate to 1 2 5 5 or 11...

Page 14: ...settings from the Encryption WEP drop down box Disabled Data is not encrypted 64 bit All communication is encrypted with a 64 bit key 128 bit All communication is encrypted with a 128 bit key This setting gives you the best security but network performance is slightly less For security purposes the utility displays asterisks for the encryption key every time the Wireless LAN Configuration Utility ...

Page 15: ...e letters a through f Using a Virtual Private Network VPN Connection For added security use a VPN For more information consult the documentation regarding VPN software 2 5 Viewing Driver and Firmware Information The About tab allows you to view driver firmware and software versions 2 6 Downloading Drivers and Firmware To download the latest drivers and firmware for this product go to the Intel sup...

Page 16: ...esource conflict could exist Use the Device Manager to resolve resource conflicts Select the System applet from the Control Panel Select the Device Manager tab Network drive mappings disappear when the laptop suspends or the device is removed then reinserted Windows 98 does not restore network drive mappings under these conditions Log out and log in again or restart the computer to restore the con...

Page 17: ...u are connecting directly to other wireless computers select Ad Hoc Network Name SSID Type the same name used by other wireless devices on your network For information about these settings click the Help button 4 If you use encryption to protect your wireless network click the Encryption tab and type settings that match the other wireless devices on your network 5 Click OK and restart your compute...

Page 18: ...ser Guide button to view the guide Note that a web browser is required to view the guide 4 1 2 Web and Internet Sites Support http support intel com Network Products http www intel com network Corporate http www intel com Newsgroups news cs intel com FTP Host ftp download intel com FTP Directory support network device 4 1 3 Customer Support Technicians U S and Canada For customer support please ca...

Page 19: ...terms in addition to those set out here as set out in a license accompanying those portions OWNERSHIP OF SOFTWARE AND COPYRIGHTS Title to all copies of the Software remains with Intel or its suppliers The Software is copyrighted and protected by the laws of the United States and other countries and international treaty provisions You may not remove any copyright notices from the Software Intel may...

Page 20: ...on termination you will immediately destroy the Software or return all copies of the Software to Intel APPLICABLE LAWS Claims arising under this Agreement shall be governed by the laws of California excluding its principles of conflict of laws and the United Nations Convention on Contracts for the Sale of Goods You may not export the Software in violation of applicable export laws and regulations ...

Page 21: ...chased it or to Intel North America only If you ship the hardware product you must assume the risk of damage or loss in transit You must use the original container or the equivalent and pay the shipping charge Intel may replace or repair the hardware product with either new or remanufactured product or parts and the returned hardware product becomes Intel s property Repaired or replaced products w...

Page 22: ...trol Applications Intel specifically disclaims liability for use of the hardware product in critical control applications including for example only safety or health care control systems nuclear energy control systems or air or ground traffic control systems by you or your customers and such use is entirely at the user s risk You agree to defend indemnify and hold Intel harmless from and against a...

Page 23: ... interference and 2 this device must accept any interference received including interference that may cause undesired operation Any changes or modificaitons made by the user that are not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment Radio Frequency Interference Requirements European Union CE Marking European Union Compliance CE ...

Page 24: ...éò ôçò ÅõñùðáúêÞò Ïäçãéáò 1999 5 EC Icelandic Þessi vara stenst reglugerð Evrópska Efnahags Bandalagsins númer 1999 5 EC Italian Questo prodotto è conforme alla Direttiva Europea 1999 5 EC Norwegian Dette produktet er i henhold til bestemmelsene i det europeiske direktivet 1999 5 EC Portuguese Este produto cumpre com as normas da Diretiva Européia 1999 5 EC Spanish Este producto cumple con las nor...

Page 25: ...ecurity 8 infrastructure 7 Intel PRO Wireless LAN radio basics 2 L license agreement 13 link quality 6 N network name 6 P product registration 16 R radio basics 2 digital data 3 electromagnetic waves 2 radio links 2 regulatory compliance 17 rescanning 5 restoring defaults 7 S security decryption 2 WEP algorithm 2 selecting a channel 6 signal strength 6 SSID 6 state 5 status icon 4 status informati...

Page 26: ...Index 20 Intel PRO Wireless 2011B LAN USB Device User s Guide ...

Reviews: