background image

 

list. 

Parameter Description 

PSM (Power Saving Mode) 

The power saving function is only available when the network type 

is in Infrastructure. 

CAM (Constantly Awake Mode)

 – The adapter will always set in 

active mode. 

 

PSM (Power Saving Mode)

 – Enable the adapter in the power 

saving mode when it is idle.

 

 

 

Network Type 

Infrastructure

 – This operation mode requires the presence of an 

802.11 Access Point. All communication is done via the Access 

Point or Router.   

 

Ad-Hoc

 – Select this mode if you want to connect to other 

wireless stations in the Wireless LAN network without through an 

Access Point or Router. 

 

 

TX Power 

If you want to lower the transmit power of the adapter for saving 

the power of the system, you can select the lower percentages 

from the list. The lower power will cause the lower signal strength 

and the coverage range. 

 

 

Ad Hoc Wireless Mode 

When the adapter is set in Ad Hoc (Peer to Peer Mode), you can 

designate the wireless connection mode for the Ad Hoc network.

802.11 B only

 – This adapter can be compatible with both 

802.11g and 802.11b wireless stations. If there are only 802.11b 

wireless stations in the network, you can set the adapter to this 

mode. 

 

802.11 B/G mix

 – If you have a mix of 802.11b and 802.11g 

wireless stations in your network, it is recommended to setting the 

adapter to this mode. This mode is also the default setting. 

 

802.11 G only

 – This adapter can be compatible with both 

802.11g and 802.11b wireless stations. If there are only 802.11g 

wireless stations in the network, you can set the adapter to this 

mode. 

 

 

Preamble 

The preamble defines the length of the CRC block for 

communication among wireless devices. This option is only active 

in the Ad Hoc network. 

 

There are two modes including Auto and Long Preamble. If 

“Auto“ mode is selected, the adapter will auto switch the preamble 

mode depending on the wireless devices the adapter is 

12

 

Summary of Contents for SP906GK

Page 1: ...User s Manual Wireless LAN PCI Adapter Model No SP906GK http www micronet info...

Page 2: ...Utility 4 3 CONFIGURATION UTILITY 7 3 1 Site Survey 9 3 2 Profile 10 3 2 1Configure the Profile 11 3 2 1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification...

Page 3: ...ers are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this adapter supports...

Page 4: ...E Me 2000 XP Supports 32 bit PCI interface 1 2 Specifications Standard IEEE 802 11b g Interface 32 bit PCI Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Modulation OFDM with BPSK...

Page 5: ...lease check the items of your package The package should include the following items Wireless LAN PCI Adapter Quick installation guide Driver and Manual CD Detachable Antenna If any of the above items...

Page 6: ...lease uninstall the old version completely first I Install the Hardware A Turn off your computer and remove its cover B Insert the PCI adapter to an available PCI slot firmly C Secure this adapter to...

Page 7: ...rt the supplied CD to your CD ROM Drive Execute the Setup exe program C Click Yes to process the installation if you accept the license agreement D The system starts to install the software of the ada...

Page 8: ...E The system will automatically detect the adapter and display Hardware Installation screen Click Continue Anyway to continue F Please click Finish to complete the installation 6...

Page 9: ...ation Utility appears as an icon on the system tray of Windows while the adapter is running You can open the utility by double click on the icon Right click the icon there are some items for you to op...

Page 10: ...e the Utility for the adapter please follow one of the ways as below First Way Right click the icon in the system tray and select Use RaConfig as Configuration Utility Second Way A Right click the ico...

Page 11: ...ou open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your adapter and automatically connect to the wireless dev...

Page 12: ...works on the list double click the item on the list and the adapter will automatically connect to the selected network Rescan Button Click Rescan button to collect the new information of all the wirel...

Page 13: ...activated the adapter will be initially connected to the profile 3 2 1 Configure the Profile 3 2 1 1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to ide...

Page 14: ...reless Mode When the adapter is set in Ad Hoc Peer to Peer Mode you can designate the wireless connection mode for the Ad Hoc network 802 11 B only This adapter can be compatible with both 802 11g and...

Page 15: ...d this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change...

Page 16: ...ucture WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters th...

Page 17: ...evices in the network should use the same encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key mu...

Page 18: ...otocol PPP support as many internet service providers and enterprises do When an AP acting as an authenticator detects a wireless station on the LAN it sends an EAP Request for the user s identity to...

Page 19: ...PEAP specifies that an EAP compliant authentication protocol must be used this adapter supports EAP MSCHAP v2 EAP TLS Smart adapter and Generic Token Adapter The client certificate is optional require...

Page 20: ...ntication type is PEAP or TTLS select a protocol to be used to build the encrypted tunnel Identity This is the protected user EAP Identity used for authentication The identity specified may contain up...

Page 21: ...e which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if...

Page 22: ...eception rate of the network The maximum transmission rate is 54Mbps Throughput Kbits sec Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The...

Page 23: ...evel in the wireless environment 3 4 Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the count...

Page 24: ...mpatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you can set the adapter to this mode Select Your Country Region Code The available c...

Page 25: ...adapter to deliver the better throughput in the same period and environment Parameter Description Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connecti...

Page 26: ...plications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the radio monitoring through the associated CCX compliant clients to continuously monitor the WLAN radio environ...

Page 27: ...nction In addition to the Turbo Mode this adapter also supports WMM function When you use the devices such as Voice over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Qua...

Page 28: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 26...

Page 29: ...D Select Advanced page enable the WMM Capable 27...

Page 30: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 31: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 32: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: