background image

 

 

- 3 - 

2 Installation  

Before you proceed with the installation, please read the following notes carefully.

 

Note1: Please do not install SP907GK into your laptop computer before installing the 

software program from the CD. 

Note2: The following installation was performed under Windows XP.  (Procedures are 

similar for Windows 98SE/Me/2000.) 

Note3: If you have installed the Micronet Wireless LAN Adapter driver & utility before, 

please uninstall the old version first. 

Step1

.    Insert the Installation CD to your CD-ROM Drive. Execute the “

setup

” program.

                 

(SP907GK/Utility and Driver/setup.exe) 

 

Step2.  

The language-selecting window pops up. Please select the language you use 

and click 

OK

 

Step3. 

  The welcome window pops up. Click the “

Next

” button to proceed

Summary of Contents for SP907GK

Page 1: ...User s Manual Wireless LAN USB Adapter Model No SP907GK http www micronet info...

Page 2: ...S LAN UTILITY 11 4 1 STARTING THE WIRELESS LAN UTILITY 11 4 1 1 GENERAL 11 4 1 2 PROFILE 12 4 1 3 CONFIGURE THE PROFILE 13 4 1 3 1 BASE CONFIGURATION 13 4 1 3 2 WIRELESS NETWORK SECURITY 14 4 1 3 3 80...

Page 3: ...preferred networks that users usually connected with Security encryption can also be configured by this utility For WLAN security issues SP907GK supports 64 128 bit WEP data encryption that protects...

Page 4: ...02 1x and AES functions Range Coverage Indoor 35 100 meters Outdoor 100 300 meters Compliant with FCC Part 15 247 for US ETS 300 328 for Europe Support driver for Windows 98se Me 2000 and XP Supports...

Page 5: ...nder Windows XP Procedures are similar for Windows 98SE Me 2000 Note3 If you have installed the Micronet Wireless LAN Adapter driver utility before please uninstall the old version first Step1 Insert...

Page 6: ...on installation Please click the Contiune Anyway to continue Step6 If you are using Windows 98se or ME the system may ask for the driver CD Please click the Browse button Select your CD ROM Drive then...

Page 7: ...are using Windows 98se or ME please restart the system first before connect this wireless adapter to your computer Step9 The Found New Hardware Wizard pops up Note This wizard won t pop up in Windows...

Page 8: ...Install the software automatically and click the Next button Step12 Please wait while installing the driver The Windows logo testing warning window may pops up again Please click the Continue Anyway b...

Page 9: ...7 Step13 Click the Finish button after driver installation...

Page 10: ...guration Service 1 Double click the icon on your desktop to start the utility 2 Make sure that the Windows Zero Config checkbox is unchecked 3 1 Ad Hoc Mode An Ad Hoc mode wireless network connects tw...

Page 11: ...o configure the encryption settings in this profile to be corresponding to the other wireless adapter Please click on the Network Authentication drop list to select an authentication method and then s...

Page 12: ...an open wireless network If you are going to connect to an AP with security protection you will have to configure the encryption settings in this profile to be corresponding to your AP Please click on...

Page 13: ...wer right corner of the windows desktop You may also uncheck it to remove the utility icon from system tray Windows Zero Config Uncheck this checkbox to use native Windows XP wireless support Wireless...

Page 14: ...rent IP addresses settings for this adapter 4 1 2 Profile The Profile tab lists the preferred connections You can click the buttons beside to do configure each connection It allows you to manage the n...

Page 15: ...gnizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of...

Page 16: ...cted and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging the existing authentication d...

Page 17: ...security and authenticity for digital information and is the most advanced solution defined by IEEE 802 11i for security in the wireless network Note All devices in the network should use the same en...

Page 18: ...an EAP Request for the user s identity to the device EAP the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In t...

Page 19: ...Challenge is the easiest EAP Type It requires the wireless station to enter a set of user name and password as the identity to RADIUS Server Session Resumption Select from Disabled Reauthentication R...

Page 20: ...ority it places the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordi...

Page 21: ...n change the connection to another AP or add one of the APs to your own profile list Refresh Click this button to rescan available networks around the adapter Add to Profile To add an available Networ...

Page 22: ...mented and transmitted Select the size from 256 to 2432 default bytes RTS Threshold Select the RTS Threshold form 0 to 2432 default Wireless Mode 802 11g b Connect to a 802 11b g network 2 4GHz 54Mbps...

Page 23: ...1 4 1 6 Status This tab shows the current connection status of this adapter 4 1 7 Statistics See this tab to show the transmission activity record Clicking the Reset button recounts the values from ze...

Page 24: ...gurations to this AP Association Table Shows the information of those devices that associated with this AP including their MAC addresses and the time that they connected with this device 4 2 2 Advance...

Page 25: ...23 4 2 3 Statistics See this tab to show the transmission activity record Clicking the Reset button recounts the values from zero...

Page 26: ...his page allows users to select the adapter for connect to public network Please click on the device that are used for connecting to public network and click the Select button and then click the Apply...

Page 27: ...d 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS...

Page 28: ...ware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On t...

Page 29: ...In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver...

Page 30: ...FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may...

Page 31: ...EC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it...

Reviews: