background image

Chapter 4 Troubleshooting 

This section provides solutions to problems usually encountered during the installation and operation 
of the USB adapter. Read the description below to diffuse your doubts. 
 

What is the IEEE 802.11g standard?   
         

802.11g is the latest IEEE standard for high-speed WLAN communications that provides up to 
54Mbps data rate in the 2.4GHZ band. It has become the mainstream technology of current 
WLAN networks. It uses OFDM modulation to reach higher data transmission rate and 
backward compatible with 802.11b 

What is the IEEE 802.11b standard? 

The IEEE 802.11b WLAN standard subcommittee, which formulates a standard for the industry. 
The objective is to enable WLAN hardware from different manufacturers to interoperate. 

What features does the IEEE 802.11 standard provide? 

The product supports the following IEEE 802.11 functions: 

‧ 

CSMA/CA plus Acknowledge protocol 

‧ 

Multi-Channel Roaming 

‧ 

Automatic Rate Selection 

‧ 

RTS/CTS feature 

‧ 

Fragmentation 

‧ 

Power Management 

What is Ad-hoc? 

An Ad-hoc mode is a wireless network type in which a group of computers equipped with 
wireless adapters are connected as an independent wireless LAN without any access point. All 
computers operating in this mode must be configured to share the same radio channel and 
SSID. 

What is Infrastructure? 

The difference between Infrastructure network and Ad-hoc network is that the former requires 
an Access point. The Infrastructure mode is appropriate for enterprise-scale wireless access to 
a central database or provides various wireless applications for mobile users. 

What is BSS ID? 

An Infrastructure network is called a Basic Service Set (BSS). All the wireless stations in a BSS 
must share the same BSS ID. 

What is TKIP? 

It is another encryption method to overcome the inherent weaknesses of WEP, a next 
generation of WEP. It adopts new algorithm (Michael) to generate 128/192-bit encryption keys 
and provides per-packet key mixing, a message integrity check and a re-keying mechanism. 

What is AES? 

         

AES (Advanced Encryption Standard) is a chip-based encryption method of new generation 
and has been incorporated into the newly-approved security standard 802.11i. It supports 128, 
192 and 256-bit encryption key length and adopts Rijndael algorithm. It is widely believed it is 
impossible to crack AES. 

What is DSSS?    What is FHSS?    And what are their differences? 

Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes 
frequency in a pattern that is known to both transmitters and receivers. Properly synchronized, 
the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears 
to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a 
redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping 
code). The longer the chip is, the greater the probability that the original data can be recovered. 
Even if one or more bits in the chip are damaged during transmission, statistical techniques 
embedded in the radio can recover the original data without-the need for retransmission. To an 
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by 
most narrowband receivers. 

What is Spread Spectrum?

 

Spread Spectrum technology is a wideband radio frequency technique developed by the 

 

30

Summary of Contents for WL-U357

Page 1: ...54 108Mbps Super G Wireless LAN USB Adapter WL U357 User s Manual 1...

Page 2: ...mits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment...

Page 3: ...inches during normal operation Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric...

Page 4: ...RE 5 2 1 Configuration Utility Driver Installation 5 CHAPTER 3 CONFIGURATION UTILITY 11 3 1 Current Status 11 3 2 Profile Management 15 3 2 1 Add a Profile 15 3 2 2 Modify a Profile 25 3 2 3 Remove a...

Page 5: ...port of 64 128 152 bit WEP encryption and WPA Wi Fi Protected Access high level encryption Support of Ad Hoc Infrastructure mode Support of most popular operating systems including Windows 98SE ME 200...

Page 6: ...wireless network type in which a group of computers equipped with WL U357 or other wireless adapters are connected together to form an independent wireless LAN All computers operating in this mode mu...

Page 7: ...d of easy to install and wide coverage networking 1 3 Specification Attached Interface USB 2 0 A type connector Operating Frequency Channel 2 412 2 462GHz FCC Canada 11 Channels 2 412 2 472GHz ETSI Eu...

Page 8: ...tem with one vacancy USB 1 1 2 0 port CD ROM drive Windows 98SE 2000 ME XP Operating System At least 5MBytes of free disk space for utility and driver installation 1 6 Installation Considerations Bewa...

Page 9: ...ws 98SE ME 2000 Note 1 If you had ever installed the other Wireless Cards before please uninstall the existed drivers and utilities first Note 2 Please install the configuration utility before insert...

Page 10: ...tart at the taskbar Then select Run and type E Utility to access the folder where E is your CD ROM drive Execute the appropriate utility for your operating system C Select I accept the terms of the li...

Page 11: ...commended and click Next button to continue E Click Yes button to continue F You can click Browse to specify the Destination Folder that you want to install the configuration utility Or you can keep t...

Page 12: ...G Select the program folder you want to install this utility to Or you can keep the default setting and click Next to continue 8...

Page 13: ...H Click Next to continue I It is recommended to select PLANET WL U357 Utility and Supplicant option If Third Party Supplicant is selected some functions may not work normally Click Next to continue 9...

Page 14: ...J Insert WL U357 when the dialog box pops up Click OK to continue K Click Continue Anyway to continue L Select OK to restart your computer right away 10...

Page 15: ...ility tool Open PLANET WL U357 Utility It enables you to open the configuration utility tool Preferences Select what you want to appear on the popup menu Disable Radio Disable RF signals Select Profil...

Page 16: ...rk the station is connected to The options include Infrastructure access point and Ad Hoc Current Channel Shows the currently connected channel Server Based Authentication Shows whether server based a...

Page 17: ...ent Power Level Displays the transmit power level rate in mW Available Power Levels Shows the 802 11b g available power levels Current Signal Strength Shows the current signal strength in dBm Current...

Page 18: ...le the utility icon in the system tray Exit Select this to close the configuration utility tool Options Select the display units of the Signal strength or Data Help PLANET WL U357 Utility Help display...

Page 19: ...General tab Please note that the WL U357 utility only allows the creation of 16 configuration profiles After the creation of 16 profiles clicking the New button displays an error message 3 2 1 1 Gene...

Page 20: ...acters WL U357 can configure up to three SSIDs SSID1 SSID2 and SSID3 3 2 1 2 Security Tab This section describes the security settings of the PLANET WL U357 Utility WPA 802 1x Setting Using EAP TLS Se...

Page 21: ...ity from the list The server domain name and the login name are filled in automatically from the certificate information Click OK 5 Activate the profile Using EAP TTLS Security To use EAP TTLS securit...

Page 22: ...thority listed in the Network Certificate Authority drop down list recommended o Enter the domain name of the server from which the client will accept a certificate o Change the login name if needed 7...

Page 23: ...any server with a certificate signed by the authority listed in the Network Certificate Authority drop down list recommended o Enter the domain name of the server from which the client will accept a...

Page 24: ...the domain name of the server from which the client will accept a certificate o The login name used for PEAP tunnel authentication fills in automatically as PEAP xxxxxxxxxxxx where xxxxxxxxxxxx is th...

Page 25: ...omain name o Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server default o OR Enter a specific domain name 6 If desired ch...

Page 26: ...figure button 3 Fill in the WPA Passphrase 4 Click OK Pre Shared Key setting 1 Click the Define Pre Shared Keys radio button on the Security tab 2 Click on Configure button 3 Fill in the fields in the...

Page 27: ...enter 10 digits for hexadecimal 5 ASCII characters o 128 bit enter 26 digits for hexadecimal 13 digits for ASCII o 152 bit enter 32 digits hexadecimal 16 digits for ASCII Overwriting an Existing Stat...

Page 28: ...o power save mode after retrieving the packets Off turns power saving off thus powering up the wireless adapter continuously for a short message response time Network Type Specifies the network as eit...

Page 29: ...tication regardless of its WEP settings It will only associate with the access point if the WEP keys on both the adapter and the access point match Shared only allows the adapter to associate with acc...

Page 30: ...the profiles list 3 2 6 Export a Profile 1 From the Profile Management tab highlight the profile to export 2 Click the Export button The Export Profile window appears 3 Browse to the directory to expo...

Page 31: ...ted Profiles box Ordering the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up or Move Down as appropriate The first profile in the Auto Selected Profiles...

Page 32: ...ransmitted and received Unicast frames transmitted and received Total bytes transmitted and received Click the Adapter Information button for more general information about the WL U357 and its driver...

Page 33: ...Data rate mismatches Authentication time out Authentication rejects the number of AP authentication failures received by the wireless network adapter Association time out Association rejects the numb...

Page 34: ...users What is BSS ID An Infrastructure network is called a Basic Service Set BSS All the wireless stations in a BSS must share the same BSS ID What is TKIP It is another encryption method to overcome...

Page 35: ...narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broa...

Reviews: