background image

 

 

 

Protocol 

A protocol is a standardized set of rules that specify how a conversation 

is to take place, including the format, timing, sequencing and/ or error 

checking. 

Roaming 

In an infrastructure network, this is when a wireless PC moves out of 

range of the previously connected access point and connects to a newly 

connected access point. Throughout the network environment where 

access point is deployed, PCs can always be connected regardless of 

where they are located or roam. 

SSID 

A Network ID unique to a network. Only clients and Access Points that 

share the same SSID are able to communicate with each other. This string 

is case-sensitive. 

Simple Network Management Protocol (SNMP) 

Simple Network Management Protocol is the network management protocol 

of TCP/IP. In SNMP, agents-which can be hardware as well as software- 

monitor the activity in the various devices on the network and 

report to the network console workstation. Control information about 

each device is maintained in a structure known as a management information 

block. 

Static IP Addressing 

A method of assigning IP addresses to clients on the network. In networks 

with Static IP address, the network administrator manually assigns an IP 

address to each computer. Once a Static IP address is assigned, a computer 

uses the same IP address every time it reboots and logs on to the 

network, unless it is manually changed. 

Temporal Key Integrity Protocol (TKIP) 

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the 

IEEE 802.11i encryption standard for wireless LANs. TKIP is the next 

generation of WEP, the Wired Equivalency Protocol, which is used to 

secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a 

message integrity check and a re-keying mechanism, thus fixing the 

flaws of WEP. 

 

 

 

 

 

 

 

 

 

 

 

 25 

Summary of Contents for 802.11b+g Wireless

Page 1: ...802 11b g Wireless USB Adapter User s Manual www unicomlink com...

Page 2: ...ection Setting 8 5 2 WEP Encryption Key Setting 9 5 3 WPA Encryption Setting 10 5 4 Profile 11 5 5 Advanced Setting 12 5 6 System Information 13 6 Wireless Network Configuration in AP Mode 14 6 1 Gene...

Page 3: ...relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Cons...

Page 4: ...evice must accept any interference that may cause undesired operation Europe R TTE Directive This device complies with the specifications listed below EN 300 328 V1 6 1 2004 11 EN 301 489 1 V1 4 1 200...

Page 5: ...ating distance of up to 200 meters in free space 54 48 36 24 18 12 11 9 6 5 5 2 1 Mbps selectable Data Rate Support USB 2 0 interface 64 bit 128 bit or 256 bit WEP Wired Equivalent Privacy WPA Wi Fi P...

Page 6: ...DAPTER TO PC Quick Start Guide Connect your WLAN USB dongle to your PC Install driver GETTING TO KNOW WIRELESS LAN USB ADAPTER LED LED turns on when POWER is applied to the WLAN Mini USB Adapter LED i...

Page 7: ...o the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructure...

Page 8: ...entified by a unique network address There are two methods to assign a network address to a computer on a TCP IP network Static IP addressing Dynamic IP addressing DHCP In network with static IP addre...

Page 9: ...utorun installation program after you insert the disk into your CD drive Step 1 Insert the installation driver DC into your CD ROM Step 2 Click Next to continue Step 3 Click Next to install at the des...

Page 10: ...shes the installation Step 5 Click Finish to complete installation Step 6 After finished install driver and utility on your system plug the USB adapter into the USB port of your PC Windows XP 2000 wil...

Page 11: ...ayed The Link Quality and Signal Strength bar chart is only active when the node is in Infrastructure Mode The bar graph displays the quality and strength of the link between the node and its Access P...

Page 12: ...and other setting Through this control panel you will be able to access the corporate wireless LAN or hot spots such as hotel airport and conference hall Click Change to start input of settings The se...

Page 13: ...P to enable the encryption For more WEP key setting Click WEP Encryption Key Setting Three authentication modes are available Open System Shared Key and Auto The Open System uses default key to authen...

Page 14: ...a rekeying mechanism WPA Pre Shared Key WPA PSK is a simplified but still powerful form of WPA most suitable for home Wi Fi networking To use WPA PSK a person sets a static key or passphrase as with W...

Page 15: ...Each profile represents specific settings of the USB adapter You can set the settings for each profile Next time when you want to change the USB adapter settings you can just select the profile you wa...

Page 16: ...Advanced Setting to select power consumption setting that has 3 different modes In this panel you can select different user interface and country roaming It also allows you to set the threshold of fr...

Page 17: ...5 6 SYSTEM INFORMATION Click Information and the pop up window will show the Driver Version Utility Version MAC address of this USB adapter and so on 13...

Page 18: ...Double click on that icon and the configuration window will pop up as shown below If you need to set your WLAN USB Adapter as an Access Point you can change the configuration mode to Access Point on t...

Page 19: ...6 1 GENERAL CONNECTION SETTING In this panel click Change to set the Wireless Mode Channel SSID and Tx Power When settings are input click Apply to confirm changes of them 15...

Page 20: ...by using WEP Wired Equivalent Privacy encryption Set Authentication to Shared Key and WEP to Enable For more WEP key setting Click Setting button 6 3 OTHER SETTING You can set the threshold of fragme...

Page 21: ...ram after you insert the disk into your CD drive Please refer to page 5 INSTALL DRIVER UTILITY 2 To install manually Plug your USB dongle into USB interface windows Vista will search for compatible dr...

Page 22: ...ROM and click next to continue installation Step 3 Windows Vista search for the software and it will be installed successfully Step 4 After installation right click the network icon on the Windows Vis...

Page 23: ...Step 5 Select a network to connect to and click Connect Step 6 Click Connect Anyway if the network is an unsecured network Step 7 USB Dongle successfully connected to network Click Close 19...

Page 24: ...Note In Win2000 XP XP x64 the Device name is ZD1211 IEEE 802 11b g USB Adapter In Windows Vista the Device name is Atheros AR5007UG Wireless Network Adapter 20...

Page 25: ...y Operating at 54Mbps 70dBm Operating Range Up to 200 m depending on surrounding environment Security 64 bit 128 bit or 256 bit WEP Wired Equivalent Privacy WPA Wi Fi Protected Access WPA2 I O Interfa...

Page 26: ...ray Remedy Make sure that you have installed the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is...

Page 27: ...server dynamically to clients on the network DHCP is used for Dynamic IP Addressing and requires a dedicated DHCP server on the network Direct Sequence Spread Spectrum This is the method the wireless...

Page 28: ...kers ISM Band The FCC and their counterparts outside of the U S have set aside bandwidth for unlicensed use in the so called ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4...

Page 29: ...n be hardware as well as software monitor the activity in the various devices on the network and report to the network console workstation Control information about each device is maintained in a stru...

Page 30: ...interoperability The organization is formerly known as WECA Wi Fi Protected Access WPA The Wi Fi Alliance put together WPA as a data encryption method for 802 11 wireless LANs WPA is an industry supp...

Page 31: ...cy RF and infrared are the commonly used types of wireless transmission Most wireless LANs use spread spectrum technology It offers limited bandwidth usually under 11Mbps and users share the bandwidth...

Page 32: ...IMPORTANT This warranty will be voided if the device is tampered with improperly serviced or the security seals are broken or removed 28...

Reviews: