Wistron NeWeb DNUA-93S User Manual Download Page 4

 

This device is intended only for OEM integrators under the following conditions: 

1)

 

The antenna must be installed such that 20 cm is maintained between the antenna and users, 

and   

2)

 

The transmitter module may not be co-located with any other transmitter or antenna,   

3)

 

For all products market in US, OEM has to limit the operation channels in CH1 to CH11 for 

2.4G band by supplied firmware programming tool. OEM shall not supply any tool or info to the 

end-user regarding to Regulatory Domain change. 

As long as 3 conditions above are met, further transmitter test will not be required. However, the 

OEM integrator is still responsible for testing their end-product for any additional compliance 

requirements required with this module installed 

 

IMPORTANT NOTE: In the event that these conditions can not be met (for example certain 

laptop configurations or co-location with another transmitter), then the FCC authorization is no 

longer considered valid and the FCC ID can not be used on the final product. In these 

circumstances, the OEM integrator will be responsible for re-evaluating the end product 

(including the transmitter) and obtaining a separate FCC authorization. 

End Product Labeling 

This transmitter module is authorized only for use in device where the antenna may be installed 

such that 20 cm may be maintained between the antenna and users. The final end product must be 

labeled in a visible area with the following: “Contains FCC ID: NKR-DNUA93S”. 

Manual Information To the End User 

The OEM integrator has to be aware not to provide information to the end user regarding how to 

install or remove this RF module in the user’s manual of the end product which integrates this 

module. 

The end user manual shall include all required regulatory information/warning as show in this 

manual. 

 

 

 

Summary of Contents for DNUA-93S

Page 1: ...WLAN 802 11 b g n USB module DNUA 93S User Manual June 2011...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...uipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caut...

Page 4: ...an not be met for example certain laptop configurations or co location with another transmitter then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final pro...

Page 5: ...5 2 DRIVER UTILITY INSTALLATION UNINSTALLATION 5 3 CONNECTING TO AN EXISTING NETWORK 5 4 MODIFYING A WIRELESS NETWORK 6 4 1 MODIFYING GENERAL SETTINGS 6 4 2 MODIFYING SECURITY SETTINGS 7 5 SPECIFICATI...

Page 6: ...ts network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your TV to access the network configuration settings page 2 Select...

Page 7: ...ork profile This name must be unique Profile names are not case sensitive Client Name Client Name Client Name Client Name Identifies the client machine Use this profile for Use this profile for Use th...

Page 8: ...ons include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2 Passp...

Page 9: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 10: ...483GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operat...

Page 11: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Page 12: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: