background image

 

 

 

 

 

 

802.11n/b/g WLAN 

Module 

WM5504 

 

 

User’s Manual 

Summary of Contents for WM5504

Page 1: ...802 11n b g WLAN Module WM5504 User s Manual...

Page 2: ...erference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit diffe...

Page 3: ...end user has to be informed that the FCC radio frequency exposure guidelines for an uncontrolled environment can be satisfied The end user has to also be informed that any changes or modifications no...

Page 4: ...laraci n de exposici n a la radiaci n de Canada Este equipo cumple con los l mites de exposici n a la radiaci n de la IC establecidos para un ambiente no controlado Este equipo se debe instalar y oper...

Page 5: ...7 Verification 7 FOR WINDOWS 7 8 Install Software 8 Install Hardware 10 Verification 10 CHAPTER 3 NETWORK CONNECTION 11 HOW TO MAKE A CONNECTION 11 HOW TO ADD A PROFILE 13 CHAPTER 4 UTILITY CONFIGURA...

Page 6: ...CHAPTER 5 UNINSTALL 59 FOR WINDOWS 2000 XP 59 FOR WINDOWS VISTA 61 FOR WINDOWS 7 63...

Page 7: ...e best convenience in narrow or crowded space for it s ultra micro size WM5504 is expected to be able to reach 150Mbps which is relatively lower than normal but still far more than sufficient to recei...

Page 8: ...grams Insert the included Installation CD into the computer The CD ROM will run automatically Please click Next to process the installation 2 When prompt to the following message please click Install...

Page 9: ...3 3 When the following screen appears click Finish to restart the computer to complete the software installation...

Page 10: ...the computer The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel System Hardware Device Manager Expand the Netwo...

Page 11: ...the Wireless USB Adapter into the computer until the InstallShield Wizard finished installing 1 Exit all Windows programs Insert the included Installation CD into the computer The CD ROM will run aut...

Page 12: ...6 2 When prompt to the following message please click Install to begin the installation 3 When the following screen appears click Finish to restart the computer to complete the software installation...

Page 13: ...he computer The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel Hardware and Sound Device Manager Expand the Net...

Page 14: ...he Wireless USB Adapter into the computer until the InstallShield Wizard finished installing 1 Exit all Windows programs Insert the included Installation CD into the computer The CD ROM will run autom...

Page 15: ...9 2 When prompt to the following message please click Install to begin the installation 3 When the following screen appears click Finish to restart the computer to complete the software installation...

Page 16: ...Port of the computer The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel Device Manager Expand the Network adap...

Page 17: ...Windows XP OS for example Step 1 After set up the Wireless USB Adapter successfully please launch the Configuration Utility There are two ways to launch the utility by 1 Double clicking the Intellige...

Page 18: ...tomatically scan access points nearby or click Refresh button to site survey again Step 3 Then double click preferred access point or click Add to Profile button to make a connection if the access poi...

Page 19: ...nt please click Add to Profile button to enter Wireless Network Properties windows If the access point has been set up security please enter passwords and then click OK to save profile settings After...

Page 20: ...P Station Mode Show Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click...

Page 21: ...se Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected access point network name Signal Strength Shows...

Page 22: ...ate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a distinctive name of profile in this colu...

Page 23: ...em Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Shared Key and WEP 802 1X authentication mode the selection of encryption type is WEP For WPA PSK W...

Page 24: ...only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server PEAP ca...

Page 25: ...of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None and TKIP AES Network Authentication Show th...

Page 26: ...to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it into the profile list Note Double click on item t...

Page 27: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...

Page 28: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...

Page 29: ...displays the information of the Wireless USB Adapter Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the Wireless USB Adapter a...

Page 30: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...

Page 31: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...

Page 32: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...

Page 33: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...

Page 34: ...28 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...

Page 35: ...ow Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click to leave the Int...

Page 36: ...in use Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected access point network name Signal Strength S...

Page 37: ...ctivate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a distinctive name of profile in this...

Page 38: ...curity Network Authentication There are several types of authentication modes including Open System Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Sh...

Page 39: ...ient and network through an encrypted channel Unlike EAP TLS EAP TTLS requires only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data...

Page 40: ...e Network Tab SSID Shows the network name of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None a...

Page 41: ...ireless mode Refresh Click Refresh button to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it into the...

Page 42: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...

Page 43: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...

Page 44: ...displays the information of the Wireless USB Adapter Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the Wireless USB Adapter a...

Page 45: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...

Page 46: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...

Page 47: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...

Page 48: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...

Page 49: ...43 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...

Page 50: ...Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click to leave the Intel...

Page 51: ...and receiving rate Type Network type in use Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected acces...

Page 52: ...sers may save multiple profiles and activate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a...

Page 53: ...curity Network Authentication There are several types of authentication modes including Open System Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Sh...

Page 54: ...ient and network through an encrypted channel Unlike EAP TLS EAP TTLS requires only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data...

Page 55: ...e Network Tab SSID Shows the network name of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None a...

Page 56: ...ireless mode Refresh Click Refresh button to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it into the...

Page 57: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...

Page 58: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...

Page 59: ...displays the information of the Wireless USB Adapter Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the Wireless USB Adapter a...

Page 60: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...

Page 61: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...

Page 62: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...

Page 63: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...

Page 64: ...58 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...

Page 65: ...l For Windows 2000 XP To remove the utility and driver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start All Programs Intelligent Wireless Utility...

Page 66: ...60 2 Click Yes to completely remove the selected application and all of its features 3 Then click Finish to complete uninstall...

Page 67: ...ver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start Programs Intelligent Wireless LAN Utility Uninstall Intelligent 2 Click Yes to complete remov...

Page 68: ...62 3 Finally click Finish to complete uninstall...

Page 69: ...Windows 7 To remove the utility and driver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start Programs Intelligent Wireless Utility Uninstall Intel...

Page 70: ...64 2 Click Yes to complete remove the selected application and all of its features 3 Finally click Finish to complete uninstall...

Reviews: