background image

AirLive WT-2000PCI User’s Manual 

 

0

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
 

WT-2000PCI 

802.11g Turbo Wireless LAN 
PCI Card 
 

User’s Manual 

Summary of Contents for WT-2000PCI

Page 1: ...AirLive WT 2000PCI User s Manual 0 WT 2000PCI 802 11g Turbo Wireless LAN PCI Card User s Manual ...

Page 2: ...mes mentioned in this manual are trademarks and or registered trademarks of their respective holders Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installat...

Page 3: ...mitter R TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite E...

Page 4: ...all the Driver and Utility 7 3 CONFIGURATION UTILITY 10 3 1 Site Survey 13 3 2 Profile 14 3 2 1Configure the Profile 15 3 2 1 1 Configuration 16 3 2 1 2 Authentication and Security 18 3 2 1 3 802 1x Setting Certification 21 3 2 1 4 802 1x Setting CA Server 23 3 3 Link Status 24 3 4 Statistics 25 3 5 Advance 25 3 6 About 28 3 7 Turbo Mode 28 3 8 WMM Function 29 4 TROUBLESHOOTING 32 ...

Page 5: ...chnologies Client users are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and government users When you use the d...

Page 6: ...0 XP Supports 32 bit PCI interface 1 2 Specifications Standard IEEE 802 11b g Interface 32 bit PCI Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Modulation OFDM with BPSK QPSK 16QAM 64QAM 11g BPSK QPSK CCK 11b Data Rate 54 48 36 24 18 12 11 9 6 5 5 2 1Mbps auto fallback Security 64 128 bit WEP Data Encryption WPA TKIP with IEEE 802 1x WPA2 AES with IEEE 802 1x Note WPA2 is ena...

Page 7: ...AirLive WT 2000PCI User s Manual 6 the following items One PCI Card One CD Driver Utility User s Manual One Quick Guide If any of the above items is missing contact your supplier as soon as possible ...

Page 8: ...rd driver utility before please uninstall the old version first 2 1 Install the Hardware A Turn off your computer and remove its cover B Insert the PCI card to an available PCI slot firmly C Secure this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Turn on the computer 2 2 Install the Driver and Utility A Found New Hardw...

Page 9: ...er s Manual 8 B Insert the Installation CD to your CD ROM Drive Execute the setup program C Click Next to process the installation if you accept the license agreement D The system starts to install the software of the card ...

Page 10: ...AirLive WT 2000PCI User s Manual 9 E The system will automatically detect the card and display Hardware Installation screen Click Install to continue F Please click Finish to complete the installation ...

Page 11: ...ty setting The Configuration Utility appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate the configuration utility z Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool z Use Zero Configuration as Configuration Utility z Se...

Page 12: ...default this Windows Zero Configuration Tool is enabled If you want to use the Utility for the card please follow one of the ways as below First Way Right click the icon in the system tray and select Use RaConfig as Configuration Utility Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced ...

Page 13: ...dows to configure my wireless network settings to enable the utility for the card Note If Wireless Zero Configuration is enabled you can only configure the advance setting or check the link status and statistics from the configuration utility of the card ...

Page 14: ...ofile list Parameter Description Available Networks This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Signal Strength Channel Encryption Authentication and Network Type If you want to connect to any networks on the list double click the item on the list and the card will automatically connect to the s...

Page 15: ... profiles and the relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting Add Delete Edit Button Click these buttons to add delete edit the selected profiles Activate Button Click Activate to connect to the selected profile When a profile is activated the ...

Page 16: ...AirLive WT 2000PCI User s Manual 15 3 2 1 Configure the Profile ...

Page 17: ...ication is done via the Access Point or Router Ad Hoc Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router TX Power If you want to lower the transmit power of the card for saving the power of the system you can select the lower percentages from the list The lower power will cause the lower signal strength and the...

Page 18: ...ted directly to the wireless network Select a setting within a range of 0 to 2347 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any packet size larger than the value will be fragmented If you have decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a...

Page 19: ...level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA PSK It is a special mode designed for home and small business users who do not ...

Page 20: ...o ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key must be u...

Page 21: ...s a wireless station on the LAN it sends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In turn the device responds with its identity and the AP relays this identity to an authentication server which is typically an external RADIUS server An example...

Page 22: ...e most secure of the EAP protocols but not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation MD5 Challenge MD5 Challenge is the easiest EAP Type It requires the wireless station to enter a set of use...

Page 23: ...s the protected user EAP Identity used for authentication The identity specified may contain up to 63 ASCII characters is case sensitive and takes the form of a Network Access Identifier consisting of name of the user user s home realm The user s home realm is optional and indicates the routing domain Password The password used for authentication It may contain up to 63 ASCII characters and is cas...

Page 24: ...uer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority Server Name Enter the authentication serv...

Page 25: ...ate of the network The maximum transmission rate is 54Mbps Throughput Kbits sec Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The higher the percentage the better the quality dBm If you want to know the signal strength in the unit of dBm select this check box Signal Strength This bar shows the signal strength level The higher percentage ...

Page 26: ...o view the statistic information of the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This option enables you to configure more advanced settings for example wireless mode protection mode and etc ...

Page 27: ...he regulation of the country B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the card will be a little lower due to many of frame traffic should be tra...

Page 28: ...the radio monitoring and fast roaming LEAP Turn on CCKM During normal operation LEAP enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication including communication with the main RADIUS server When you configure your wireless LAN for fast re association however LEAP enabled client devices roam from one access point to another without involv...

Page 29: ...he card is displayed in the screen as well 3 7 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this feature known as Turbo Mode enables higher throughput than IEEE 802 11g standard Up to 54Mbps When the card is connecting to the Routers or APs with the proprietary Tu...

Page 30: ...y of Service QoS The Wi Fi Alliance defined WMM as a profile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connected to the AP or Router with WMM function you can enable the function of the card by following the steps below A In the Desktop of the computer rig...

Page 31: ...AirLive WT 2000PCI User s Manual 30 B Right Click the Wireless Network Connection and select Properties C Click Configure D Select Advanced page enable the WMM Capable ...

Page 32: ...AirLive WT 2000PCI User s Manual 31 ...

Page 33: ...peeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is t...

Page 34: ...roducts can work with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption fu...

Page 35: ...y and security In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two m...

Reviews: