background image

 
 
 
 
 
 
 
 
 
 
 
 

W

W

i

i

r

r

e

e

l

l

e

e

s

s

s

s

 

 

L

L

A

A

N

N

 

 

C

C

a

a

r

r

d

d

b

b

u

u

s

s

 

 

A

A

d

d

a

a

p

p

t

t

e

e

r

r

 

 

 
 
 
 
 
 

User Manual

 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Version: 3.0 

(June, 2003) 

 
 

                                                            

 

Summary of Contents for WE320

Page 1: ...W Wi ir re el le es ss s L LA AN N C Ca ar rd db bu us s A Ad da ap pt te er r User Manual Version 3 0 June 2003 ...

Page 2: ...warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Furth...

Page 3: ...eparation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Ope...

Page 4: ...uipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be...

Page 5: ...ATION PROCEDURE 3 2 1 WINDOWS 98SE ME 2000 3 2 1 1 Install the Driver 3 2 1 2 Install the Utility 3 2 2 WINDOWS XP 4 3 CONFIGURATION UTILITY 7 3 1 CONNECT TO THE WIRELESS NETWORK 7 3 2 CONFIGURATION 8 3 3 ADVANCED CONFIGURATION 11 3 4 STATUS 13 3 5 STATISTICS 14 3 6 ABOUT 15 4 TROUBLESHOOTING 16 ...

Page 6: ...e your wirless network 1 1 Features Complies with the IEEE 802 11b DSSS 2 4GHz standard High speed data transfer rate up to 11Mbps Support 64 128 bit AES TKIP WEP Data Encryption function for high level of security Supports IEEE 802 1x advanced WLAN Security Supports peer to peer communication among any wireless users no Access Point required Automatic rate fallback enables data security and relia...

Page 7: ...NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items One Wireless Cardbus Adapter One CD Driver Utility User s Manual One Quick Guide If any of the above items is missing contact your supplier as soon as possible ...

Page 8: ...1 Insert the adapter into the Cardbus port of your computer the system will automatically find the device and search for its driver 2 Please select the Driver Win2000 folder select the folder based on your computer s OS system and the system will complete the driver installation automatically 2 1 2 Install the Utility 1 Insert the CD into the CD ROM device and execute the Utility setup exe program...

Page 9: ...In the system tray 2 2 Windows XP The installation process in Windows XP is similar with the process in windows 98SE Me 2000 Please refer to the instructions described in section 2 1 Due to the Windows XP has built in wireless network utility you may decide to use the system s utility or the one provided by this adapter It is strongly recommended to using the utility of this adapter A Using the Wi...

Page 10: ...orks tab in the Wireless Network Connection Properties screen clear the Use Windows to configure my wireless network settings check box If you want to enable the Windows XP built in utility select the check box again 3 Double click the shortcut or the icon in the system tray and start using the WLAN Cardbus Adapter ...

Page 11: ...6 Note If you don t disable the XP s Utility you can still see the link status and statistics during communication process from the adapter s utility ...

Page 12: ...you intend to Parameter Description Available Wireless Netowrks This list shows all available wireless network within range of your computer If you want to connect to any network on the list select the network and click Connect button Network Key If the network is required for Wired Equivalent Privacy WEP key type the key in the text box The key should be 10 or 26 hexadecimal characters according ...

Page 13: ...k connection You could also define the connection order here Parameter Description Profile Display the profiles the adapter is connecting to It also stores the profiles that the adapter ever connected to If you want to change the connection to another profile pull down the list and select the profile you intend to connect Available Wireless Network s This list shows all available wireless network ...

Page 14: ...orks or set one of the networks as the default connection Add Button To configurate a new profile click Add button Remove Button To remove a wireless network from the available profiles list click the button Set Default Button To designate a wireless network as the default network for the connection from the available profiles list click the button Signal Strength This bar shows the signal strengt...

Page 15: ... must be the the same on the wireless stations within the network Data Encryption WEP Enabled To enable the WEP function select the check box Network Authenticaton Shared Mode The wireless network supports two subtypes of network authentication services Open System and Shared Key Under Open System authentication any wireless stations can request authentication Under Shared Key authentication only ...

Page 16: ...screen see the screen above will appear when you attempt to conenct the wireless network which requires for IEEE 802 1x authentication Please enter the user name and password which your network administrator assigns to you Note This adapter only supports EAP MD5 algorithm of the IEEE 802 1x authentication method when running in Windows 98SE Me 2000 XP operating systems Windows XP supports more alg...

Page 17: ...e There are three kinds of encrypion algorithm supported by the adapter including WEP TKIP and AES WEP is an authentication algorithm which protects authorized Wireless LAN users against eavesdropping WEP has been found that it has some security problems TKIP is a temporary quick fix method defined in IEEE 802 11i standard to quickly overcome the inherent weaknesses in WEP security AES has been de...

Page 18: ...is checked the wireless connection of the adapter will be disabled Power Save CAM Continuous Access Mode Adapter will always set in active mode Max Enable the adapter in the power saving mode when it is idle Fast Enable the adapter in the power saving mode when it is idle but some compoents of the adapter is still alive In this mode the power consumption is larger than Max mode Rescan Button Click...

Page 19: ...tistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset button ...

Page 20: ...15 3 6 About This screen displays the version and the designer of the Utility ...

Page 21: ... independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 4 What is Infrastructure An integrated wireless and wireless and wired LAN is called an Infrastructure configuration Infrastructure is applicable to enterprise scale for wireless access to central database or wireless application for mobile workers 5 What is BSS ID A specific Ad hoc L...

Page 22: ...he wireless station by a set of user name and password only wireless stations provide correct user name and password can connect to the Access Point or Router and access to the network RADIUS Server Windows 2000 IAS Internet Authentication Service IEEE 802 1x Access Client Access Point RADIUS Client 1 2 3 4 2 Login with username password 1 Client requests to login the network 4 Approve or deny use...

Page 23: ...r the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers 13 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is designed to trade off bandwidth ...

Reviews: