background image

COPYRIGHT

Copyright  

2007/2008 by this company.  All rights reserved.  No part of this 

publication may be reproduced, transmitted, transcribed, stored in a retrieval system, 
or translated into any language or computer language, in any form or by any means, 
electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the 
prior written permission of this company.

This company makes no representations or warranties, either expressed or implied, 
with respect to the contents hereof and specifically disclaims any warranties, 
merchantability or fitness for any particular purpose.  Any software described in this 
manual is sold or licensed "as is". Should the programs prove defective following 
their purchase, the buyer (and not this company, its distributor, or its dealer) assumes 
the entire cost of all necessary servicing, repair, and any incidental or consequential 
damages resulting from any defect in the software. Further, this company reserves 
the right to revise this publication and to make changes from time to time in the 
contents hereof without obligation to notify any person of such revision or changes.

All brand and product names mentioned in this manual are trademarks and/or 
registered trademarks of their respective holders.

Summary of Contents for WI200

Page 1: ...warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Furth...

Page 2: ...ion between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must a...

Page 3: ... of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use i...

Page 4: ...FIGURATION UTILITY 14 3 1 Utility Overview 15 3 2 Available Network 17 3 3 General 18 3 4 Profile 20 3 4 1 Configure the Profile 21 3 5 Advanced 25 3 6 Status 28 3 7 Statistics 29 3 8 Wi Fi Protected Setup 30 3 9 Software AP 31 3 8 1 AP Properties Setting 32 3 8 2 AP Advanced 33 3 8 3 AP Statistics 34 3 8 4 ICS 35 5 TROUBLESHOOTING 36 ...

Page 5: ... consumption of the adapter is also very low Furthermore this adapter provides several levels of power saving modes allowing user customizes the way of saving the power from his her portable or handheld devices This adapter is cost effective together with the versatile features it is the best solution for you to build your wireless network 1 1 Features Works with both IEEE 802 11b and IEEE 802 11g...

Page 6: ...ture 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items One USB Adapter One CD Driver Utility User s Manual One User Manual If any of the above items is missing contact your supplier as soon as possible 2 ...

Page 7: ...dures are similar for Windows 98SE Me 2000 XP Note 2 If you have installed the Wireless Adapter driver utility before please uninstall the old version first I Install the Driver and Utility A Insert the Installation CD to your CD ROM Drive Execute the Setup exe program B Select the Setup Language and click Next to proceed C Click Next to start installing driver and utility 3 ...

Page 8: ...D Click Install to start the installation E The system starts to install the driver and utility 4 ...

Page 9: ...USB port of the computer H The system will auto detect the USB adapter and complete the drivers installation for the adapter automatically I You are now able to use the USB adapter II Connect to Wireless Access Point A To start configuring the adapter double click the icon in the system tray 5 ...

Page 10: ...ter is displayed Click Available Network and double click on the wireless access point you want to connect to C Input the security setting if the Access Point has enabled the security and click OK to start network connection 6 ...

Page 11: ...For Windows Vista user you can use Windows Zero Configuration to connect to wireless access point A Click Start button then click Control Panel Click Network and Internet in Control Panel B Click Connect to a network under Network and Sharing Center 7 ...

Page 12: ... then click Connect D If it s an unnamed access point i e the SSID of this wireless access point is hidden you ll be prompted input it s name and the name must be identical to the SSID setting of the wireless access point you re connecting to Click Next 8 ...

Page 13: ...input its security or passphrase here It must match the encryption setting on the access point Click Connect F If you can see this image the connection between your computer and wireless access point is successfully established Click Close to start network connection 9 ...

Page 14: ... network simply Please follow the step below to run the setup wizard A From the menu in the utility select Set Wizard B Select Station Infrastructure if you want to connect to the wireless network through access point or select Station ad hoc to connect to a peer to peer network Click Next 10 ...

Page 15: ...l show up Please select the one you d like to connect to and click the Next button D In the Wireless network properties dialog please fill in the security settings for this wireless network you d like to connect to and click OK 11 ...

Page 16: ...the same network segment with the wireless access point and click the Finish button For example Assume that the wireless access point s IP Address is 192 168 2 1 and the subnet mask is 255 255 255 0 Your computer can be configured to obtain IP Address automatically through the DHCP Server of the access point or a fixed IP Address in order to be in the same subnet as the router The available IP Add...

Page 17: ...F Now you can connect to the wireless network successfully 13 ...

Page 18: ...top of Windows You can open it by double click on the icon In the Desktop In the System Tray Right click the icon in the system tray there are some items for you to operate the configuration utility Open Config Utility Select Open Config Utility to open the configuration utility Setup Wizard Select SetupWizard to open the setup wizard About Select About to show the utility information Hide Select ...

Page 19: ...t is selected the adapter will works as a wireless AP View Enable Status Bar and the D block in the utility will display the current status of the utility About To check the version of the utility select this item This is a list for you to configure several adapters in your PC from the utility Show Tray Icon To show the icon in the system tray select the item Radio Off This function is for you to ...

Page 20: ... displays the current status of the utility To close it please disable the Status Bar in the View item There are several tabs in the block for you to setup the function of the adapter Please refer to the description in the following sections 16 D E ...

Page 21: ...on Available Network s This list shows all information of the available wireless networks within the range of your adapter The information includes SSID Channel Encryption Network Authentication Signal and etc If you want to connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is recommended that refresh the list while ...

Page 22: ...rastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router Encryption It displays the encryption setting of the current connection including None WEP TKIP or AES SSID The SSID up...

Page 23: ...tes the wireless signal strength Link Quality It indicates the wireless link quality Network Address It shows the MAC IP address and other information of the adapter Renew IP Click this button to renew the network address settings of the adapter 19 ...

Page 24: ...connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add delete edit the selected profiles Duplicate If you like to build up the new profile with the same settings as the current profile then you can select this feature Set Default To designate a profile as the default network for the ...

Page 25: ...ect to another wireless adapter in the Wireless LAN network without through an Access Point or Router If this item is selected the adapter will work in Ad Hoc mode Profile Name Define a recognizable profile name for you to identify the different networks Network Name SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging ...

Page 26: ...tarting password in their access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized devices WPA2 PSK WPA2 PSK is also for home and small business The difference between WPA PSK and WPA2 PS...

Page 27: ...e transmitted over a network This insures much greater security than the standard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communicat...

Page 28: ... protocol with many of the features of EAP protocols Cisco controls the ability of other vendors to implement this protocol so it should be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password of your computer PEAP TTLS PEAP and TTLS are similar and easier ...

Page 29: ...de Min Enable the adapter in the power saving mode when it is idle but some components of the adapter are still alive In this mode the power consumption is larger than Max mode Max Enable the adapter in the power saving mode when it is idle Turbo Mode Off Turn off the turbo mode On Turn on the turbo mode Auto The adapter will detect the AP is RTL8186 based AP or not to transmit data in turbo mode ...

Page 30: ...untries For example USA FCC is channel 1 11 Europe ETSI is channel 1 13 The channel of the adapter has been set depends on the country you are located If you are in different country you could change the channel from the pull down list PSP XLink Mode Enable this function to support PSP XLink WMM Parameter QoS Enable Enable this function to support WMM Power Save APSD Enable Enable this function to...

Page 31: ...Parameter Description Set Defaults Let the setting values return to default Apply Confirm the settings in the Advanced 27 ...

Page 32: ...of manufacturer driver version settings of the wireless network the adapter is connecting to linking time and link status If you don t ensure the status of the adapter and the network you are connecting please go to the screen for more details 28 ...

Page 33: ...tistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset 29 ...

Page 34: ...r it and input the number to your wireless access point as the WPS PIN code Please refer to the user manual of your wireless access point for instructions about how to do this Then click PIN button and wait for few seconds to one minute If a wireless access point with correct PIN code is found you ll be connected to that access point Please note that you may have to click PIN for few more times to...

Page 35: ...re AP This adapter can run as a wireless AP Please pull down the Mode menu and select Access Point The relative configurations of the AP including channel SSID WEP encryption and so on are described as follows 31 ...

Page 36: ...AP Wireless adapters connect to the AP should set up the same SSID as the AP BSSID Display the MAC address of the adapter Associate Table All the wireless adapters connected to the software AP will be displayed in the list Config Click Config for setting more configuration of the AP 3 8 1 AP Properties Setting Please refer to Section 3 4 1 for the setting of the parameters for AP Note that Ad Hoc ...

Page 37: ...oadcast traffic Default value is 3 beacons Preamble Mode The preamble defines the length of the CRC block for communication among the wireless network There are two mode including Long and Short High network traffic areas should use the shorter preamble type WMM Parameter QoS Enable Enable this function to support WMM function Power Save APSD Enable Enable this function to support WMM Power Save S...

Page 38: ...Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset 34 ...

Page 39: ... want to connect to the internet through this SoftAP you will need to make a bridge between our SoftAP and your internet connect Select the internet connection in your SoftAP host machine and press the Apply button 35 ...

Page 40: ... includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wire...

Page 41: ...th Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhan...

Page 42: ...ther words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Di...

Reviews: