background image

during wireless modes of operation. 
 
This device complies with Part 15 of the FCC Rules. Operation is subject to the 
following two conditions: (1) this device may not cause harmful interference, and (2) 
this device must accept any interference received, including interference that may 
cause undesired operation. 
  
Any changes or modifications not expressly approved by the party responsible for 
compliance could void the authority to operate equipment. 
 

Federal Communication Commission (FCC) Radiation Exposure Statement 

 
This equipment complies with FCC radiation exposure set forth for an uncontrolled 
environment. In order to avoid the possibility of exceeding the FCC radio frequency 
exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) 
during normal operation. 
 
The antenna(s) used for this transmitter must not be co-located or operating in 
conjunction with any other antenna or transmitter. 
 
 

R&TTE Compliance Statement 

 
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE 
EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio 
equipment and telecommunication terminal Equipment and the mutual recognition of 
their conformity (R&TTE) 
The R&TTE Directive repeals and replaces in the directive 98/13/EEC 
(Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As 
of April 8, 2000. 
 

Safety 

 
This equipment is designed with the utmost care for the safety of those who install and 
use it. However, special attention must be paid to the dangers of electric shock and 
static electricity when working with electrical equipment. All guidelines of this and of 
the computer manufacture must therefore be allowed at all times to ensure the safe 
use of the equipment. 

EU Countries Intended for Use   

 
The ETSI version of this device is intended for home and office use in Austria, 
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, 
the Netherlands, Portugal, Spain, Sweden, and the United Kingdom. 
The ETSI version of this device is also authorized for use in EFTA member states: 
Iceland, Liechtenstein, Norway, and Switzerland. 

EU Countries Not intended for use   

None. 

 

Содержание WT-2000USB

Страница 1: ...Turbo G Wireless USB Adapter WT 2000USB User s Manual ...

Страница 2: ...red trademarks of their respective holders Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio fr...

Страница 3: ... with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equ...

Страница 4: ... Utility 4 3 CONFIGURATION UTILITY 8 3 1 Site Survey 10 3 2 Profile 11 3 2 1Configure the Profile 12 3 2 1 1 Configuration 12 3 2 1 2 Authentication and Security 14 3 2 1 3 802 1x Setting Certification 18 3 2 1 4 802 1x Setting CA Server 19 3 3 Link Status 20 3 4 Statistics 22 3 5 Advance 22 3 6 About 25 3 7 Turbo Mode 25 3 8 WMM Function 26 4 TROUBLESHOOTING 28 ...

Страница 5: ...uired to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and government users When you use the devices such as Voice over Inter...

Страница 6: ...z Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band z Modulation OFDM with BPSK QPSK 16QAM 64QAM 11g z BPSK QPSK CCK 11b z Data Rate 54 48 36 24 18 12 11 9 6 5 5 2 1Mbps auto fallback z Security 64 128 bit WEP Data Encryption WPA TKIP with IEEE 802 1x WPA2 AES with IEEE 802 1x z Note WPA2 is enabled in Windows 2000 XP z Antenna Internal Antenna z Drivers Windows 98SE Me 2000 XP z ...

Страница 7: ...One USB 2 0 Extension Cable 100 cm z One CD Driver Utility User s Manual z One Quick Guide If any of the above items is missing contact your supplier as soon as possible 3 AirLive WT 2000USB User s Manual ...

Страница 8: ...Turbo Wireless LAN USB Adaptor driver utility before please uninstall the old version first I Install the Hardware A Turn off your computer and remove its cover B Insert the PCI card to an available PCI slot firmly C Secure this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Turn on the computer II Install the Driver and ...

Страница 9: ... is a Windows Zero Configuration Tool for you to setup the wireless adaptor You can choose to configure the adaptor through the Windows Zero Configuration Tool or the AirLive Turbo G Configuration Tool for the adaptor It is recommended to choose the AirLive Turbo G Configuration Tool for the adaptor Click Next to continue The system starts to install the software of the card 5 AirLive WT 2000USB U...

Страница 10: ...operate with better performance please choose the Optimize for performance to enable the Tx Burst mode Or you can choose Optimize for Wi Fi mode to let the adaptor run in standard wireless network 6 AirLive WT 2000USB User s Manual ...

Страница 11: ...he system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue G Please click Finish to complete the installation 7 AirLive WT 2000USB User s Manual ...

Страница 12: ...y appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate the configuration utility z Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool z Use Zero Configuration as Configuration Utility z Select Use Zero Configuration as Conf...

Страница 13: ...or the card please follow one of the ways as below First Way Right click the icon in the system tray and select Use AirLiveConfig as Configuration Utility Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced C Uncheck Use Windows to configure my wireless network settings to enable the utility for the card 9 AirLive WT 2000USB User s Manual ...

Страница 14: ...guration Utility the system will scan all the channels to find all the access points stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength From the Site Survey all the networks nearby will be listed You can change the connection to another networks or add one of the networks to your own profile list 10 AirLive WT 2000USB...

Страница 15: ...st double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the new information of all the wireless networks nearby Connect Button Click Connect to connect to the selected network Add to Profile Button Add the selected network to Profiles list 3 2 Profile The Profiles List is for you to manage the networks you co...

Страница 16: ...e card will be initially connected to the profile 3 2 1 Configure the Profile 3 2 1 1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs You may specify a SSID for the ...

Страница 17: ... the card is set in Ad Hoc Peer to Peer Mode you can designate the wireless connection mode for the Ad Hoc network 802 11 B only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11b wireless stations in the network you can set the card to this mode 802 11 B G mix If you have a mix of 802 11b and 802 11g wireless stations in your network it is recomm...

Страница 18: ...gain but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change is recommended Channel This setting is only available for Ad Hoc mode Select the number of the radio channel used for the networking The channel setting should be the same with the network you are connecting to 3 2 1 2 Authentication and Security Parameter Description Auth...

Страница 19: ...etwork authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized devices...

Страница 20: ...thod to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key must be used on all of the wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default encryption key from Key 1 to Key ...

Страница 21: ...ends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In turn the device responds with its identity and the AP relays this identity to an authentication server which is typically an external RADIUS server An example for MD5 Authentication RADIUS Serve...

Страница 22: ...ut not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation MD5 Challenge MD5 Challenge is the easiest EAP Type It requires the wireless station to enter a set of user name and password as the identity ...

Страница 23: ...ng domain Password The password used for authentication It may contain up to 63 ASCII characters and is case sensitive 3 2 1 4 802 1x Setting CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify th...

Страница 24: ...uthority Server Name Enter the authentication server name Server name must match exactly When selected the server name must match exactly the server name found on the certificate Domain name must end in specified name When selected the server name field identifies a domain The certificate must use a server name belonging to this domain or to one of its sub domains e g zeelans com where the server ...

Страница 25: ...peed of data transmitted and received Link Quality This bar indicates the quality of the link The higher the percentage the better the quality dBm If you want to know the signal strength in the unit of dBm select this check box Signal Strength This bar shows the signal strength level The higher percentage shown in the bar the more radio signal been received by the card This indicator helps to find...

Страница 26: ...the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This option enables you to configure more advanced settings for example wireless mode protection mode and etc 22 AirLive WT 2000USB User s Manual ...

Страница 27: ...ountry B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the card will be a little lower due to many of frame traffic should be transmitted Auto Based on...

Страница 28: ...ions is developed by Cisco for the radio monitoring and fast roaming LEAP Turn on CCKM During normal operation LEAP enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication including communication with the main RADIUS server When you configure your wireless LAN for fast re association however LEAP enabled client devices roam from one access ...

Страница 29: ... MAC Address of the card is displayed in the screen as well 3 7 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this feature known as Turbo Mode enables higher throughput than IEEE 802 11g standard Up to 54Mbps When the card is connecting to the Routers or APs with t...

Страница 30: ...defined WMM as a profile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connected to the AP or Router with WMM function you can enable the function of the card by following the steps below A In the Desktop of the computer right click My Network Places and selec...

Страница 31: ...B Right Click the Wireless Network Connection and select Properties C Click Configure D Select Advanced page enable the WMM Capable 27 AirLive WT 2000USB User s Manual ...

Страница 32: ...n schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireless LAN hardware from ...

Страница 33: ...s 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhance security and A...

Страница 34: ...andwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spr...

Отзывы: