background image

7

Chapter 3: Using the USB Network Adapter’s Setup Wizard

Wireless-G USB Network Adapter with SpeedBooster

2. Read the License Agreement displayed on the following screen and click the 

Next

 button to continue the 

installation. If you click the 

Cancel

 button, you will end the installation.

3. The Wireless Mode screen will ask for some information about your wireless network. In the 

SSID

 field, enter 

your network’s SSID (Service Set Identifier).  The SSID is your network name and must be identical for all 
devices in the network.  The default setting is 

linksys

 (all lowercase).

Next, choose a wireless mode. Click the 

Infrastructure Mode

 radio button if you want your wireless 

computers to network with computers on your wired network using an access point. Click the 

Ad-Hoc Mode

radio button if you want multiple wireless computers to network directly with each other.

Click the 

Next

 button to continue, or click the 

Back

 button to return to the previous page.

Figure 3-2: The License Agreement Screen

Figure 3-3: The Wireless Mode Screen

Содержание WUSB54GS

Страница 1: ...A Division of Cisco Systems Inc Model No USB Network Adapter Wireless G WUSB54GS ver 2 User Guide WIRELESS GHz 2 4802 11g with SpeedBooster ...

Страница 2: ...ed like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that could damage your property or the Wireless G USB Network Adapter This checkmark means ther...

Страница 3: ...ireless Network Monitor 15 Using the Wireless Network Monitor Icon 15 Accessing the Wireless Network Monitor 16 Link Information 16 Site Survey 19 Profiles 20 Creating a New Profile 21 Appendix A Troubleshooting 28 Common Problems and Solutions 28 Frequently Asked Questions 29 Appendix B Wireless Security 32 Security Precautions 32 Security Threats Facing Wireless Networks 32 Appendix C Windows He...

Страница 4: ...ws XP Digital Signature Screen 11 Figure 3 13 The Congratulations Screen 12 Figure 4 1 The Adapter s USB Port 13 Figure 4 2 A USB Port 13 Figure 4 3 The New Hardware Wizard 13 Figure 4 4 The Windows 2000 Digital Signature Screen 14 Figure 4 5 The Windows XP Digital Signature Screen 14 Figure 5 1 Wireless Network Monitor Icon 15 Figure 5 2 Windows XP Use Windows XP Wireless Configuration 15 Figure ...

Страница 5: ...rofile 23 Figure 5 19 Wireless Security WEP for New Profile 23 Figure 5 20 Wireless Security PSK for New Profile 24 Figure 5 21 Wireless Security PSK RADIUS Using EAP TLS for New Profile 25 Figure 5 22 Wireless Security PSK RADIUS Using EAP PEAP for New Profile 25 Figure 5 23 Wireless Security RADIUS Using EAP TLS for New Profile 26 Figure 5 24 Wireless Security RADIUS Using EAP PEAP for New Profi...

Страница 6: ...rom different computers and access data located on another computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless networ...

Страница 7: ...hapter show you how to use the Adapter s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network Appendix...

Страница 8: ...roduction What s in this Guide Wireless G USB Network Adapter with SpeedBooster Appendix H Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Страница 9: ...ge for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they...

Страница 10: ...B connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more ...

Страница 11: ...all the Wireless Network Monitor and driver as well as configure the Adapter 1 Insert the Setup Wizard CD ROM into your CD ROM drive The Setup Wizard should run automatically and the Welcome screen should appear If it does not click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive IMPORTANT You must run the Setup Wizard to install ...

Страница 12: ... SSID Service Set Identifier The SSID is your network name and must be identical for all devices in the network The default setting is linksys all lowercase Next choose a wireless mode Click the Infrastructure Mode radio button if you want your wireless computers to network with computers on your wired network using an access point Click the Ad Hoc Mode radio button if you want multiple wireless c...

Страница 13: ...nel set on the other devices in your wireless network If you are unsure about which channel to use select the default channel Channel 6 Network Mode Keep the default setting Mixed if you have Wireless G and Wireless B devices in your network Select G Only if you have only Wireless G devices in your network 5 Select the type of security you want to use from the first Wireless Security screen The ch...

Страница 14: ...ly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Transmit Key The default transmit key number is 1 If your network s access point or wireless router uses transmit key number 2 3 or 4 select the appropriate number from the Transmit Key drop down box Authentication The default is set to Auto where it auto detects for Shared Key or Open system Shared Key is when both th...

Страница 15: ...cate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the Back button to return to the previous screen RADIUS RADIUS features use of a RADIUS server This should only be used when a RADIUS server is connected to the Router RADIUS offers two authentication types EAP TLS...

Страница 16: ...settings or click the Back button to change any settings 7 At this point a screen stating that a digital signature was not found may appear This software has been tested and found to work properly with Windows 2000 and XP Click the Yes or Continue Anyway button to continue installation Figure 3 10 The Check Settings Screen Figure 3 11 The Windows 2000 Digital Signature Screen Figure 3 12 The Windo...

Страница 17: ...ter 8 After the files have been successfully copied the Congratulations screen will appear Click the Exit button Now that the software installation is complete proceed to Chapter 4 Connecting the Wireless G USB Network Adapter Figure 3 13 The Congratulations Screen software instructions for the computer ...

Страница 18: ...USB port 2 Once you ve connected the Adapter Windows XP users may see a New Hardware Wizard appear for the installation of drivers into your operating system Make sure the Recommended radio button is selected and click the Next button Figure 4 1 The Adapter s USB Port Figure 4 2 A USB Port port the connection point on a computer or networking device used for plugging in a cable or an adapter Figur...

Страница 19: ... the Wireless G USB Network Adapter is complete If you want to check the link information search for available wireless networks or make additional configuration changes proceed to Chapter 5 Using the Wireless Network Monitor The LED Indicators The Adapter s LEDs indicate the status of the Adapter s power and wireless connection Power Green The Power LED lights up when the Adapter is adequately po...

Страница 20: ...ck About to view the version information for the driver and Wireless Network Monitor Use Windows XP Wireless Configuration Windows XP only If your computer is running Windows XP this choice will be available If you want to use Windows XP Wireless Zero Configuration to control the Adapter instead of using the Wireless Network Monitor select Use Windows XP Wireless Configuration If you want to switc...

Страница 21: ...ks click the Site Survey tab To perform configuration changes click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provides a button to click for additional status information Ad Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad ho...

Страница 22: ...ireless network s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS This is the DNS address of the Adapter DHCP Client This displays the Adapter s status as a DHCP client MAC The MAC address of the wireless network s access point i...

Страница 23: ... translates into a higher quality signal Signal Strength This is the intensity of the wireless signal received by the Adapter Up Time This indicates the length of the most recent connection to a wireless network Total Up Time This indicates the cumulative total of the Adapter s connection time Firmware Version This shows the version of the Adapter s firmware Signal Strength The Signal Strength bar...

Страница 24: ...y feature is displayed here MAC The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has encryption enabled then you will see a new screen appear From the Security drop down me...

Страница 25: ...Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button New Click the New button to create a new profile See the next section Creating a New Profile for detailed instructions Edit Select a profile an...

Страница 26: ...twork does not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS address appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS address leave these fields empty Click the Next button to continue or click the Cancel button to retur...

Страница 27: ...etwork name It must be used for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 5 The Ad Hoc Mode Settings screen will appear If you chose Infrastructure Mode go to Step 6 now If you chose Ad Hoc Mode select the correct operating channel for your network from the Channel drop down menu Then select the Networ...

Страница 28: ... and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F ...

Страница 29: ... enter a Passphrase that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption Type Passphrase Enter a Passphrase also called a Pre Shared Key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Click the Next button to continue Click the Back button to return to...

Страница 30: ...down menu select the certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES for the Encryption field Click the Next button to continue Click the Back button to return to the previous screen EAP PEAP If you selected EAP PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network...

Страница 31: ...te drop down menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen EAP PEAP If you selected EAP PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication...

Страница 32: ...click the Back button To exit the Wireless Network Monitor click Exit 9 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Information screen Click Return to Profiles Screen to keep the current settings active and return to the Profiles screen You have successfully created a connection profile Figure 5 25 Confirm Ne...

Страница 33: ...etwork Adapter does not work properly Reinsert the USB Network Adapter into the notebook or desktop s USB port Right click on My Computer and select Properties Select the Adapter then chose the Device Manager tab and click on the Network Adapter You will find the USB Network Adapter if it is installed successfully If you see a yellow exclamation mark the resources may be conflicting and you must f...

Страница 34: ... the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g stand...

Страница 35: ...rength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter r...

Страница 36: ...undant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ...

Страница 37: ...ance 7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps yo...

Страница 38: ...ent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Change your WEP key regularly WPA Wi Fi Protected Access WPA is the newe...

Страница 39: ...ed to the Router or other device WPA RADIUS offers two encryption methods TKIP and AES with dynamic encryption keys Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encryption should be used These security recommendations should help keep your mind at ease while you are enjoying the most flexible and conve...

Страница 40: ...uctions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shar...

Страница 41: ...nd networks together and handles the most data Bandwidth The transmission capacity of a given device or network Bit A binary digit CSMA CA Carrier Sense Multiple Access Collision Avoidance A method of data transfer that is used to prevent data loss in a network CTS Clear To Send A signal sent by a device to indicate that it is ready to receive data Default Gateway A device that forwards Internet t...

Страница 42: ... institute that develops networking standards Infrastructure Mode Configuration in which a wireless network is bridged to a wired network via an access point IP Internet Protocol A protocol used to send data over a network IP Address The address used to identify a computer or device on a network ISM band Radio band used in wireless networking transmissions ISP Internet Service Provider A company t...

Страница 43: ...ternet RTS Request To Send A packet sent when a computer has data to transmit The computer will wait for a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services Software Instructions for the computer A series of instructions that performs a particular task is called a program Sprea...

Страница 44: ...2 11b 802 11g USB 1 1 USB 2 0 Ports USB Port Channels 802 11b 802 11g 11 Channels US Canada 13 Channels Europe 14 Channels Japan LEDs Power Link Transmitted Power 15 18dBm Typical 11Mbps CCK 14 17dBm Typical 54Mbps OFDM Receive Sensitivity 67dBm 54Mbps 82dBm 11Mbps Security features WEP Encryption WEP key bits 64 128 bit Warranty 3 Year ...

Страница 45: ...peedBooster Dimensions 3 58 x 0 91 x 2 80 W x H x D 91 mm x 23 mm x 71 mm Unit Weight 0 18 lbs 0 08 kg Certifications FCC Operating Temp 0 C 55 C 32 F 131 F Storage Temp 40 C 85 C 40 F 185 F Operating Humidity 10 85 Non Condensing Storage Humidity 5 90 Non Condensing ...

Страница 46: ...PRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except ...

Страница 47: ...ion exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body Linksys declares that WUSB54GS ver 2 FCC ID Q87 WUSB54GSV2 is limited in CH1 CH11 for 2 4 GHz by specified firmware controlled in U S A INDUSTRY CANADA CANADA This Class B digital apparatus complies with Canadian RSS210 Cet appa...

Страница 48: ...bout networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization de...

Отзывы: