background image

FCC ID: EJE-WL0001  

(

IC: 337J-WL0001

)

                        Report No. M030725_Certification_Mace_Calexico

 

 

EMC Technologies Pty Ltd.  57 Assembly Drive, Tullamarine VIC 3043 Australia 

www.emctech.com

 

 

 
 

EMC Technologies Pty Ltd - Report No. M030725_Certification_Mace_Calexico 

 
 

 
 
 
 
 
 
 
 

APPENDIX J – USER MANUAL (SUPPLIED TO ALL END USERS) 

 

 

Содержание WM3B2100

Страница 1: ...M030725_Certification_Mace_Calexico EMC Technologies Pty Ltd 57 Assembly Drive Tullamarine VIC 3043 Australia www emctech com EMC Technologies Pty Ltd Report No M030725_Certification_Mace_Calexico APPENDIX J USER MANUAL SUPPLIED TO ALL END USERS ...

Страница 2: ...g Intel R PROSet 4 Connecting to a Network using Intel PROSet 5 Security Overview 6 Setting Up WEP Encryption and Authentication 7 Troubleshooting 8 Specifications 9 Glossary Support and Warranty 10 Customer Support 11 Software License 12 Safety and Regulatory Notices 13 Limited Warranty 14 Legal Notices Copyright c 2003 Intel Corporation All rights reserved Intel Corporation 5200 N E Elam Young P...

Страница 3: ...e area Peer to Peer mode also called Ad Hoc mode works without access points and allows wireless computers to send information directly to other wireless computers You can use Peer to Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting Configuring a Wireless LAN There are three basic components that must be configured for a wireless LAN ...

Страница 4: ...ubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing To conduct a site survey you will need the following tools An access point or laptop computer that is set up to be the transmitter It should be mounted near and at the same height as the designated location of your wireless LAN A laptop that will act as the mobile receiver It must contain your s...

Страница 5: ...s with undisturbed mobile connectivity Using multiple access points will of course reduce the impact of these factors if your area has dividing walls throughout Stronger Security Although wireless networks are easy to use the main issue lies with security Even if you enable the security settings defined in the 802 11b standard as well as the security settings of your hardware your network is still...

Страница 6: ...etwork settings For information on how to use the Windows XP feature see your Windows XP documentation Driver Installation To install drivers under Windows XP follow these steps 1 Power up the computer in which the wireless adapter hardware has just been installed 2 Log in with administrative rights if prompted by Windows XP 3 Wait for Windows to detect the newly installed hardware and display the...

Страница 7: ...exe from the CD Click Wireless LAN Adapters 14 On the Intel PRO Wireless LAN Adapters menu screen click Install Software 15 On the Welcome to the InstallShield Wizard for Intel R PROSet screen click Next 16 On the License Agreement screen after reading the license agreement select I accept the terms in the license agreement and click Next 17 On the Setup Type screen select Typical and then click N...

Страница 8: ...nistration Tools and select AP Discovery or Site Survey For additional information on either program press F1 or click Help while the program is running Installation under Windows 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions The wireless adapter hardware has already been installed in the computer in accordance with the computer manufac...

Страница 9: ...all Intel R PROSet Intel R PROSet Installation Required Continue with the following steps to install the Intel R PROSet wireless configuration utility required Some versions of this product do not support the Intel R PRO Network Connections menu screen for installation of utility software If the Intel R PRO Network Connections menu screen does not appear or if it does not have a menu item for Wire...

Страница 10: ...path APPS PROSet 2K NET32 on the Intel CD supplied with the product Skip Steps 19 and 20 below and continue with Step 21 19 On the Intel R PRO Network Connections screen click Wireless LAN Adapters This screen may have been launched in step 4 above If the screen is not visible when you close the Found New Hardware Wizard dialog display it by removing and re inserting the Intel CD or by running aut...

Страница 11: ...ws NT to start then log in as administrator 3 Insert the Intel CD into your CD ROM drive If the Intel R PRO Network Connections screen displays you may disregard it or close it you will redisplay it later to install Intel R PROSet II 4 Click Start Settings Control Panel then double click the Network icon 5 When the Networking dialog appears select the Adapters tab and click the Add button 6 Click ...

Страница 12: ...etup exe in the path APPS PROSet WINNT4 on the Intel CD Then skip to Step 4 below and continue with the installation 1 Insert the Intel CD into your CD ROM drive The Intel R PRO Network Connections screen displays If it doesn t display use Start Run and launch the file autorun exe from the Intel CD 2 On the Intel R PRO Network Connections screen click Wireless LAN Adapters 3 On the Intel PRO Wirel...

Страница 13: ...onal information on either program press F1 or click Help while the program is running Installation under Windows Me Preliminary Notes The installation instructions in this section are based on the following assumptions The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer s instructions The computer has not been powered on since the ...

Страница 14: ...twork Connections screen by removing and re inserting the Intel CD or by running autorun exe from the CD Click Wireless Adapters 9 On the Intel PRO Wireless LAN Adapters menu screen click Install Software 10 On the Welcome to the InstallShield Wizard for Intel R PROSet II screen click Next 11 On the License Agreement screen after reading the license agreement select I accept the terms in the licen...

Страница 15: ...lect AP Discovery or Site Survey For additional information on either program press F1 or click Help while the program is running Installation under Windows 98SE Preliminary Notes The installation instructions in this section are based on the following assumptions The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer s instructions Th...

Страница 16: ...reless Adapters 10 On the Intel PRO Wireless LAN Adapters menu screen click Install Software 11 On the Welcome to the InstallShield Wizard for Intel R PROSet II screen click Next 12 On the License Agreement screen after reading the license agreement select I accept the terms in the license agreement and click Next 13 On the Setup Type screen select Typical and then click Next This is the recommend...

Страница 17: ... the Profile List in the Intel R PROSet General page Profiles can be arranged in order of network connection priority You can connect to one network using the first profile in the Profile List then automatically connect to another network using the next profile This allows you to stay connected while roaming freely from one wireless network to another Although you can assign multiple profiles to a...

Страница 18: ...ettings 12 Select Open or Shared in the Network Authentication drop down menu Open does not use any authentication method Shared uses the WEP key as the authentication method 13 Click the Enable data encryption WEP checkbox to configure WEP encryption settings 14 Click the Password protect this profile checkbox to assign a password to the profile 15 Click Next Step 4 of 4 Password Protection Setti...

Страница 19: ...s to position the priority of new profile in the priority list 15 Click the Connect button to connect to the network The VPN profile name displays a connect icon Note There must be an IP address assigned before the VPN client software can be launched Click the Details button to verify that an IP address has been assigned 16 Follow the on screen instructions and enter your credentials before connec...

Страница 20: ...e automatically imported If a profile of the same name already exists in the Profile List a dialog is displayed from which you can either reject the import or accept in which case the existing profile will be replaced All imported profiles will be placed at the bottom of the Profile List and the profile file will be immediately deleted after the import whether the import was successful or not To d...

Страница 21: ...eate a profile to be used later 6 Click OK to connect Connecting to a Network if a Blank SSID displays If the wireless adapter receives a blank network name SSID from a stealth access point both the blank SSID and no profile display in the available networks list To associate with a stealth access point a new profile must first be created before connection After connection both the blank SSID and ...

Страница 22: ...Configuration Service feature operates in background to automatically display available networks not listed in the Profile List This method provides automatic connection in a 2 4 or 5GHz environment to available networks in the range of your wireless adapter The Configuration Service constantly monitors your wireless adapter s connection status If no matching profiles are found in the Profile List...

Страница 23: ...ption can only be used to re enable the Configuration Service features it cannot be used to manually disable the Configuration Service features Refer to Profile Switching for more information Profile Management Options The following Profile Management options can be found in Advanced Settings Display available networks when not associated If no networks are available that match any profiles in the...

Страница 24: ...unctioning Task tray icon menu Launching an ad hoc profile and applying a profile from the task tray menu is not available NOTE If the buttons described above are used the following message displays Another wireless LAN utility is communicating with the Intel R PRO Wireless LAN adapter To avoid conflicts Intel R PROSet has temporarily disabled its Profile Management features Scanning for Available...

Страница 25: ...EP security settings 10 Click the Password protect this profile checkbox and click Next button to access the Password Protection settings Click Finish after the password information has been entered If this option is not required leave the box unchecked and proceed to step 11 11 Click OK to save the profile settings and return to the Networks page 12 After creating the new profile click the profil...

Страница 26: ...details This method uses your computer s SSID to establish the ad hoc network for other users to connect to When you are the originator of an ad hoc network all other users must use the channel and SSID Ending an Ad Hoc Session To end an ad hoc session click the Close button After the session is ended an attempt is made to re connect to the last profile used from the Profile List Creating an Ad Ho...

Страница 27: ... the same as the other users in the established ad hoc network in this case your computer will join the ad hoc network 5 To join the ad hoc network select the peer name from the displayed list of computers in the ad hoc network and click the Connect button 6 To establish an ad hoc network after your computer s SSID is entered click the Connect button to scan for other users in the ad hoc network 7...

Страница 28: ...s point the Configuration Service will attempt to find an available network Refer to Configuration Service for more information Switching the radio on or off from the Task Tray Icon Right click on the Intel R PROSet task tray icon and click Switch radio Off Using the Windows operating system to switch the radio on off The radio can be switched on or off via the Windows operating system from the De...

Страница 29: ...anced button 4 Select your preferences from the options shown 5 Click OK to save the settings and return to the Profiles dialog Adapter Switching Considerations Consider the following issues when switching adapters Adapter switching requires the use of DHCP It cannot be used with fixed IP addressing Only Intel wired and wireless adapters are supported when using the Start button to connect to an a...

Страница 30: ...E One wireless adapter can be used for each band operating at a time 6 After you have switched to the desired adapter click OK to close the Adapter Switching dialog and return to the General tab 5 Security Overview Wireless Security Since wireless networking devices transmit information through radio waves it is imperative that you protect your information by configuring your security settings The...

Страница 31: ...ss Encryption Privacy WEP with fixed encryption keys and three optional key lengths The use of fixed keys has made it easy to mount several types of attack against WEP WEP Encryption You can prevent unauthorized reception of your wireless data using the IEEE 802 11 Wired Equivalent Privacy WEP The standard includes two levels of security using a 64 bit key sometimes referred to as 40 bit or a 128 ...

Страница 32: ...th a key Another parameter called the key index is provides the option to create multiple keys for that profile However only one key can be used at a time You can also choose to password protect the profile to ensure privacy The pass phrase is used to generate a WEP key automatically You have the option of either using a pass phrase or entering a WEP key manually Using 64 bit encryption the pass p...

Страница 33: ...en connected to an access point using a profile with an incorrect WEP key encryption the task tray icon and the General page will both indicate good signal strength and that you are associated with the AP However when you attempt to send data to the AP using this profile because of the incorrect WEP key encryption authentication cannot be established to acquire an IP address from the AP to allow d...

Страница 34: ...software packages are always a possibility and they are not always the fault of the newest addition Sometimes just starting over fixes the problem Swap units around Does your problem follow the changed units or is it unique to a specific location If it follows the product the swapped unit could be damaged or improperly configured If the problem stays with the location try to find out what is diffe...

Страница 35: ...t would appear that you would want as much range as possible but with the increase in range comes an increase in interference potential as your unit hears not only your other units but also manages to hear the systems of other companies up and down the street If you have a large installation you will also wind up with more than one access point using the same channel If a remote unit hears two or ...

Страница 36: ...WM3B2100 Physical Characteristics Form Factor Mini PCI Type 3B model WM3B2100 Dimensions HxWxD Type 3B card 2 34 in x 1 75 in x 0 20 in 59 45 mm x 44 45 mm x 5 mm Weight 0 6 oz 17 g Antenna Interface Connector Hirose U FL R SMT mates with cable connector U FL LP 066 Dual Diversity Antenna On board dual diversity switching Connector Interface 124 pin SO DIMM edge connector Operating Temperature 0 t...

Страница 37: ...mation processing standard supporting 128 192 and 256 bit keys B Basic Service Set Identifier BSSID A unique identifier for each wireless client on a wireless network The BSSID is the Ethernet MAC address of each adapter on the network Bit Rate The total number of bits ones and zeros per second that a network connection can support Note that this bit rate will vary under software control with diff...

Страница 38: ...igured to allow each wireless client to communicate directly with each other without an access point Independent Network A network that provides usually temporarily peer to peer connectivity without relying on a complete network infrastructure Infrastructure Mode A wireless network centered around an access point In this environment the access point not only provides communication with the wired n...

Страница 39: ...User Service RAID An authentication and accounting system that verifies users credentials and grants access to requested resources Roaming Movement of a wireless node between two microcells Roaming usually occurs in infrastructure networks built around multiple access points S Service Set Identifier SSID Used to identify clients on a wireless network Shared key An encryption key known only to the ...

Страница 40: ... original architects WEP also prevents unauthorized access to your system by an outsider Hackers have been known to access systems from outside a building and to then to access the Web for a leisurely session all at the system owner s expense Wide Area Network WAN A wide area network WAN is a voice data or video network that provides connections from one or more computers or networks within a busi...

Страница 41: ...nal treaty provisions You may not remove any copyright notices from the Software Intel may make changes to the Software or to items referenced therein at any time without notice but is not obligated to support or update the Software Except as otherwise expressly provided Intel grants no express or implied right under Intel patents copyrights trademarks or other intellectual property rights You may...

Страница 42: ...rmful interference and 2 This device must accept any interference received including interference that may cause undesired operation FCC Rules and Regulations Part 15 Warning This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the Federal Communications Commissions Rules and Regulation These limits are designed to provide reasonable p...

Страница 43: ... PROPERTY MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE ARISING OUT OF ANY PROPOSAL SPECIFICATION OR SAMPLE This warranty does not cover replacement of adapter products damaged by abuse accident misuse neglect alteration repair disaster improper installation or improper testing If the adapter product is found to be defective Intel at its option will replace or repair the hardware product at no ...

Страница 44: ...GENCE TORT OR UNDER ANY WARRANTY IRRESPECTIVE OF WHETHER INTEL HAS ADVANCE NOTICE OF THE POSSIBILITY OF ANY SUCH DAMAGES NOTWITHSTANDING THE FOREGOING INTEL S TOTAL LIABILITY FOR ALL CLAIMS UNDER THIS AGREEMENT SHALL NOT EXCEED THE PRICE PAID FOR THE PRODUCT THESE LIMITATIONS ON POTENTIAL LIABILITIES WERE AN ESSENTIAL ELEMENT IN SETTING THE PRODUCT PRICE INTEL NEITHER ASSUMES NOR AUTHORIZES ANYONE...

Страница 45: ......

Отзывы: