wireless g pc card user manual

wireless g pc card user manual
Wireless G
pc card
user
manual
Model 524544
INT-524544-UM-0209-01
Thank you for purchasing the INTELLINET NETWORK SOLUTIONS™
Wireless G PC Card, Model 524544.
Compatible with 802.11b and 802.11g wireless access points and routers,
this card lets you upgrade your wireless network without the need to
replace existing equipment. Transfer or receive digital images, videos
and MP3 files with link speeds of up to 54 Mbps using proven and reliable
Wireless G technology. With the easy-to-follow instructions in this manual,
you’ll soon be able to enjoy the benefits of these additional features:
• 32-bit Cardbus PC card
• Supports WEP (64/128 bit), WPA and WPA2 data encryption
• Supports WMM (Wi-Fi Multimedia) for increased multimedia data
throughput
• Windows XP/Vista compatible
• Lifetime Warranty
FCC Certifications
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can radiate
radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment to an outlet on a circuit different from that to
which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
CAUTION: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user’s authority to operate
the equipment.
3
This device complies with Part 15 of the FCC Rules. Operation is subject
to the following two conditions: (1) This device may not cause harmful
interference; and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC RF R adiation Exposure Statement
This device is in compliance with SAR for general population/uncontrolled
exposure limits in ANSI/IEEE C95.1-1999 and had been tested in
accordance with the measurement methods and procedures specified in
OET Bulletin 65 Supplement C.
FCC RF RF Exposure Requirements
SAR (specific absorption rate) compliance has been established in the
laptop computer(s) configurations with a PCMCIA slot, as tested in the
application for certification, and can be used in laptop computer(s) with
substantially similar physical dimensions, construction and electrical
and RF characteristics. Use in other devices such a PDAs or lappads
is not authorized. This transmitter is restricted for use with the specific
antenna(s) tested in the application for certification. The antenna(s) used
for this transmitter must not be co-located or operated in conjunction
with any other antenna or transmitter.
R&TTE Compliance Statement
This equipment complies with all the requirements of Directive 1999/5/EC
of the European Parliament and the Council of March 9, 1999, on radio
equipment and telecommunication terminal equipment (R&TTE) and the
mutual recognition of their conformity. The R&TTE directive repeals and
replaces Directive 98/13/EEC (Telecommunications Terminal Equipment
and Satellite Earth Station Equipment) as of April 8, 2000.
EU Countries Intended for Use
The ETSI version of this device is intended for home/office use in Austria,
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy,
Luxembourg, the Netherlands, Portugal, Spain, Sweden and the U.K., and
is also authorized for use in EFTA member states Iceland, Liechtenstein,
Norway and Switzerland. (EU countries not intended for use: none.)
4
table of contents
section page
Installation...........................................................................................6
Hardware......................................................................................6
Software (Driver & Configuration Utility)......................................6
Zero Configuration Tool...........................................................7
Configuration .....................................................................................9
General....................................................................................... 10
Available Network.............................................................................11
Profile.......................................................................................... 12
Profile Configuration.............................................................. 12
Advanced.................................................................................... 15
Status.......................................................................................... 16
Statistics..................................................................................... 17
Wi-Fi Protect Setup.................................................................... 17
Set Wizard.................................................................................. 18
Frequently Asked Questions..................................................................21
Specifications................................................................................... 23
NOTE: Some of the installation and configuration procedures in this
manual correspond to Windows XP. The procedures are similar for
Windows Vista. Additionally, some screen images have been modified
to fit the format of this manual.
CONTENTS
5
installation
hardware
1.Turn on the notebook computer.
2.Carefully but firmly insert the Wireless G PC Card into an available
PCMCIA slot on the notebook computer.
software (driver & configuration utility)
NOTE: Prior to installing the Wireless G PC Card software, uninstall
any previously loaded version of the driver and utility. The following
Windows XP procedure is similar for Windows Vista.
1.Insert the setup CD in the CD-ROM drive and run the “Setup.exe”
program.
2.When the Choose Setup
Language prompt displays, make
your selection from the menu and
click “OK.”
3.When the Welcome screen of the
InstallShield Wizard displays,
Click “Next.”
4.A Setup Status screen
displays with a status
bar indicating the
progress of the driver
Setup has finished installing the Wireless G PC Card driver and
and utility installation.
utility on your computer.
When complete, an
“InstallShield Wizard
Complete screen will
display. Click “Finish.”
6
INSTALLATION
Zero Configuration Tool
The Windows Zero Configuration Tool helps you set up the Wireless G
PC Card. By default, this is enabled.
For Windows XP
1. Right-click the icon
in the system tray
(as shown at right)
to open the Zero
Configuration Tool.
2. In the pop-up menu,
double-click “View
Available Wireless
Networks.”
3. When the Choose a
Wireless Network
screen displays (below), select the desired option and click “Connect.”
installATION
7
For Windows vista
1. Right-click the
icon in the
system tray (as
shown at right)
to open the Zero
Configuration
Tool.
2.In the pop-up
menu, double click “Connect to a Network.”
3.When the Connect to a Network screen displays (below), select the
desired option, then click “Connect.”
8
installATION
configuration
The configuration utility — which displays automatically once the card
is connected — is a powerful application that helps you configure the
card and monitor link status and statistics during the communication
process. This card/adapter will auto-connect to the wireless device that
has the better signal strength and no wireless security setting. The
configuration utility appears as an INTELLINET NETWORK SOLUTIONS
icon in the Windows system tray while the adapter is running. You
can open it by double-clicking on the icon.
Configuration of the Wireless G PC Card is done by selecting the options
and establishing the settings on the various screens made available when
you click on any of the six menu tabs: General, Profile, Available Network,
Advanced, Status and Statistics. The options and settings are presented
in detail below.
Each screen in the configuration utility displays a pair of option lines:
one at the top (above the six menu tabs) and one at the bottom (to the
left of the “Close” button).
Set Wizard (S)
Refresh: Click to update the card
list under My Computer.
INTELLINET NETWORK
Set Wizard: Click to open the
setup wizard. (See Set Wizard at the end of this section.)
View: Click to display the current status of the utility.
About: Click to check the version of the utility.
Show Tray Icon: Select
to display the red
configuration utility icon in the system tray.
Radio Off: Select to toggle between the On and Off status of the radio
of the card. If the radio is turned off, the card will not work.
Disable Adapter: Select to toggle between the Enable and Disable
options for the card.
CONFIGURATION
9
general
This screen allows you to check the operational status of the card.
Status: This is the current connection status of the card.
Speed: This is the current speed at which the card is operating.
Type: “Infrastructure” indicates that an 802.11 access point or router is
connected to the card’s network; all communication is through the
AP/router. Otherwise, “Ad hoc” displays, indicating you can connect
to another wireless station or stations in the wireless LAN without an
AP/router. (See Profile.)
Encryption: This is the current encryption setting: “None,” “WEP,”
“TKIP” or “AES.” (See Profile.)
SSID: The SSID (up to 32 printable ASCII characters) is the unique
name identified in a WLAN. The ID prevents unintentional merging
of two co-located WLANs.
Signal Strength: This indicates the current wireless signal strength.
10
CONFIGURATION
Link Quality: This indicates the current wireless link quality.
Network Address: This shows the MAC, IP address and other
information about the card.
Renew IP: Click to renew the IP address.
AVailable network
As mentioned earlier, when you open the configuration utility, the system
will scan all the channels to find access points/stations within range of
your card, then automatically connect to the wireless network with the
highest signal strength. All nearby networks will be listed on this screen,
and you can change the connection to another network.
Available Network(s): This list presents details about the available
wireless networks within range of your card (SSID, channel,
encryption, etc.). If you want to connect to any network on the list, just
double-click the selected network.
Refresh: Click to update the Available Networks list. This is a good idea
any time you change the connection network.
Add to Profile: A profile stores the settings of a network so you can
connect to it quickly. Click to add the selected network to a profile.
CONFIGURATION
11
profile
This screen lets you manage the networks you frequently connect to.
Available Profile(s): This list shows the preferred networks for the
wireless connection. You can add, remove, edit, duplicate preferred
networks or set one of the networks as the default connection.
Add/Remove/Edit: Click to delete or edit a selected profile. NOTE:
Click “Add” to manually enter a network that doesn’t appear on the
Available Networks list. (See Configure the Profile below.)
Duplicate: Select this option to create a new profile using the same
settings as the current profile.
Set Default: Click to designate a profile as the default network for the
connection from the available profiles list.
Configuring the profile
Clicking “Add” on the Profile screen displays the configuration screen.
Profile Name: Enter a recognizable profile name to easily differentiate
among the networks.
Network Name (SSID): Enter up to 32 printable ASCII characters to
create a unique name that’s identifiable within the WLAN. This ID
prevents the unintentional merging of two co-located WLANs.
12
CONFIGURATION
You can specify an
SSID for the card so
only a device with
the same SSID can
interconnect to the
card.
This is a computerto-computer (ad hoc)
network; wireless
access points are not
used.: There are two
kinds of network
types: Infrastructure
requires the presence
of an 802.11 access
point or router, and all
communication is
through the AP/router;
and ad hoc, which
lets you connect to
another wireless card
in the WLAN network without an AP/router. If this option is selected,
the card will work in Ad Hoc mode.
Channel: This setting is only available for Ad Hoc mode. Select the
number of the radio channel used for the networking. The channel
setting should be the same as the network you are connecting to.
Network Authentication: This setting has to be consistent with the
wireless networks the card is intended to connect with. Select one
of seven options from the drop-down menu.
•Open System – No authentication is needed within the network.
•Shared Key – Only wireless stations using a shared key (WEP Key
identified) are allowed to connect to each other.
•WPA 802.1X – WPA provides a scheme of mutual authentication
using either IEEE 802.1x/Extensible Authentication Protocol (EAP)
authentication or pre-shared key (PSK) technology. It provides a
high level of assurance to enterprises, small businesses and home
CONFIGURATION
13
users that data will remain protected and that only authorized users
may access their networks. For enterprises that have already
deployed IEEE 802.1x authentication, WPA offers the advantage of
leveraging existing authentication databases and infrastructure.
•WPA-PSK – This is a special mode designed for home and small
business users who do not have access to network authentication
servers. In this mode, known as Pre-Shared Key, the user manually
enters the starting password in his access point or gateway, as well
as in each of the wireless stations in the network. WPA-PSK takes
over automatically from that point, keeping unauthorized users that
don’t have the matching password from joining the network while
encrypting the data traveling between authorized devices.
•WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x/EAP
authentication or PSK technology. It also includes a new advanced
encryption mechanism using the Advanced Encryption Standard
(AES), which is required for the corporate or government user. The
difference between WPA and WPA2 is that WPA2 provides data
encryption via the AES, whereas WPA uses TKIP.
•WPA2-PSK – This is also for home and small business use. The
difference between WPA-PSK and WPA2-PSK is that WPA2-PSK
provides data encryption via AES, whereas WPA-PSK uses TKIP.
•WEP 802.1X – This is a special mode for using IEEE 802.1x/EAP
technology for authentication and WEP keys for data encryption.
Data Encryption: Select one of four options from the drop-down menu.
NOTE: Options depend on the Network Authentication selection.
•Disabled – Disables WEP Data Encryption.
•WEP – Enables WEP Data Encryption. When this is selected, you
need to continue with the setting of the WEP encryption keys.
•TKIP – Temporal Key Integrity Protocol (TKIP) changes the
temporal key every 10,000 packets (a packet is a kind of message
transmitted over a network.) This ensures much greater security
than standard WEP security.
•AES – This has been developed to ensure the highest degree of
security and authenticity for digital information. It’s the most
advanced solution defined by IEEE 802.11i for the security in the
wireless network.
14
CONFIGURATION
Note: All devices in the network should use the same encryption
method to ensure the integrity of any communication.
ASCII/Passphrase: Select either option and enter in the text field. You
must use the same passphrase or WEP key settings for all wireless
computers within the network.
Network Key: Enter a key to encrypt data transmitted in the wireless
network. NOTE: When “Passphrase” is selected, input a 10-digit hexadecimal value (0-9, a-f: “0123456aef,” for example) as the
encryption key for 64-bit WEP; input a 26-digit hexadecimal value
(0-9, a-f: “01234567890123456789abcdef,” for example) for 128-bit.
Confirm Network Key: Enter the same network key to confirm.
Key Index (advanced): Select one of the four keys to be the data
encryption key.
advanced
This screen allows you to configure more advanced settings, such as
Power Save and Wireless Mode.
Power Save: Select one of three options.
•None — This keeps the card in active mode.
•Min — This places the card in a power saving mode when it’s idle,
though some components of the card are still “alive,” or active. When
this option is selected, the power consumption is greater than “Max.”
CONFIGURATION
15
•Max — This places the card in a power saving mode when it’s idle.
Wireless Mode: Select one of two options.
•802.11b — This card is compatible with both 802.11g and 802.11b
wireless stations, but if you prefer to limit network access to 802.11b
wireless stations only, you can set the card to this mode.
•802.11g/b — If you have a mix of 802.11b and 802.11g wireless
stations in your network, this setting is recommended.
RTS Threshold: Enter the minimum packet size required for an RTS
(request to send). For packets smaller than this threshold, an RTS is
not sent and the packet is transmitted directly to the wireless network.
Select a setting within a range of 0 to 2432 bytes.
Channel Plan: Select from the drop-down menu based on your locale.
Set Defaults: Return any changed settings to default values.
Apply: Click for any changes to take effect.
status
This screen displays details that include some current settings and
information that may be needed for registration purposes and such.
16
CONFIGURATION
statistics
This screen displays real-time information about packet transmissions
and the receiving status. To begin a new count, click “Reset.”
wi-fi protect setup
If your AP/router supports WPS, simply follow the on-screen instructions.
CONFIGURATION
17
set wizard
The set wizard can help you connect to a wireless LAN or build an adhoc wireless network. For example, if you want to connect to a wireless
LAN in infrastructure mode:
1. Open the set wizard (it’s on the menu line at the top of each screen)
and select “Station (infrastructure):” Then click “Next.”
Set Wizard
Cancel
2. When the Site Survey screen displays (below), highlight/select the
network you want to connect to and click “Next.”
Set Wizard
Cancel
18
CONFIGURATION
3. When the Wireless Network Properties screen displays, enter the
security settings for the wireless network you’re conecting to.
CONFIGURATION
19
4. When the Setup TCP/IP screen displays, make your selections and
click “Finish.” You can now connect to the wireless network.
Set Wizard
20
CONFIGURATION
frequently asked questions
What is the IEEE 802.11g standard?
802.11g is an IEEE standard for high-speed wireless LAN communications,
providing a data rate of up to 54 Mbps in the 2.4 GHz band. It defines
the use of the same OFDM modulation technique specified in IEEE
802.11a for the 5 GHz frequency band and applies it in the same 2.4 GHz
frequency band as IEEE 802.11b. The 802.11g standard requires backward
compatibility with 802.11b. The standard specifically calls for:
• A new physical layer for the 802.11 Medium Access Control (MAC) in
the 2.4 GHz frequency band, known as the extended rate PHY (ERP).
The ERP adds OFDM as a mandatory new coding scheme for 6, 12
and 24 Mbps (mandatory speeds), and 18, 36, 48 and 54 Mbps
(optional speeds). The ERP includes the modulation schemes found
in 802.11b, including CCK for 11 and 5.5 Mbps and Barker code
modulation for 2 and 1 Mbps.
• A protection mechanism called RTS/CTS that governs how 802.11g
devices and 802.11b devices interoperate.
What is ad hoc?
An ad hoc-integrated wireless LAN is a group of computers, each with
a wireless LAN card, connected as an independent wireless LAN. Ad
hoc wireless LAN is applicable at a departmental scale for a branch or
SOHO operation.
What is infrastructure?
An integrated wireless and wireless-and-wired LAN is called an
infrastructure configuration. Infrastructure is applicable to enterprise
scale for wireless access to a central database, or wireless application
for mobile workers.
What is BSS ID?
A specific ad hoc LAN is called a Basic Service Set (BSS). Computers
in a BSS must be configured with the same BSS ID.
What is WEP?
Wired Equivalent Privacy is a data-privacy mechanism based on a 40bit shared-key algorithm as described in the IEEE 802.11 standard.
FAQ
21
What is WPA?
WPA is a more powerful security technology for Wi-Fi networks than
WEP. It provides strong data protection by using encryption as well as
strong access controls and user authentication. WPA utilizes 128-bit
encryption keys and dynamic session keys to ensure your wireless
network’s privacy and enterprise security.
What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses
in WEP security, especially the re-use of encryption keys. TKIP is
involved in the IEEE 802.11i WLAN security standard.
What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been
developed to ensure the highest degree of security and authenticity for
digital information, wherever and however communicated or stored, while
making more efficient use of hardware and/or software than previous
encryption standards. It is also included in IEEE 802.11i standard.
What is DSSS? FHSS? What’s the difference?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier
that changes frequency in a pattern that is known to both transmitter and
receiver. Properly synchronized, the net effect is to maintain a single
logical channel. To an unintended receiver, FHSS appears to be shortduration impulse noise. Direct-sequence spread-spectrum (DSSS)
generates a redundant bit pattern for each bit to be transmitted. This bit
pattern is called a chip (or chipping code). The longer the chip, the
greater the probability that the original data can be recovered. Even if
one or more bits in the chip are damaged during transmission, statistical
techniques embedded in the radio can recover the original data without
the need for re-transmission. To an unintended receiver, DSSS appears
as low-power wideband noise and is rejected (ignored) by most
narrowband receivers.
What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique
developed by the military for use in reliable, secure, mission-critical
communication systems. It is designed to trade bandwidth efficiency for
reliability, integrity and security. In other words, more bandwidth is
22
faq
consumed than in the case of narrowband transmission, but the tradeoff
produces a signal that is, in effect, louder and thus easier to detect,
provided the receiver knows the parameters of the spread-spectrum
signal being broadcast. If a receiver is not tuned to the right frequency,
a spread-spectrum signal looks like background noise. There are two
main alternatives, Direct Sequence Spread Spectrum (DSSS) and
Frequency Hopping Spread Spectrum (FHSS).
specifications
General
• Standards:
-IEEE 802.11b (11 Mbps Wireless LAN)
- IEEE 802.11g (54 Mbps Wireless LAN)
- IEEE 802.11e (Wi-Fi Multimedia (WMM)
- IEEE 802.11i (Wireless Encryption)
- IEEE 802.1X (RADIUS Authentication)
• Bus type: 32-bit PCI card
• Chipset: Realtek 8185L
• Frequency band: 2.4000 - 2.4835 GHz (Industrial Scientific Medical Band)
• Security:
-64/128-bit WEP data encryption
- WPA and WPA2
- IEEE 802.1X RADIUS Authentication
• Transmit power:
- 54 Mbps OFDM, 16 dBm +/- 1 dBm
- 11 Mbps CCK, 18 dBm +/- 1 dBm
• Certification: FCC Class B, CE Mark
LEDs
• Link/Activity
Environmental
• Dimensions: 5 (H) x 116 (W) x 54 (D) mm (0.2 x 4.6 x 2.1 in.)
• Weight: 0.15 kg (0.3 lbs.)
• Operating temperature: 0 – 55°C
(32 – 131°F)
• Operating humidity: 10 – 95% RH,
non-condensing
• Storage temperature: 0 – 70°C
(0 – 158°F
System Requirements
• Notebook computer with Pentium 300 MHz-compatible processor or higher
• Windows XP/Vista
• Available 32-bit PC card slot
Package Contents
• Wireless G PC Card
• Setup CD with user manual; quick install guide
specifications
23
INTELLINET NETWORK SOLUTIONS™ offers a complete line
of active and passive networking products.
Ask your local computer dealer for more information or visit
www.intellinet-network.com.
Copyright © INTELLINET NETWORK SOLUTIONS
All products mentioned are trademarks or registered trademarks of their respective owners.
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement