Planet WL-U356R User Manual

Planet WL-U356R User Manual

802.11g wireless usb 2.0 adapter

Advertisement

Quick Links

802.11g Wireless USB 2.0 Adapter
WL-U356R
User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for Planet WL-U356R

  • Page 1 802.11g Wireless USB 2.0 Adapter WL-U356R User’s Manual...
  • Page 2: Federal Communication Commission Interference Statement

    Copyright Copyright © 2006 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of PLANET.
  • Page 3 Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately. Revision User’s Manual for PLANET 802.11g Wireless USB Adapter Model: WL-U356R Rev: 1.0 (February 2006) Part No. EM-WLU356R...
  • Page 4: Table Of Contents

    CONTENTS 1 INTRODUCTION ..............1 1.1 Features ......................1 1.2 Specifications....................1 1.3 Package Contents ..................2 2 INSTALLATION PROCEDURE..........3 3 CONFIGURATION UTILITY ............. 6 3.1 Site Survey ..................... 6 3.2 Profile ......................7 3.2.1 Configure the Profile ..................9 3.2.1.1 Configuration....................
  • Page 5: Introduction

    802.11b devices, and spares the effort of opening up the case of your desktop computer. The WL-U356R supports specific ways to increase the data transfer rate at a time: compress the data and decrease the waiting time to send the next data to the Routers or APs. This feature is called Turbo Mode.
  • Page 6: Package Contents

    1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: 1 x WL-U356R 1 x USB Cable 1 x Driver and User's manual CD 1 x Quick Installation Guide...
  • Page 7: Installation Procedure

    Note2: If you have installed other Wireless PC Card driver & utility before, please uninstall them first. 1. Plug the WL-U356R into the USB port of the computer. When the “Found New Hardware Wizard” appears, click “Cancel”. 2. Insert the bundled CD into the CD-ROM drive to launch the autorun program. Once completed, a menu screen will appear.
  • Page 8 7. You can see the installation progress in this screen. 8. The system will automatically detect the card and display “Found New Hardware Wizard” screen. Click “Install the Software Automatically” to continue.
  • Page 9 9. When the “Hardware Installation” screen appears, click “Continue Anyway” to proceed. 10. Click “Finish” to complete “Found New Hardware Wizard”. 11. Click “Finish” to complete “PLANET WL-U356R Setup”.
  • Page 10: Configuration Utility

    3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the WL-U356R and monitor the link status and the statistics during the communication process. When the WL-U356R is installed, the configuration utility will be displayed automatically. This card will auto connect to wireless device which has better signal strength and no wireless security setting.
  • Page 11: Profile

    You can change the connection to another networks or add one of the networks to your own profile list. Parameter Description Available Networks This list shows all available wireless networks within range of your card. It also displays the information of the networks including the SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type.
  • Page 12 Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
  • Page 13: Configure The Profile

    WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the WL-U356R and then only the device with the same SSID can interconnect to the card. If you want to add the network nearby to the profile list, pull down the menu, all the networks will be listed for you to add one of them to the profile list.
  • Page 14 Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless station in the Wireless LAN network without through an Access Point or Router.
  • Page 15: Authentication And Security

    performance. Select a setting within a range of 256 to 2346 bytes. Minor change is recommended. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to.
  • Page 16 WPA – WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks.
  • Page 17: 802.1X Setting-Certification

    than the standard WEP security. AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication.
  • Page 18 IEEE 802.1x RADIUS RADIUS Access Client Client Server Access Point Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the (3) Send username, password to network. RADIUS server. (4) Approve or deny user (2) Login with username, login to the LAN. password.
  • Page 19 EAP-TLS/Smart card and Generic Token Card. The client certificate is optional required for the authentication. TLS/Smart Card –TLS is the most secure of the EAP protocols but not easy to use. It requires that digital certificates be exchanged in the authentication phase. The server presents a certificate to the client.
  • Page 20: 802.1X Setting-Ca Server

    3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
  • Page 21: Link Status

    blueberry.zeelans.com) but it may be any name used in the certificate name field. Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to.
  • Page 22: Statistics

    Link Quality This bar indicates the quality of the link. The higher the percentage, the better the quality. If you want to know the signal strength in the unit of dBm, select this check box. Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the more radio signal been received by the card.
  • Page 23: Advance

    Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc. Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode.
  • Page 24 B/G Protection If you have a mix of 802.11b and 802.11g wireless stations in the network, it is recommended to enable the protection mechanism. This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the card will be a little lower due to many of frame traffic should be transmitted.
  • Page 25 CCX 2.0 CCX 2.0 (Cisco Compatible Extensions) is developed by Cisco for the radio monitoring and fast roaming. LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication, including communication with the main RADIUS server.
  • Page 26: About

    When the WL-U356R is connected to the AP or Router with WMM function, you can enable the function of the card by following the steps below.
  • Page 27 B. Right Click the “Wireless Network Connection” and select “Properties”. C. Click “Configure…”.
  • Page 28 D. Select “Advanced” page, enable the “WMM Capable”.
  • Page 29: Advanced Settings

    Advanced Settings The WL-U356R provides more advanced parameters in Windows Device Manager. You can find the Advanced configuration following the step A to D in section 3.7. Please check below to know the function of the settings. Note: The chipset manufacturer reserves those functions in red for future use. Those options are not effective on WL-U356R.
  • Page 30 IEEE 802.11h Not applicable on WL-U356R. Using different MAC address if wanted. This MAC address will not Local Administration MAC... write to EEPROM. It is only used in run time. Network Type Selecting Infrastructure or AdHoc mode. Power Saving Mode Selecting different power mode.
  • Page 31: Troubleshooting

    4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 32 6. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 33 13. What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents