Page 3
Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately. Revision User’s Manual for PLANET 802.11g Wireless USB Adapter Model: WL-U356R Rev: 1.0 (February 2006) Part No. EM-WLU356R...
802.11b devices, and spares the effort of opening up the case of your desktop computer. The WL-U356R supports specific ways to increase the data transfer rate at a time: compress the data and decrease the waiting time to send the next data to the Routers or APs. This feature is called Turbo Mode.
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: 1 x WL-U356R 1 x USB Cable 1 x Driver and User's manual CD 1 x Quick Installation Guide...
Note2: If you have installed other Wireless PC Card driver & utility before, please uninstall them first. 1. Plug the WL-U356R into the USB port of the computer. When the “Found New Hardware Wizard” appears, click “Cancel”. 2. Insert the bundled CD into the CD-ROM drive to launch the autorun program. Once completed, a menu screen will appear.
Page 8
7. You can see the installation progress in this screen. 8. The system will automatically detect the card and display “Found New Hardware Wizard” screen. Click “Install the Software Automatically” to continue.
Page 9
9. When the “Hardware Installation” screen appears, click “Continue Anyway” to proceed. 10. Click “Finish” to complete “Found New Hardware Wizard”. 11. Click “Finish” to complete “PLANET WL-U356R Setup”.
3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the WL-U356R and monitor the link status and the statistics during the communication process. When the WL-U356R is installed, the configuration utility will be displayed automatically. This card will auto connect to wireless device which has better signal strength and no wireless security setting.
You can change the connection to another networks or add one of the networks to your own profile list. Parameter Description Available Networks This list shows all available wireless networks within range of your card. It also displays the information of the networks including the SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type.
Page 12
Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the WL-U356R and then only the device with the same SSID can interconnect to the card. If you want to add the network nearby to the profile list, pull down the menu, all the networks will be listed for you to add one of them to the profile list.
Page 14
Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless station in the Wireless LAN network without through an Access Point or Router.
performance. Select a setting within a range of 256 to 2346 bytes. Minor change is recommended. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to.
Page 16
WPA – WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks.
than the standard WEP security. AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication.
Page 18
IEEE 802.1x RADIUS RADIUS Access Client Client Server Access Point Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the (3) Send username, password to network. RADIUS server. (4) Approve or deny user (2) Login with username, login to the LAN. password.
Page 19
EAP-TLS/Smart card and Generic Token Card. The client certificate is optional required for the authentication. TLS/Smart Card –TLS is the most secure of the EAP protocols but not easy to use. It requires that digital certificates be exchanged in the authentication phase. The server presents a certificate to the client.
3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
blueberry.zeelans.com) but it may be any name used in the certificate name field. Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to.
Link Quality This bar indicates the quality of the link. The higher the percentage, the better the quality. If you want to know the signal strength in the unit of dBm, select this check box. Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the more radio signal been received by the card.
Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc. Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode.
Page 24
B/G Protection If you have a mix of 802.11b and 802.11g wireless stations in the network, it is recommended to enable the protection mechanism. This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the card will be a little lower due to many of frame traffic should be transmitted.
Page 25
CCX 2.0 CCX 2.0 (Cisco Compatible Extensions) is developed by Cisco for the radio monitoring and fast roaming. LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication, including communication with the main RADIUS server.
Advanced Settings The WL-U356R provides more advanced parameters in Windows Device Manager. You can find the Advanced configuration following the step A to D in section 3.7. Please check below to know the function of the settings. Note: The chipset manufacturer reserves those functions in red for future use. Those options are not effective on WL-U356R.
Page 30
IEEE 802.11h Not applicable on WL-U356R. Using different MAC address if wanted. This MAC address will not Local Administration MAC... write to EEPROM. It is only used in run time. Network Type Selecting Infrastructure or AdHoc mode. Power Saving Mode Selecting different power mode.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
Page 32
6. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
Page 33
13. What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.