MicroNet SP907NL User Manual

11n wireless lan usb adapter

Advertisement

Quick Links

User's Manual
11n Wireless LAN USB Adapter
Model No.: SP907NL
http://www.micronet.info

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SP907NL and is the answer not in the manual?

Questions and answers

Summary of Contents for MicroNet SP907NL

  • Page 1 User’s Manual 11n Wireless LAN USB Adapter Model No.: SP907NL http://www.micronet.info...
  • Page 2: Table Of Contents

    Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents ... 1 1.2 Key Features ... 1 1.3 Safety Information ... 2 1.4 System Requirements... 2 1.5 Specifications ... 3 Chapter 2 Tour of Product... 4 2.1 USB Adapter ... 4 2.1.1 LED Indication...4 Chapter 3 Configuration ...
  • Page 3 4.6 Statistics ... 40 4.7 About... 41 Chapter 5 Troubleshooting ... 43 Chapter 6 Glossary ... 44...
  • Page 4: Chapter 1 Introduction

    Chapter 1 Introduction Micronet SP907NL, 11N Wireless LAN USB Adapter, delivers next generation high speed at a more economical and affordable price tag. It is easily implemented for medium-sized business to allow immediate access to high speed wireless experience. It is compliant with IEEE 802.11n and backward compatible with IEEE 802.11b/g.
  • Page 5: Safety Information

    If the device falls into water, do not use it again before sending to the dealer of purchase for inspection. If users smell something strange, or even see some smoke coming out from the network card, remove the power supply or switch the electrical power off immediately, and call authorized for help. System Requirements An empty USB 2.0 port (USB 1.1 will degrade the performance...
  • Page 6: Specifications

    Specifications Standards Interface Frequency Band Data Rate Output Power Security LED Indicators Antenna MIMO Technology Humidity Temperature Operating System Emission IEEE802.11b/ 802.11g / 802.11n USB 2.0/1.1 2.4000 ~ 2.4835GHz 11b: 1/2/5.5/11Mbps 11g: 6/9/12/24/36/48/54Mbps 11n (20MHz): MCS0-7 (up to 72Mbps) 11n (40MHz): MCS0-7 (up to 150Mbps) 11n: 14dBm±1.5dBm 11g: 14dBm±1.5dBm 11b: 17dBm±1.5dBm...
  • Page 7: Chapter 2 Tour Of Product

    Chapter 2 Tour of Product USB Adapter USB Connector: insert this side of the device into an available USB slot. Connector Cab: for protecting device when not in use. WPS button: located on the bottom side of the device for activating WPS pairing mode.
  • Page 8: Chapter 3 Configuration

    Chapter 3 Configuration Drivers Installation Step 1. Gently insert the USB adapter into an available USB slot. The following message will appear, please press <Cancel>. Step 2. Insert driver CD into the CD/DVD ROM drive of the computer, and execute ‘Setup.exe’ program in ‘Utility’ folder. Read through the License Agreement and select ‘I accept the terms of the license agreement’...
  • Page 9 Step 3. It is recommended to select ‘Install driver and Ralink WALN Utility’ for first-time installation. Otherwise select second option to update existing drivers. Step 4. The following windows will appear, please press on ‘Install’ to start the process.
  • Page 10: Operating Configuration Utility

    Step 5. Click <Finish> to complete the driver installation process. Operating Configuration Utility After installation is complete, wireless configuration utility will be shown as an icon at the lower-right corner of the windows desktop. Click on the icon using right mouse key and select <Launch Config Utilities>.
  • Page 11 Step 1. Configuration utility will scan for available wireless access points automatically. Please select an access point to connect, and click <Connect>. If the AP you wish to connect is not in the list, please press <Rescan> to renew the interface. Some function includes more information, and can not be fitted in setup area.
  • Page 12: Scan For Other Wireless Devices

    3.2.1 Scan for Other Wireless Devices There are two kinds of wireless connection mode: Infrastructure and Ad-Hoc. Infrastructure mode is used by wireless access points, which is able to establish wireless connection for you and other wireless/wired network clients. Ad-Hoc mode is also know as ‘point-to-point’ mode, and in this mode, wireless devices such as computer or PDA will not be capable to establish wireless connection with more than one wireless device, and is suitable for establishing a one-to-one wireless connection between two wireless devices.
  • Page 13 If the wireless device uses encryption, the user must know its encryption key in order to connect. Please launch utility and it will scan for wireless access points near by: Parameter The SSID of the wireless access point or wireless device selected by user will be displayed here.
  • Page 14: Connect To Access Point

    If users cannot see the access point, please click ‘Rescan’ button to scan for access point again, until the one preferred is displayed on the interface. Users may have to click ‘Rescan’ for more than two times before the access point wish to connect appears.
  • Page 15 Step 1. Click the wireless access point or network device to connect, it will be highlighted, then click on ‘Connect’. If the access point selected does not use encryption, it will connect to this device within one minute. If the access point selected uses encryption, please proceed to step 3.
  • Page 16 Step 4. Please ask the owner of the wireless access point for the security information, and input the correct key here and then click on ‘OK’. By checking ‘Show Password’ box, the encryption key inputted here will be displayed. Authentication type will be selected by the access point automatically, please do not change it.
  • Page 17: Add Access Point To Profile

    3.2.3 Add Access Point to Profile If users connect to some specific wireless access point frequently, they can add their information to the profile. Just like the telephone directory, the profile saves all information of access points, and user can recall them anytime. User can add an access point in the ‘Network’...
  • Page 18 (Power saving mode, switches radio off when not transferring Power Save Mode data). It’s recommended to choose ‘PSM’ if user is using this network card with notebook computer to help the battery last longer. Check this box to set the RTS threshold. User can drag the...
  • Page 19 Parameter Select the authentication type of the wireless access point or wireless device in this field. When users are adding a profile Authentication from an existing access point or wireless device, authentication type will be selected automatically. Select the encryption type of the wireless access point or wireless device in this field.
  • Page 20 Parameter Select ‘802.1x EAP method’ from dropdown menu. Please EAP Method ask the administrator of the access point for the correct EAP method. Select 802.1x tunnel authentication type from dropdown menu. Please ask the administrator of the access point for correct tunnel authentication method.
  • Page 21: Using Windows Zero Configuration

    3.2.4 Using Windows Zero Configuration Windows XP and Vista has a built-in wireless network configuration utility, called ‘Windows Zero Configuration’ (WZC). Users can also use WZC to configure the wireless network parameter. Step 1. Right-click on configuration utility icon and select <Use Zero Configuration as Configuration utility>.
  • Page 22 Step 3. Click <Network Connections>. Step 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’.
  • Page 23 to the access point. Otherwise, users can press refresh button to rescan access points. Select the access point if it’s shown, then click <Connect>. Step 6. If the wireless access point uses encryption, users will have to input the correct WEP passphrase or WPA pre-shared key. Ensure both the AP and PC is set with the same WEP passphrase/WPA pre-shared key.
  • Page 24: Profile Management

    3.2.5 Profile Management If users need to connect to different wireless access points at different time, they can store the connection parameters (encryption, passphrase, security etc, etc.) as a profile for every access point. Click the ‘Profile’ menu and all profiles will be listed in ‘Profile List’.
  • Page 25 Add a Profile If users want to create new profile, click ‘Profile’ menu, then press ‘Add’ button. The interface will prompt the user to input detailed information of access point. Edit a Profile...
  • Page 26 If users have added a profile before, and they wish to change the content of the profile, they can use this function. Please select a profile from the list, and then click on ‘Edit’ button. The interface will provide contents of selected profile for editing.
  • Page 27 Activate a Profile When users want to connect to a specific wireless device in the profile list, they can select it and click ‘Activate’ button to establish connection.
  • Page 28: Advanced Settings

    When the connection is successfully established, an 3.2.6 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users. Users can change these settings to increase data transfer performance or change operation mode. Please follow the following instructions to set advanced wireless settings.
  • Page 29: View Network Statistics

    3.2.7 View Network Statistics The configuration utility provides information about network statistics and link status. If users want to know how the wireless network card is working, use these functions to get detailed information. All connection-related statistics is displayed here. Users can click ‘Transmit’ or ‘Receive’...
  • Page 30: Wmm Setting

    (VoIP), and others. When the users enable the WMM function of this network card, they can define the priority of different kinds of data to give higher priority to applications which require instant response.
  • Page 31: Wps Configuration

    WPS PBC standby mode as the instruction given by the wireless access point’s user manual. User can also set ‘Config Mode’ to ‘Registrar’. In this mode, the wireless network card will wait for other WPS-enabled access points to send WPS pairing requests. Please refer to the instruction given by the wireless access point’s user manual to...
  • Page 32 Please be patient as this may require several seconds to one minute to complete. When users see ‘WPS status is connected successfully’ message, means the connection between this wireless network card and access point is successful. Users can click ‘Detail’ button to see further information of connected access point.
  • Page 33 WPS Setup – PIN The PIN code of the wireless network card is an eight-digit number located at the upper-right position of configuration utility. Remember the code and input the number to the wireless access point as the WPS PIN code.
  • Page 34: Radio On/Off

    3.2.10 Users can switch the wireless radio transceiver on and off via the utility interface, therefore it is not necessary to physically remove the network card from the PC/laptop. Step 1. To switch wireless radio on/off, please click on ‘Radio On/Off’ button.
  • Page 35: About

    3.2.11 About The ‘About’ tab provides the information about version number of the configuration utility, driver, and other important information about the wireless network card.
  • Page 36: Chapter 4 Soft-Ap Function

    If users want to switch the wireless card back to station mode (become a client of other wireless access points), click ‘Switch to Station Mode’. A configuration window will appear after switching the operation mode to ‘AP’, which asks users to assign an existing network card with internet connection.
  • Page 37 If the computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’. If your computer does not have another network card with Internet connection, please click ‘Not enable ICS’.
  • Page 38 Parameter Please input the SSID (the name used to identify this wireless SSID access point) in this field. Up to 32 numerical characters can be accepted here excepting space. Please select the wireless channel to use for the environment. Channel The number of channels available here will vary depending on the setting of ‘Country Region Code’.
  • Page 39: Security Setting

    Country Region Code No forwarding among wireless clients Hide SSID Allow BW 40 MHz Tx BURST Beacon(ms) TX Power Idle Time Click <Apply> to save the changes. Security Setting This wireless card supports wireless encryption in AP mode, which will encrypt the data being transferred over the air to enhance data security level.
  • Page 40 Parameter Please select a wireless authentication type to use. Available options are ‘Open’, ‘Shared’, WPA-PSK’, ‘WPA2-PSK’, and Authentication Type ‘WPA-PSK / WPA2-PSK’. If users want to disable wireless data encryption, please select ‘Open’. Please select an encryption mode. The available options in this setting item will vary depending on the authentication type Encryption Type selected.
  • Page 41: Access Control

    WEP Key Show Password When you finish with setting and want to save changes, click <Ok> button, or click <Cancel> button to discard all changes made. Access Control If users are not going to open the computer and wireless resources to the public, they can use MAC address filtering function to enforce the access control policy.
  • Page 42: Mac Table

    Parameter Access Policy MAC address Delete Remove All Click <Apply> to save the changes. MAC Table If users want to see the list of all wireless clients connected to this access point, please select ‘Mac Table’ tab from the utility. Description Select the policy type of your access rule.
  • Page 43: Event Log

    Parameter MAC Address Power Saving Mode Status Event Log This software access point will log all wireless-related activities as a log. Click ‘Event Log’ tab, and the interface below will be displayed. Statistics If users want to know detailed information about how the software access point works, click ‘Statistics’...
  • Page 44: About

    About The ‘About’ tab provides the information about version number of the configuration utility, driver, and other important information about the wireless access point.
  • Page 46: Chapter 5 Troubleshooting

    Chapter 5 Troubleshooting If users encounter any problem when using this wireless network card, consult this section for possible solutions. Before calling the dealer of purchase for help, please check this troubleshooting table, the solution towards the problem could be very simple.
  • Page 47: Chapter 6 Glossary

    Chapter 6 Glossary 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 48 RTS/CTS Feature Fragmentation Power Management 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers with their own Wireless LAN Card connecting as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. 5.
  • Page 49 9. What is AES? AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level.
  • Page 50 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread- spectrum signal being broadcast.
  • Page 51 16. What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devices using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability.

Table of Contents