Download Print this page
LM Technologies LM811 User Manual

LM Technologies LM811 User Manual

Wi-fi & bt smt module

Advertisement

Quick Links

LM811-0451
LM811 Wi-Fi & BT SMT Module
+\HS 4VKL *SHZZ   0,,, INU
<:,9»: .<0+,
=,9:065 
-VY :VM[^HYL +V^USVHKZ MVY [OPZ KL]PJL WSLHZL ]PZP[
^^^ST[LJOUVSVNPLZJVTKV^USVHKZ
ª "MM SJHIUT SFTFSWFE
"MM USBEF OBNFT BSF SFHJTUFSFE USBEFNBSLT PG SFTQFDUJWF NBOVGBDUVSFST MJTUFE
5IJT NBOVBM NBZ OPU CF DPQJFE JO BOZ NFEJB PS GPSN XJUIPVU UIF XSJUUFO DPOTFOU PG PSJHJOBM NBLFS

Advertisement

loading
Need help?

Need help?

Do you have a question about the LM811 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for LM Technologies LM811

  • Page 1 LM811-0451 LM811 Wi-Fi & BT SMT Module +\HS 4VKL *SHZZ   0,,, INU <:,9»: .<0+, =,9:065  -VY :VM[^HYL +V^USVHKZ MVY [OPZ KL]PJL WSLHZL ]PZP[ ^^^ST[LJOUVSVNPLZJVTKV^USVHKZ ª "MM SJHIUT SFTFSWFE "MM USBEF OBNFT BSF SFHJTUFSFE USBEFNBSLT PG SFTQFDUJWF NBOVGBDUVSFST MJTUFE...
  • Page 2 ;()3, 6- *65;,5;: Information To User ..........…….. I Introduction ............…… 1 Wireless LAN Basics ..........……. 3 IP ADDRESS ............……. 4 Install Driver/Utility ..........……. 5 4.1 Windows XP/Vista/Win7 / 8 / 8.1 / 10......5 Wireless/Bluetooth Network Configuration ......7 5.1 Utility Icon ............7 5.2 Client Mode (Default Setting)........
  • Page 3 The channel identifiers, channel center frequencies, and regulatory domains of each 22-MHz-wide channel are shown in following Table. Regulatory Domains Frequency Channel Identifier (MHZ) North Japan ETSI Israel Mexico America 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472...
  • Page 4  0U[YVK\J[PVU Thank you for your purchase of the /0 :L)L 0RGXOH. Featuring wireless technology, this wireless networking solution has been designed for both large and small businesses, and it is scalable so that you can easily add more users and new network features depending on your business scale.
  • Page 5: Before You Start

    BEFORE YOU START +DYH WKH PRGXOH DQG VRIWZDUH UHDG\ /0 :L)L 11n USB 0RGXOH 6RIWZDUH 'RZQORDGDEOH IURP /0 7HFKQRORJLHV ZHEVLWH KWWSOPWHFKQRORJLHVFRPSURGXFWZLILDQGEOXHWRRWKXVEPRGXOHGXDOPRGHFODVVOP CONNECTING YOUR WLAN 11n USB Client 0RGXOH Connect your /0 WLAN 11n USB 0RGXOH. Install WKH driver.
  • Page 6  >PYLSLZZ 3(5 )HZPJZ Wireless LAN network defined by IEEE 802.11b/g standard committee could be configured as : Ad Hoc wireless LAN. Infrastructure wireless LAN. Ad Hoc network is a group of wireless LAN cards, this group is called a BSS (Basic Service Set). This group can use their wireless LAN cards to communicate with each other, but can not connect to the Internet.
  • Page 7  07 (KKYLZZ $IWHU GRZQORDGLQJ WKH VRIWZDUH UXQ LW \RX ZLOO EH SURPSWHG DV IROORZV RU VLPLODU Step 1 : Win UAC Dialog is shown. Click to continue. Step 2 : Preparing Setup dialog is shown Step 3 : Wizard is ready to install WKH driver and utility.
  • Page 8 Installing Cisco 802.1x module Step 4 : Click Finish to complete WKH installation. The installation will WDNH HIIHFW after windows UHVWDUWV...
  • Page 9  >PYLSLZZ 5L[^VYR *VUMPN\YH[PVU 7KH /0 :L)L 11n USB 0RGXOH uses its own management software. All functions controlled by users are provided by this application. When you insert the WLAN 0RGXOH into your laptop or desktop, aQ icon should appear in the Windows System Tray QHDU WKH FORFN automatically.
  • Page 10: General Setting

    5.2.1 GENERAL SETTING Once WKH device is set, double click on WKH icon and the Fonfiguration window will pop up as shown. It shows the current connected network. The signal strength and link quality are DOVR displayed. The bar graph displays the quality and strength of the link between the node and its Access...
  • Page 11 5.2.3 AVAILABLE NETWO5K SETTING Click Available Network tab and it will show all WKH available networks that WKH radio can reach. Select D proper SSID & BSSID you want to connect. Click WKH Refresh button to force and rescan WKH FXUUHQW available networks.
  • Page 12 5.2.5 WiFi Protected Setup An easy and secure setup solution for D WiFi network. <ou can choose D PIN Code or Push Button method to connect to an AP. Pin method: Step 1 : Press WKH “Pin Input Config (PIN)” button. Step 2 : Select a specific AP...
  • Page 13 Step 3 : Enter the PIN code into your AP. Step 4 : Select WKH AP that you want to configure. Step 5: Wait for configuring your wireless AP to be the security setting.
  • Page 14 PBC method: Step 1 : Press “Push Button Config (PBC)” button Step 2 : Push the physical button on our AP or visual button on he WPS configuration page.
  • Page 15 5.3 Virtual WiFi Setup Step 1 : Click “Virtual WiFi allowed” option to enable Virtual WiFi configuration / status page. Step 2 : Click “Start Virtual WiFI Soft AP” option to start Step 3 : Click “Config” button to configure Soft AP SSID and Security Key.
  • Page 16 Add a Bluetooth Enabled Device To add a Bluetooth enabled device to your computer, you can use the Bluetooth icon located in the taskbar notification area or you can use a menu item in the Bluetooth Devices control panel. NOTE: Before a Bluetooth device can be found, it must be within range and set to be discoverable.
  • Page 17 Windows 10 Setting Use Bluetooth to facilitate wireless data transfers with other Bluetooth-enabled devices. Pairing with other Bluetooth-enabled devices You need to pair your Notebook PC with other Bluetooth-enabled devices to enable data transfers. To do this, use your touchpad as follows: Launch the Charms bar.
  • Page 18  ;LJOUPJHS :WLJPMPJH[PVUZ WLAN and Bluetooth combo PRGXOH, USB interface Product Name Standards IEEE 802.11b/g/n, Bluetooth v2.1+EDR/ v3.0/ v3.0+HS/ v4.0 WLAN: 802.11b: 11, 5.5, 2, 1 Mbps 802.11g: 54, 48, 36, 24, 18, 12, 9, 6 Mbps 802.11n: MCS0 to 7 for HT20MHz, MCS0 to 7 for HT40MHz Data Transfer Rate Bluetooth: Basic rate: 1Mbps...
  • Page 19  ;YV\ISLZOVV[PUN Symptom : The dongle is linking, but can’t share files with others. Remedy : Make sure the file and printer sharing function is enabled. You can enable the function by checking the icon of My Computer -> Control Panel ->...
  • Page 20  .SVZZHY` IEEE 802.11 Standard The IEEE 802.11 Wireless LAN standards subcommittee, which is formulating a standard for the industry. Access Point An internet working device that seamlessly connects wired and wireless networks together. Ad Hoc An Ad Hoc wireless LAN is a group of personal computers, each with a WLAN adapter, connected as an independent wireless LAN.
  • Page 21 systems, such as a LAN and a mainframe. In Internet terminology, a gateway is another name for a router. Generally a gateway is used as a funnel for all traffic to the Internet. IEEE Institute of Electrical and Electronics Engineers Infrastructure An integrated wireless and wired LAN is called an Infrastructure configuration.
  • Page 22 uses the same IP address every time it reboots and logs on to the network, unless it is manually changed. Temporal Key Integrity Protocol (TKIP) The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs.
  • Page 23 cracked in a couple of hours with off-the-shelf tools. Wireless LAN (WLAN) A wireless LAN does not use cable to transmit signals, but rather uses radio or infrared to transmit packets through the air. Radio Frequency (RF) and infrared are the commonly used types of wireless transmission. Most wireless LANs use spread spectrum technology.
  • Page 24 mechanism, the transmitting station sends out an RTS packet to the receiving station, and waits for the receiving station to send back a CTS (Clear to Send) packet before sending the actual packet data. This setting is useful for networks with many clients. With many clients, and a high network load, there will be many more collisions.
  • Page 25 802.1x Authentication 802.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which was defined for dial-up authentication with Point-to-Point Protocol in RFC 2284. Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages that convey the shared key information critical for wireless security.
  • Page 26: Federal Communication Commission Interference Statement

    WR WKH HQFORVHG PRGXOH 7KLV H[WHULRU ODEHO FDQ XVH ZRUGLQJ VXFK DV WKH IROORZLQJ ³&RQWDLQV )&& ,' VV;LM811-0451´ DQ\ VLPLODU ZRUGLQJ WKDW H[SUHVVHV WKH VDPH PHDQLQJ PD\ EH XVHG 7KLV HTXLSPHQW FRPSOLHV ZLWK )&& UDGLDWLRQ H[SRVXUH OLPLWV VHW IRUWK IRU DQ XQFRQWUROOHG HQYLURQPHQW 7KLV...