Advertisement

Quick Links

PCI Adapter
WL-150G
User Manual
Version 1.0

Advertisement

Table of Contents
loading

Summary of Contents for Ralink WL-150G

  • Page 1 PCI Adapter WL-150G User Manual Version 1.0...
  • Page 2: Table Of Contents

    Table of Contents 1. Installation instruction ............2 1.1 System nfiguration............2 1.2 Package contents.............2 2. Installation guide..............2 2.1 Hardware Installation ............2 2.2 Install the driver and utility..........3 2.3 Ensure the system was installed TCP/IP......4 3. The use of application ............5 3.1 Launch the utility .............5 3.2 WLAN network..............5 3.3 Connect status..............6 3.4 Statistics................7...
  • Page 3: Installation Instruction

    1. Installation Instruction 1.1 System requirement Before installation, please be sure that your computer meets the followings: With the CPU above 300MHz; With the memory at least 32MB; With OS Windows XP/2000/ME/98SE; With CD-ROM(To install the CD driver). 1.2 Package contents The following contents should be found in your box, PCI adapter Antenna...
  • Page 4: Install The Driver And Utility

    Figure 2-1 should then appear. 2.You can click No to end the installation on the Preparing Setup screen, figure 2-1. Click Yes to continue the installation process, next installation screen will appear as Figure 2-2. Figure 2-1 Ralink Wireless Card Setup Wizard...
  • Page 5: Ensure The System Was Installed Tcp/Ip

    Figure 2-2 Ralink wireless Network Card Setup (Choose Configuration tool) 3.You can choose Ralink Configuration Tool or Microsoft Zero Configuration Tool to install in the screen as Figure 2-2. The default selection is Ralink Configura tion Tool. If you click Next, the next screen will appear as Figure 2-3.
  • Page 6: The Use Of Application

    3.1 Launch the utility Double-click the icon and the Ralink Wireless Utility will run. You can also run the utility by clicking the Start>Program>Ralink Wireless Utility. The utility provides a complete and easy to use set of tools to: Manage profiles...
  • Page 7: Connect Status

    Figure 3-1 Profile Management Tab Profile Name - The name of configuration profile. Use the Edit function to change the Profile name. SSID - The IEEE 802.11 wireless network name. It is been config ured in the AP. Channel - Shows the channel of respective wireless network be used.
  • Page 8 Figure 3-2 Link status 3.3 Site survey Site Survey tab shows that the connection status of the adapter. (If connected). See figure 3-3. SSID – Means the adapter is connected or will be connected, the right figure shows that the adapter is connected, SSID is the default network. BSSID –...
  • Page 9: Statistics

    Figure 3-3 Site Survey tab Rescan – make the adapter rescan the available device. If the link is not good or the signal is weak, the rescan will make the adapter link to a better device which will take several seconds. Connect –...
  • Page 10: Advanced Configuration

    3.5 Advanced Click “Advanced” and the figure 3-5 will appear, we suggest not modify any item but keep the default configurations. Figure 3-5 Advanced Configuration tab 3.6 Configuration “Configuration” saves the configurations to each wireless network or the different configurations to one network. See figure 3-6. Figure 3-6 Profile Configuration...
  • Page 11 【General Configuration】 RTS --RTS/CTS (Request to Send/Clear to Send) is used to lower the base stations conflict to the minimum. When RTC/CTS is opened, the router will resend the data frames until another RTC/CTS finishes the handshake. You could start the RTS/CTS by configureting the packet minimum and maximum value, we suggest to use the default (2347).
  • Page 12 Authentication As there is no accurate limit of wireless network, the wireless network users need complement the specific configuration for security. The authentication in this tab provides the different protection levels, such as open, shared encryption key, LEAP, WPA, WPA, WPA-PSK,WPA2, WPA2-PSK.
  • Page 13 Protocol (TKIP) and Advanced Encryption Standard (AES) FORBID – forbid the encryption function. WEP -- the shared key performs the encryption before data wireless transportation, you could communicate with the wireless devices which use the same shared key. TKIP --TKIP uses the stricter encryption rules than the WEP, and also use the existing WLAN arithmetic to realize the encryption.
  • Page 14 Figure 3-8 802.1X configuration The authentication including, PEAP --PEAP (Protected Extensible Authentication Protocol) is an edition of EAP ( Extensible Authentication Protocol。EAP assures the mutual authentication of wireless users and server in the networking operation center. TLS/Smart Card -- TLS (Transport Layer Security),is used to configure up an encryption channel and obtain the authentication of server, similar to the webpage server authentication by SSL(Secure Sockets Layer).
  • Page 15: Zero Configuration

    4. Zero Configuration Right click the tray utility, and choose “Use Zero Configuration as configuration Utility”,and then Windows wireless network configuration could be used. See Figure 4-1. The windows wireless Network connection will prompt, choose the wireless network and click connect to setup the association.
  • Page 16 3.To configure the wireless connect properties, please right click the wireless icon in the tray and choose “Status”, open the page “wireless network link status”, see figure 4-3. Figure 4-3 Wireless Network Connection Status The page of“General” in Figure 4-3 displays link time, speed and signal strength which is shown in green line, 5 lines means good, 1 line means worse.
  • Page 17 Figure 4-4 Windows wireless properties 2.The page of “Authentication” in figure 5-5 permits you add security configuration. You could refer to Windows Help to get more informa- tion. Figure 5-5 Wireless Authentication configuration...
  • Page 18: Soft Ap

    3.The page of “Advanced” in figure 5-6 permits you configure firewall and share. You could refer to Windows Help to get more information. Figure 5-6 Wireless Network properties Advanced Configuration 5. Soft AP The adapter has two modes: working station and Soft AP. After start Soft AP, the adapter will be an AP to accept any wireless device access.
  • Page 19: Configuration Page

    Figure 5-2 Soft AP Configuration window 5.2 Configuration Page As the figure 5-2, you could make some basic configuration, such as wireless network name, mode, channel and authentication. Click the button “Auth. Vs. Security” to make different security configu- rations of wireless communication, and you could choose the authenti- cation type and encryption type.
  • Page 20: Mac List

    Figure 5-3 Access control configuration 5.4 MAC This page shows the information of the wireless devices accessed to this AP. See figure 5-4. Figure 5-4 Soft AP Accessed MAC table...
  • Page 21: Switch To Working Station Mode

    5.5 Switch to Working Station mode As the figure 5-5, in the Soft AP mode, right click the tray icon and appear a menu, please choose “Switch to Station Mode”, then the adapter is switched to working station mode together with an interface of working station.
  • Page 22: Product Specifications

    5.Product Specifications General Features Standards IEEE 802.11g; IEEE 802.11b Interface 32-bit PCI Windows 98/SE/ME,Windows 2000/XP, Windows, CE, Linux, MAX User interface Easy to use user configuration software indoor up to 100 meters and outdoor up to 300 meters (standard Transmit distance transmit distance is limited to the environments) Support multipoint auto roaming and configuration;...
  • Page 23 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio...

Table of Contents