Topcom SKYR@CER USB 4001G User Manual

802.11g wireless lan usb adapter
Hide thumbs Also See for SKYR@CER USB 4001G:

Advertisement

Quick Links

S
k
y
r
@
c
e
r
U
S
B
4
0
0
1
g
S
k
y
r
@
c
e
r
U
S
B
4
0
0
1
g
Full User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Topcom SKYR@CER USB 4001G

  • Page 1 Full User Guide...
  • Page 3: Table Of Contents

    CONTENTS Features ... 2 Specifications... 2 Package Contents ... 3 Site Survey ... 8 Profile... 9 3.2.1 Configure the Profile ...10 3.2.1.1 Configuration ... 10 3.2.1.2 Authentication and Security ... 12 3.2.1.3 802.1x Setting-Certification ... 16 3.2.1.4 802.1x Setting-CA Server ... 17 Link Status ...
  • Page 4 1 Introduction Thank you for purchasing the 802.11g Wireless LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps).
  • Page 5: Features

    1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security.
  • Page 6: Package Contents

    1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One CD (Driver/Utility/User’s Manual)
  • Page 7: Installation Procedure

    2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/2003 Server.) Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver &...
  • Page 8 C. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode. Or you can choose “Optimize for Wi-Fi mode” to let the adaptor run in standard wireless network.
  • Page 9 D. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor E. Please click “Finish” to complete the installation.
  • Page 10 The Topcom Configuration Utility appears as an icon on the system tray of Windows while the adaptor is running. You can open the utility by double-click on the icon.
  • Page 11: Site Survey

    Site Survey When you open the Topcom Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed.
  • Page 12: Profile

    Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Profiles List Add/Delete/Edit Button Activate Button Description The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc.
  • Page 13: Configure The Profile

    3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Profile Name SSID Description Define a recognizable profile name for you to identify the different networks. The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 14 Parameter PSM (Power Saving Mode) Network Type TX Power Ad Hoc Wireless Mode Preamble Description The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The adaptor will always set in active mode.
  • Page 15: Authentication And Security

    Parameter RTS Threshold Fragment Threshold Channel 3.2.1.2 Authentication and Security Parameter Authentication Type Description Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes.
  • Page 16 Parameter Authentication Type 802.1x Setting Description LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern.
  • Page 17 Parameter Encryption Mode WPA Pre-Shared Key WEP Key (Key1 ~ Key4) Description None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security.
  • Page 18 The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
  • Page 19: 802.1X Setting-Certification

    3.2.1.3 802.1x Setting-Certification Parameter Authentication Type Session Resumption Identity Password Use Client Certificate Description The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS –...
  • Page 20: 802.1X Setting-Ca Server

    Parameter Tunneled Authentication Protocol Identity Password 3.2.1.4 802.1x Setting-CA Server Parameter Use Certificate Chain Certificate Issuer Description When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of <name of the user>@<user’s home realm>.
  • Page 21: Link Status

    Parameter Allow Intermediate Certificates Server Name Server name must match exactly Domain name must end in specified name Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Description A server designates an issuer as a trusted root authority by placing the issuer's self-signed certificate, which contains the issuer's public key, into the trusted root certification authority certificate store of the host computer.
  • Page 22 Parameter Status Extra Info Channel Link Speed (Mbps) Throughput (Kbps) Link Quality Signal Strength Noise Level Description Display the SSID and MAC ID of the network the adaptor is connecting to. Display the link status. Display the number of the radio channel and the frequency used for the networking.
  • Page 23: Statistics

    Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics. You may reset the counters by clicking ”Reset Counter”. Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
  • Page 24 Parameter Wireless Mode Select Your Country Region Code The available channel differs from different countries. For example: B/G Protection Tx Rate Tx BURST Description 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to set the adaptor to this mode.
  • Page 25 Parameter Enable TCP Window Size Fast Roaming at -70dBm Turn Off RF Button CCX 2.0 LEAP Turn on CCKM Enable Radio Measurement Non-Serving Channel Measurements Limit xxx milliseconds (0-2000) Description The TCP Window is the amount of data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it.
  • Page 26: About

    About By choosing this option, you can click the hyperlink to connect the website for the information of the wireless chipset vendor and review basic information about the Utility such as the Driver, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. Turbo Mode This adaptor supports specific ways to increase the data transfer rate at a time;...
  • Page 28: Troubleshooting

    4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 29 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 30 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents