1 Introduction The 802.11g WLAN USB Adapter provides greater performance than ever before. Incorporated with latest IEEE 802.11g technology, the WLAN USB Adapter is not only compliant with other 802.11g products but allows you to connect with other 802.11b devices. With WPA (Wi-Fi Protected Access) and 64/128-bit WEP encryption, the WLAN USB Adapter ensure the security of your network communication.
1.4 Systems Requirements 1.One USB 1.1/ USB 2.0 slot. 2.A laptop computer with an available USB1.1 / USB 2.0 slot. 3.Operating System: Windows 98SE/2000/ME/XP 4.60M bytes free disk space for utility and driver installation. Note : If you insert the 802.11g WLAN USB Adapter before installing the driver and utility, the operating system will detect a new device and start to configure the new device.
3.Software Installation 3.1Installing WLAN USB Adapter Utility and Driver Insert the setup CD into your CD-ROM Device. Then, the Install ShieldWizard should launch automatically, if it does not launch automatically, Double-click setup.exe in your CD-ROM Drive.
Page 8
Click Next button in the following window. The InstallShield Wizard is copying the necessary files to the system. The progress indicator shows the installing...
Page 9
status. Plug-in the WLAN USB Adapter into your USB slot when the window below appears. If this is the first time you install the software, the window below will appear. Select your current country region then...
Page 10
click Next. Click Finish ,when the installation is completed.
After completing the installation, the icon will appear in the system tray. Double-click the icon to configure the WLAN USB Adapter. 3.2 Uninstalling the Driver and Utility You may follow the instruction step by step to uninstall the WLAN USB Adapter completely. Insert the setup CD or execute the setup.exe again.
Page 12
The following window should launch automatically. Select Remove, and click Next.
After the Configuration Utility has been installed, an icon will placed in the system tray when the WLAN USB Adapter is inserted. Click the icon and the configuration utility will pop up. The utility was six tabs: Profile, Link Status, Site Survey, Statistics Advance, and About. You should change all your configuration settings for your WLAN USB Adapter using this utility.
Specific different network profile settings used in various locations, such as your office, your home, the factory, or the airport. In each profile, you can specify a network type, network name, WEP and security setting parameters required for that operating location. 4.1.1.1 System Configuration Edit profile Network Type: The column in Profile list from left to right is “Profile”、”SSID”、”Channel”、”Authentication”、”Encryption”and “Network Type”...
Page 17
SSID: All wireless devices within the ESS or extended wireless LAN use the SSID. This can be any alphanumeric value of up to 32 characters long. Use this to prevent cross communication between two or more WLAN in one area. The SSID should be changed in order to provide some minimum security.
4.1.1.2 Edit Profile To add a new location profile name or to rename, delete, or select an existing profile, click Edit. The Edit Configurations screen appears as follows Power Save Mode: CAM: (Constant Awake Mode) CAM is the normal mode for desktop machines or other machines where power consumption is not an issue.
Page 19
performance. RTS Threshold: The RTS Threshold sets an upper threshold at which point the device will issue an RTS packet. The RTS (Request To Send) packet is used for the purpose of avoiding data collisions on the wireless LAN. There are several trade offs to consider when setting this parameter.
4.1.1.3 Authentication & Security Authentication Type: Defines authentication type of the wireless networks, including "Open System" and “Share Key” authentication. The wireless adapter will need to be set to the same authentication type to communicate. Open System: With this setting any station in the Wireless LAN can associate with an Access Point to receive and to transmit data.
WEP Key: Key 1 - Key 4: These four fields can be used to manually enter the encryption keys. This may be necessary if you wish this node to match keys in a different vendor's product. WEP Key length: The 64 or 128-bits Wired Equivalent Privacy Algorithm. You can decide the network key to be encoded by ASCII characters or hexadecimal digitals.
4.1.3 Site Survey: Click the Site Survey; you can to see the signal strength, channel, Encryption, authentication and network type of available wireless network. The AP MAC address will also be displayed at the Preferred BSSID field. Select the AP you want to connect to and click connect to establish network.
4.1.5 Advance: Wireless Mode If there are 802.11b devices in your wireless network, choose b+g mixed mode. If all the devices in your wireless network are 802.11g ones, choose 802.11g mode to get better transfer rate. Tx Burst Enable this function to burst the transmit speed, but it may affect signal quality. Radio off You can stop wireless transmission by clicking this icon.
5. Glossary Ad-Hoc Mode An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS).
Page 27
The IEEE 802.11b/g Wireless LAN standards subcommittee formulating standards for the industry. The objective is to enable wireless LAN hardware from different manufacturers to communicate. Infrastructure Mode A client setting providing connectivity to an Access Point. As compared to Ad-Hoc Mode where PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central Access Point.
Page 28
FCC Statement This device complies with FCC Rules Part 15. Operation is subject to the following two conditions: 1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Page 29
2-Year Limited Warranty Subject to the terms and conditions set forth herein, SURECOM provides this Limited warranty for its product only to the person or entity that originally purchased the product from SURECOM or its authorized reseller or distributor. SURECOM warrants that the hardware portion of the SURECOM products...
Need help?
Do you have a question about the EP-9001-g and is the answer not in the manual?
Questions and answers