U-Media WUB-375L User Manual

802.11n/g/b wireless usb adapter

Advertisement

Quick Links

802.11n/g/b Wireless USB Adapter
Model: WUB-375L
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for U-Media WUB-375L

  • Page 1 802.11n/g/b Wireless USB Adapter Model: WUB-375L User's Guide...
  • Page 2: Ce Mark Warning

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3: Table Of Contents

    Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning Chapter 1 – Wireless LAN Networking Transmission Rate Type of Wireless Networks Ad-Hoc (IBSS) Network Infrastructure (BSS) Network Wireless LAN Security Data Encryption with WEP Chapter 2 - Getting Started About Your 802.11n/b/g WLAN USB2.0 Adapter Package Content System Requirement...
  • Page 4: Chapter 1- Wireless Lan Networking

    Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology. HE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. HANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The adapter provides various transmission (data) rate options for you to select.
  • Page 5 When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
  • Page 6 In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 7 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the adapter automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 9: Wireless Lan Security

    L AN S IRELESS ECURITY Because wireless networks are not as secure as wired networks, it’s vital that security settings are clearly understood and applied. The list below shows the possible wireless security levels on your adapter starting with the most secure.
  • Page 10: Data Encryption With Wep

    D ATA E NCRYPTION WITH W E P The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted between the adapter and the access point or other wireless stations to keep network communications private.
  • Page 11: Chapter 2 - Getting Started

    Chapter 2 - Getting Started This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your 802.11 n/b/g WLAN USB2.0 Adapter The Adapter is an 802.11n, 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Adapter.
  • Page 12 STEP 2 If your CD Autorun is enabled, the installation procedures will be started. (Otherwise open your CD folder and double-click on the “setup.exe” file) STEP 3 The InstallShield Wizard prepares for installation. STEP 4 The InstallShield Wizard prompts you for confirmation. Click Next on the following menu.
  • Page 13 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Next STEP 6 The wizard is ready to begin installation. Click Install on it.
  • Page 14 STEP 7 The Install shield Wizard setup for installation. STEP 8 Click Finish to complete the client utility installation.
  • Page 15 STEP 9 At this moment please insert your USB Adapter to your Laptop through the cradle. After the following window pop up, click Next on the Fund New Hardware Wizard STEP 10 Choose “Install the software automatically” , and click Next.
  • Page 16 STEP 11 Click Finish to complete the installation.
  • Page 17: Using The Utility To Configure Your Network

    2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client Utility.
  • Page 18: Link Information

    2.6.1 Link Information Click the Link Information tab to see general information about the program and its operations. The Link Information tab does not require any configuration. The following table describes the items found on the Link Information screen. Wireless Network Status The name of the current selected configuration profile.
  • Page 19: Site Survey

    Security Status Shows security type – Disable, WEP, WPA/WPA2, Security WAP-PSK/WAP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP Status IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway address 2.6.2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click Refresh to refresh the list at any time.
  • Page 20: Profile

    Connecting to a different network Hold your mouse pointer over the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network.
  • Page 21 To modify a configuration profile, select the configuration from the Profile list and click the Edit button. Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time.
  • Page 22 To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings. Click Next to continue the profile setting.
  • Page 23 To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen.
  • Page 24 Advanced Settings After Security Settings finished, the Advanced Settings screen will be shown as following. The following table describes the items found on the Advanced Settings screen. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode.
  • Page 25 After advance settings are finished, the following screen showed as below. You can activate the profile now or later. WPS Setting The user obtains a device password (PIN Code) from the STA and enters the password into the Registrar. Both the Enrollee and the Registrar use PIN Config method for the configuration setup.
  • Page 26 Click "Refresh" button to update available WPS APs.
  • Page 27 2. Select an AP (SSID/BSSID) that STA will join to. 3. Click "PIN" button to start PIN connection. 4. Enter PIN Code of STA into the Registrar when prompted by the Registrar. *Allow of an exchange between Step 3 and Step 4.
  • Page 28 5. The result will look like the below figure. 6. Then connect successfully. The result will look like the below figure.
  • Page 29 Describe "WPS Status Bar" - "PIN - xxx" as follow : 1. A successful PIN Configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated to WPS AP ~> Sending EAPOL-Start ~> Sending EAP-Rsp (ID) ~> Receive EAP-Req (Start) ~> Sending M1 ~>...
  • Page 30: Chapter 3 - Maintenance

    Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. Uninstall the Driver Follow the steps below to remove (or uninstall) the USB Adapter driver from your computer. To remove the driver from the OS, go to Start -> Control Panel Step 1.
  • Page 31: Glossary

    Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other.
  • Page 32 ROAMING In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network. This is roaming. As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors.

Table of Contents