TRENDnet TEW-604UB User Manual
TRENDnet TEW-604UB User Manual

TRENDnet TEW-604UB User Manual

Trendnet tew-604ub wireless network adapter: user guide
Hide thumbs Also See for TEW-604UB:

Advertisement

Quick Links

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-604UB

  • Page 2: Federal Communications Commission (Fcc) Interference Statement

    Any changes or modifications (including the antennas) made to this device that are not expressly approved by the manufacturer may void the user’s authority to operate the equipment. TRENDnet declares that TEW-604UB, (FCC ID: S9ZTEW604UB) is limited in CH1~ CH11 for 2.4 GHz by specified firmware controlled in U.S.A.
  • Page 3: Table Of Contents

    Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning Chapter 1 – Wireless LAN Networking Transmission Rate Type of Wireless Networks Ad-Hoc (IBSS) Network Infrastructure (BSS) Network Wireless LAN Security Data Encryption with WEP Chapter 2 - Getting Started About Your Super G Smart Wireless USB 2.0 Adapter Package Content System Requirement...
  • Page 4: Chapter 1- Wireless Lan Networking

    Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology. HE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The adapter provides various transmission (data) rate options for you to select.
  • Page 5: Infrastructure (Bss) Network

    When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
  • Page 6 In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network. In an ESS environment, users are able to move from one access point to another without losing the connection.
  • Page 7: Wireless Lan Security

    LAN S IRELESS ECURITY Because wireless networks are not as secure as wired networks, it is vital that security settings are clearly understood and applied. The list below shows the possible wireless security levels on your adapter starting with the most secure.
  • Page 8: Data Encryption With Wep

    NCRYPTION WITH The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted between the adapter and the access point or other wireless stations to keep network communications private.
  • Page 9: Chapter 2 - Getting Started

    Chapter 2 - Getting Started This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Super G Smart Wireless USB 2.0 Adapter The Adapter is an 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment.
  • Page 10: Wireless Utility And Adapter Hardware Installation

    Wireless Utility & Adapter Hardware Installation NOTE: Please do not connect the USB adapter until instructed to do so. Follow the instructions below to install the USB Adapter and Utility. STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 When installation window appears, click Install Utility to continue.
  • Page 11 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Next STEP 6 The wizard is ready to begin installation. Click Install on it. STEP 7 At the Software Installation menu click Continue Anyway.
  • Page 12 STEP 8 Click Finish to complete the client utility installation. STEP 9 At this moment please insert your USB Adapter to your Laptop, After the following window pop up, click Next on the Fund New Hardware Wizard STEP 10 Choose “Install the software automatically”, and click Next.
  • Page 13 STEP 11 Click “Continue Anyway”. STEP 12 Click Finish to complete the installation.
  • Page 14: Using The Utility To Configure Your Network

    2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client Utility.
  • Page 15: Link Information

    2.6.1 Link Information Click the Link Information tab to see general information about the program and its operation. The following table describes the items found on the Link Information screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile tab.
  • Page 16: Site Survey

    2.6.2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click Refresh to refresh the list at any time. Connecting to a different network Hold your mouse pointer over the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network.
  • Page 17: Profile

    2.6.3 Profile To add a new configuration profile, click Add on the Profile tab. To modify a configuration profile, select the configuration from the Profile list and click the Edit button.
  • Page 18: Scan Available Networks

    Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
  • Page 19 To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings screen.
  • Page 20 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x Security Settings screen. The options include: TLS , PEAP , TTLS , LEAP Profile Settings After Security Settings finished, the Advanced Settings screen will be shown as following. The following table describes the items found on the Advanced Settings screen.
  • Page 21 After advance settings are finished, the following screen showed as below. You can activate the profile now or later.
  • Page 22: Chapter 3 - Maintenance

    Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. Uninstall the Driver Follow the steps below to remove (or uninstall) the USB Adapter driver from your computer. Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2.
  • Page 23: Glossary

    Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other.
  • Page 24 WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the TEW-604UB and the AP or other wireless stations to keep network communications pri- vate. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.
  • Page 25: Limited Warranty

    Limited Warranty TRENDware warrants its products against defects in material and workmanship, under normal use and service, for the following lengths of time from the date of purchase. Wireless Products – 3 Years Warranty If a product does not operate as warranted above during the applicable warranty period, TRENDware shall, at its option and expense, repair the defective product or part, deliver to customer an equivalent product or part to replace the defective item, or refund to customer the purchase price paid for the defective product.

Table of Contents