Edimax EW-7358Mg User Manual
Edimax EW-7358Mg User Manual

Edimax EW-7358Mg User Manual

802.11g turbo wireless lan mini-pci card

Advertisement

Quick Links

8
8
W
i
r
e
l
e
s
W
i
r
e
l
e
s
0
2
.
1
1
g
0
2
.
1
1
g
s
L
A
N
M
s
L
A
N
M
User Manual
Version: 1.0
(November, 2005)
T
u
r
b
o
T
u
r
b
o
i
n
i
-
P
C
I
i
n
i
-
P
C
I
C
a
r
d
C
a
r
d

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EW-7358Mg and is the answer not in the manual?

Questions and answers

Summary of Contents for Edimax EW-7358Mg

  • Page 1 User Manual Version: 1.0 (November, 2005)
  • Page 2 COPYRIGHT Copyright ©2005/2006 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties,...
  • Page 3: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna.
  • Page 5: Table Of Contents

    CONTENTS 1 INTRODUCTION ................1 Features ......................... 2 Specifications........................ 2 Package Contents ......................2 2 INSTALLATION PROCEDURE ............. 3 3 CONFIGURATION UTILITY ............5 Site Survey ........................7 Profile..........................8 3.2.1 Configure the Profile ..................9 3.2.1.1 Configuration ......................9 3.2.1.2 Authentication and Security ..................
  • Page 6: Introduction

    1 Introduction Thank you for purchasing the 802.11g Wireless LAN Mini-PCI Card. This module complies with IEEE 802.11g standard, which supports up to 54Mbps high-speed wireless network connections. It can also work with IEEE 802.11b devices. When the module connects to 11b devices, the link speed will be up to 11Mbps.
  • Page 7: Features

    1.1 Features • Works with both IEEE 802.11b and IEEE 802.11g products. • High-speed transfer data rate - up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports WMM function to meet the multi-media data bandwidth requirement. •...
  • Page 8: Installation Procedure

    2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the module into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000.) Note3: If you have installed the Wireless Mini-PCI Card driver &...
  • Page 9 C. The system starts to install the software of the module. Follow the instruction of the program to plug in the module into the Mini-PCI slot of your computer. D. The system will automatically detect the module and display “Hardware Installation” screen. Click “Continue Anyway”...
  • Page 10: Configuration Utility

    3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the module and monitor the link status and the statistics during the communication process. When the module is installed, the configuration utility will be displayed automatically. This module will auto connect to wireless device which has better signal strength and no wireless security setting.
  • Page 11 In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup wireless clients. By default, this “Windows Zero Configuration Tool” is enabled. If you want to use the Utility for the module, please follow one of the ways as below. First Way Right click the icon in the system tray and select “Use RaConfig as Configuration Utility”.
  • Page 12: Site Survey

    Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the module. Site Survey When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your module and automatically connect to the wireless device with the highest signal strength.
  • Page 13: Profile

    Parameter Description Available Networks This list shows all available wireless networks within range of your module. It also displays the information of the networks including the SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. If you want to connect to any networks on the list, double-click the item on the list, and the module will automatically connect to the selected network.
  • Page 14: Configure The Profile

    Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
  • Page 15 Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The module will always set in active mode. PSM (Power Saving Mode) – Enable the module in the power saving mode when it is idle.
  • Page 16: Authentication And Security

    Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended.
  • Page 17 Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern.
  • Page 18 Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This insures much greater security than the standard WEP security.
  • Page 19 The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
  • Page 20: 802.1X Setting-Certification

    3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this module has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the module intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel.
  • Page 21: 802.1X Setting-Ca Server

    Parameter Description Tunneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of <name of the user>@<user’s home realm>.
  • Page 22: Link Status

    Parameter Description Allow Intermediate Certificates A server designates an issuer as a trusted root authority by placing the issuer's self-signed certificate, which contains the issuer's public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority.
  • Page 23 Parameter Description Status Display the SSID and MAC ID of the network the module is connecting to. Extra Info Display the link status. Channel Display the number of the radio channel and the frequency used for the networking. Link Speed (Mbps) Display the transmission and reception rate of the network.
  • Page 24: Statistics

    Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics. You may reset the counters by clicking ”Reset Counter”. Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
  • Page 25 Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the module to this mode. This mode is also the default setting. 802.11 B only – This module can be compatible with both 802.11g and 802.11b wireless stations.
  • Page 26 Parameter Description Tx BURST Tx Burst enables the module to deliver the better throughput in the same period and environment. Enable TCP Window Size The TCP Window is the amount of data a sender can send on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it.
  • Page 27: About

    Parameter Description It limits the channel measurement time. The default value is 250 Limit xxx milliseconds (0-2000) milliseconds. About By choosing this option, you can click the hyperlink to connect the website for the information of the wireless chipset vendor and review basic information about the Utility such as the Driver, Utility and EEPROM Version.
  • Page 28: Wmm Function

    WMM Function In addition to the Turbo Mode, this module also supports WMM function. When you use the devices such as Voice over Internet Protocol (VoIP) phones, televisions, VCRs and MP3 players, IEEE 802.11e Quality of Service (QoS) (The Wi-Fi Alliance defined WMM as a profile of the IEEE 802.11e) extensions for 802.11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support.
  • Page 29 B. Right Click the “Wireless Network Connection” and select “Properties”. C. Click “Configure…”. D. Select “Advanced” page, enable the “WMM Capable”.
  • Page 30: Troubleshooting

    4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 31 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 32 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents