Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Page 4
Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with PCMCIA slot on the side near the center, as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electrical and RF characteristics.
Routers or APs. This feature is called Turbo Mode. When the adaptor is connecting to the Routers or APs with the proprietary feature, the wireless network will be more effective.
1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security.
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as possible.
Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server.) Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver & utility before, please uninstall the old version first. A. Insert the Installation CD to your CD-ROM Drive. Execute the “setup” program.
Page 10
C. In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup the wireless adaptor. You can choose to configure the adaptor through the Windows Zero Configuration Tool or the Ralink Configuration Tool for the adaptor. It is recommended to choose the Ralink Configuration Tool for the adaptor.
Page 11
E. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation.
The Ralink Configuration Utility appears as an icon on the system tray of Windows while the adaptor is running. You can open the utility by double-click on the icon.
Page 13
C. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adaptor. Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the adaptor.
When you open the Ralink Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed.
This sign indicates the activated profile is not been connecting. Click these buttons to add/delete/edit the selected profiles. Click “Activate” to connect to the selected profile. When a profile is activated, the adaptor will be initially connected to the profile.
WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adaptor and then only the device with the same SSID can interconnect to the adaptor. If you want to...
Page 17
Wireless LAN network without through an Access Point or Router. If you want to lower the transmit power of the adaptor for saving the power of the system, you can select the lower percentages from the list.
Description This setting has to be consistent with the wireless networks that the adaptor intends to connect. Open – No authentication is needed among the wireless network. Shared – Only wireless devices using a shared key (WEP Key...
Page 19
Parameter Authentication Type 802.1x Setting Description LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern.
Page 20
Parameter Encryption Mode WPA Pre-Shared Key WEP Key (Key1 ~ Key4) Description None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security.
Page 21
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel.
Parameter Tunneled Authentication Protocol Identity Password 3.2.1.4 802.1x Setting-CA Server Parameter Use Certificate Chain Certificate Issuer Description When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of <name of the user>@<user’s home realm>.
Parameter Allow Intermediate Certificates Server Name Server name must match exactly Domain name must end in specified name Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Description A server designates an issuer as a trusted root authority by placing the issuer's self-signed certificate, which contains the issuer's public key, into the trusted root certification authority certificate store of the host computer.
Page 25
Throughput (Kbps) Link Quality Signal Strength Noise Level Description Display the SSID and MAC ID of the network the adaptor is connecting to. Display the link status. Display the number of the radio channel and the frequency used for the networking.
Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics. You may reset the counters by clicking ”Reset Counter”. Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
Page 27
This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the adaptor will be a little lower due to many of frame traffic should be transmitted.
Page 28
(signal strength) is lower to the value you have set up. If you want to turn off the radio of the adaptor temporarily, click this button. To turn on the radio, click this button again.
EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. Turbo Mode This adaptor supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs, this feature (known as Turbo Mode) enables higher throughput than IEEE 802.11g standard (Up to 54Mbps).
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
Page 31
6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
Page 32
13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
Need help?
Do you have a question about the Adaptor and is the answer not in the manual?
Questions and answers