Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector User Manual

Efficient network 802.11g turbo wlan usb adapter with rp-sma connector user manual

Advertisement

Quick Links

8
0
2
.
1
1
g
T
u
r
b
o
W
L
A
N
U
S
B
A
d
a
p
t
e
r
8
0
2
.
1
1
g
T
u
r
b
o
W
L
A
N
U
S
B
A
d
a
p
t
e
r
w
/
R
P
-
S
M
A
C
o
n
n
e
c
t
o
r
w
/
R
P
-
S
M
A
C
o
n
n
e
c
t
o
r

User Manual

Version: 1.2
(May, 2007)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 802.11g Turbo WLAN USB Adapter with RP-SMA Connector and is the answer not in the manual?

Questions and answers

Summary of Contents for Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector

  • Page 1: User Manual

    User Manual Version: 1.2 (May, 2007)
  • Page 2 COPYRIGHT Copyright ©2005/2006 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties,...
  • Page 3: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) configurations with USB port on the side near the center, as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electrical and RF characteristics.
  • Page 5: Table Of Contents

    1 INTRODUCTION ... 1 Features ... 2 Specifications... 2 Package Contents ... 3 2 INSTALLATION PROCEDURE ... 4 3 CONFIGURATION UTILITY ... 7 Site Survey ... 9 Profile... 10 3.2.1 Configure the Profile ... 11 3.2.1.1 Configuration ... 11 3.2.1.2 Authentication and Security ... 13 3.2.1.3 802.1x Setting-Certification ...
  • Page 6: Introduction

    1 Introduction Thank you for purchasing the 802.11g Turbo Wireless LAN USB Adapter with Reverse SMA Connector. This USB adapter is designed with a Reverse SMA connector to accommodate attachable antenna, providing user the flexibility to change with suitable antenna in different environments. It also designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size.
  • Page 7: Features

    1.1 Features • Works with both IEEE 802.11b and IEEE 802.11g products. • High-speed transfer data rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports WMM (IEEE 802.11e QoS standard) function to meet the multi-media data bandwidth requirement.
  • Page 8: Package Contents

    1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adapter • One External Antenna • One USB 2.0 Extension Cable (100 cm) • One CD (Driver/Utility/User’s Manual) •...
  • Page 9: Installation Procedure

    2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not connect the network adapter with your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003/Vista.) Note3: If you have installed the Turbo Wireless LAN USB Adapter driver &...
  • Page 10 C. In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup the wireless adapter. You can choose to configure the adapter through the Windows Zero Configuration Tool or the Ralink Configuration Tool for the adapter. It is recommended to choose the Ralink Configuration Tool since it provides more function.
  • Page 11 NOTE: In Windows Vista, the following window will appear when you insert network adapter into computer, please ignore it and wait. It will disappear after driver installation is complete. F. Please click “Finish” to complete the installation.
  • Page 12: Configuration Utility

    3 Configuration Utility The Ralink Configuration Utility is a powerful application that helps you configure the USB adapter and monitor the link status and the statistics during the communication process. When the adapter is installed, the configuration utility will be displayed automatically. This adapter will auto connect to wireless device which has better signal strength and no wireless security setting.
  • Page 13 Second Way A. Right-click the icon and select “View Available Wireless Networks”. B. Click “Advanced”. C. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter.
  • Page 14: Site Survey

    Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the adapter. Site Survey When you open the Ralink Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wireless device with the highest signal strength.
  • Page 15: Profile

    Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Profiles List Add/Delete/Edit Button Activate Button Description The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc.
  • Page 16: Configure The Profile

    3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Profile Name SSID PSM (Power Saving Mode) Description Define a recognizable profile name for you to identify the different networks. The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 17 Parameter Network Type TX Power Preamble RTS Threshold Fragment Threshold Channel Description Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router.
  • Page 18: Authentication And Security

    3.2.1.2 Authentication and Security Parameter Authentication Type Description This setting has to be consistent with the wireless networks that the adapter intends to connect. Open – No authentication is needed among the wireless network. Shared – Only wireless devices using a shared key (WEP Key identified) are allowed to connecting each other.
  • Page 19 Parameter 802.1x Setting Encryption Mode Description WPA-PSK – It is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless station in the network.
  • Page 20 Parameter WPA Pre-Shared Key WEP Key (Key1 ~ Key4) Description AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network.
  • Page 21 The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
  • Page 22: 802.1X Setting-Certification

    3.2.1.3 802.1x Setting-Certification Parameter Authentication Type Session Resumption Password Use Client Certificate Tunneled Authentication Protocol Identity Password Description The EAP authentication protocols this adapter has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP &TTLS –...
  • Page 23: 802.1X Setting-Ca Server

    3.2.1.4 802.1x Setting-CA Server Parameter Use Certificate Chain Certificate Issuer Allow Intermediate Certificates Server Name Server name must match exactly Domain name must end in specified name Description When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
  • Page 24: Link Status

    Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Status Extra Info Channel Link Speed (Mbps) Throughput (Kbps) Link Quality Signal Strength Description Display the SSID and MAC ID of the network the adapter is connecting to.
  • Page 25: Statistics

    Parameter Noise Level Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics. You may reset the counters by clicking ”Reset Counter”. Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc.
  • Page 26 Parameter Wireless Mode Ad Hoc Wireless Mode Select Your Country Region Code The available channel differs from different countries. For example: B/G Protection Description 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to set the adapter to this mode.
  • Page 27 Parameter Tx Rate Tx BURST Enable TCP Window Size Fast Roaming at -70dBm Turn Off RF Button CCX 2.0 Description There are several options including Auto/1/2/5.5/11/6/9/12/18/24/36/48/54Mbps for you to select. When the “Auto” is selected, the device will choose the most suitable transmission rate automatically.
  • Page 28: Qos

    Parameter LEAP Turn on CCKM Enable Radio Measurement Non-Serving Channel Measurements Limit xxx milliseconds (0-2000) This option enables you to configure QoS settings, for example: WMM, WMM - Power Save and Direct Link Setup. Description During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication, including communication with the main RADIUS server.
  • Page 29: About

    Parameter WMM Enable WMM – Power Save Enable Direct Link Setup Enable Direct Link Direct Link Setup MAC Address Timeout Value DLS Status About By choosing this option, you can click the hyperlink to connect the website for the information of the wireless chipset vendor and review basic information about the Utility such as the Driver, Utility and EEPROM Version.
  • Page 30: Turbo Mode

    Turbo Mode This adapter supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs, this feature (known as Turbo Mode) enables higher throughput than IEEE 802.11g standard (Up to 54Mbps). When the adapter is connecting to the Routers or APs with the proprietary Turbo Mode feature, the Turbo Mode will be enabled automatically without any configuration.
  • Page 31 Parameter Rescan Information Pin Code SSID (Lower) MAC Address Authentication (Lower) Encryption (Lower) Detail Connect Rotate Disconnect Delete Description Click this button to scan for WPS-enabled access point (perform a site survey) Select a found WPS-enabled access point first, then click ‘Information’...
  • Page 32: Softap

    3.10 SoftAP This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, MAC Address Filtering and so on are described as follows. Right click the Ralink Configuration Utility icon on the system tray of Windows and select “Switch to AP Mode”...
  • Page 33 Parameter Wireless Mode TX Rate Channel SSID Use Mac Address Auth. vs. Security Country Region Code Description Selects the wireless mode supports by the AP. 802.11 B/G Mixed – The AP works in 11b+g mixed mode. 802.11 B Only – The AP works in 11b mode. 802.11 G Only –...
  • Page 34 Parameter B/G Protection Preamble Beacon (ms) TX Power Tx BURST No forwarding among wireless clients Hide SSID Use Short Slot Auto Channel Selection at next boot Description If you have a mix of 802.11b and 802.11g wireless clients in the network, it is recommended to enable the protection mechanism.
  • Page 35: Auth. Vs. Security

    Parameter Default Apply 3.10.1.1 Auth. Vs. Security This option enables you to configure the authentication mode and encryption algorithm used within the Parameter Authentication Type Description Click to use with default value. Click to apply the setting change. Description There are four types of authentication mode supported. Open –...
  • Page 36 Parameter Encryption Type WPA Pre-shared Key Group Rekey Interval Wep Key (Key#1 ~ Key#4) Show Password Description Not Use - Disable the encryption mode. WEP - Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Key. TKIP - TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security...
  • Page 37: Access Control

    3.10.2 Access Control The Access Control page enables you to configure the access control policy used within the AP. Parameter Access Policy MAC Address Access List Delete Remove All Apply Description Disable – Disable the MAC Address filtering function. Allow All – Only the wireless adapters with the MAC Address listed in Access List can connect to the AP.
  • Page 38: Mac Table

    3.10.3 Mac Table The Mac Table page displays the detail information of the wireless adapters connected to the AP. Parameter MAC Address Power Saving Mode Description The MAC Address of the wireless adapters connected to the AP. The Association ID of current connection. The supporting status of Power Saving Mode of the wireless adapter connected.
  • Page 39: Event Log

    3.10.4 Event Log The Event Log page displays all the event time and message. You may clear the table by clicking “Clear”. 3.10.5 Statistics The Statistics page displays the statistic information of the AP including transmit statistics and receive statistics. You may reset the counters by clicking “Reset Counters”.
  • Page 40: About

    3.10.6 About The About page displays the basic information about the Utility, including Driver, Utility and EEPROM Version. The MAC Address of the adapter is displayed in the screen as well.
  • Page 41: Glossary

    4 Glossary This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 42 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 43 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents

Save PDF