Page 3
during wireless modes of operation. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
CONTENTS 1 INTRODUCTION ................1 Features ......................... 2 Specifications........................ 2 Package Contents ......................3 2 INSTALLATION PROCEDURE ............. 4 I. Install the Hardware......................4 II. Install the Driver and Utility....................4 3 CONFIGURATION UTILITY ............8 Site Survey ........................10 Profile..........................
1 Introduction Thank you for purchasing the AirLive 802.11g Wireless LAN PCI Card. This card complies with IEEE 802.11g standard, which supports up to 54Mbps high-speed wireless network connections. It can also work with IEEE 802.11b devices. When the card connects to 11b devices, the link speed will be up to 11Mbps.
1.1 Features • Works with both IEEE 802.11b and IEEE 802.11g products. • High-speed transfer data rate - up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports WMM function to meet the multi-media data bandwidth requirement. •...
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One PCI Card • One CD (Driver/Utility/User’s Manual.) • One Quick Guide If any of the above items is missing, contact your supplier as soon as possible.
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000.) Note2: If you have installed the Wireless PCI Card driver & utility before, please uninstall the old version first.
Page 9
You can choose to configure the adaptor through the Windows Zero Configuration Tool or the AirLive Turbo-G Configuration Tool for the adaptor. It is recommended to choose the AirLive Turbo-G Configuration Tool for the adaptor. Click “Next” to continue The system starts to install the...
Page 10
E. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode. Or you can choose “Optimize for Wi-Fi mode” to let the adaptor run in standard wireless network...
Page 11
F. The system will automatically detect the card and display “Hardware Installation” screen. Click “Continue Anyway” to continue. G. Please click “Finish” to complete the installation.
3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the PCI card and monitor the link status and the statistics during the communication process. When the card is installed, the configuration utility will be displayed automatically. This card will auto connect to wireless device which has better signal strength and no wireless security setting.
Page 13
default, this “Windows Zero Configuration Tool” is enabled. If you want to use the Utility for the card, please follow one of the ways as below. First Way Right click the icon in the system tray and select “Use AirLiveConfig as Configuration Utility”. Second Way A.
Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link status and statistics from the configuration utility of the card. Site Survey When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength.
Parameter Description Available Networks This list shows all available wireless networks within range of your card. It also displays the information of the networks including the SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. If you want to connect to any networks on the list, double-click the item on the list, and the card will automatically connect to the selected network.
Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
Page 17
networks will be listed for you to add one of them to the profile list. Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The card will always set in active mode.
Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended.
Page 19
Shared – Only wireless devices using a shared key (WEP Key identified) are allowed to connecting each other. Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern.
Page 20
client users. Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This insures much greater security than the standard WEP security.
Page 21
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
IEEE 802.1x RADIUS RADIUS Access Client Client Server Access Point Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the (3) Send username, password to network. RADIUS server. (4) Approve or deny user (2) Login with username, login to the LAN. password.
Page 23
Use Client Certificate A client certificate is required for TLS, and is optional for TTLS and PEAP. This forces a client certificate to be selected from the appropriate Windows Certificate Store and made available to the RADIUS server for certification. Parameter Description Tunneled Authentication...
3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
Page 25
Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to. Extra Info Display the link status. Channel Display the number of the radio channel and the frequency used for the networking. Link Speed (Mbps) Display the transmission and reception rate of the network.
This indicator helps to find the proper position of the wireless device for quality network operation. Noise Level Display the noise level in the wireless environment. Statistics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics.
Page 27
Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode. This mode is also the default setting. 802.11 B only – This card can be compatible with both 802.11g and 802.11b wireless stations.
Page 28
is enabled, the throughput of the card will be a little lower due to many of frame traffic should be transmitted. Auto – Based on the status of the network and automatically disable/enable protection mode. On – Always enable the protection mode. Off –...
RADIUS server. When you configure your wireless LAN for fast re-association, however, LEAP-enabled client devices roam from one access point to another without involving the main server. Using Cisco Centralized Key Management (CCKM), an access point configured to provide Wireless Domain Services (WDS) takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time-sensitive applications.
Turbo Mode This card supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs, this feature (known as Turbo Mode) enables higher throughput than IEEE 802.11g standard (Up to 54Mbps). When the card is connecting to the Routers or APs with the proprietary Turbo Mode feature, the Turbo Mode will be enabled automatically without any configuration.
Page 31
B. Right Click the “Wireless Network Connection” and select “Properties”. C. Click “Configure…”.
Page 32
D. Select “Advanced” page, enable the “WMM Capable”.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
Page 34
6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
Page 35
13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
Need help?
Do you have a question about the WT-2000PCI and is the answer not in the manual?
Questions and answers