Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Page 4
Federal Communication Commission (FCC) Radiation Exposure Statement This EUT is compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C. The equipment version marketed in US is restricted to usage of the channels 1-11 only.
Page 5
R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
1 Introduction EW-7612PIn is a wireless PCI Express adapter that provides a simple and easy way to add or upgrade wireless connectivity to your desktop. This PCI Express adapter supports higher data rates up to 300Mpbs when connected to a 300Mbps wireless 802.11n device. You can also connect to any public wireless hotspot for Internet access to retrieve email, surf web sites or use instant messaging.
Transferring / receiving data No wireless activity 1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One EW-7612PIn Adapter • 3dBi Antennas • One CD (Driver/Utility/User’s Manual) •...
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows Vista and Windows 7.) Note2: If you have installed the Wireless PC Adapter driver & utility before, please uninstall the old version first.
Page 10
Install the Driver and Utility A. Insert the Installation CD to your CD-ROM Drive. Execute the “Setup.exe” program. B. Select Setup Language and click “OK” to proceed. C. Click “Next” to go to the next step.
Page 11
D. Now you’ll see the following message, please click ‘Install’ to begin the installation. E. The system starts to install the driver and utility.
Page 12
F. Click “Finish” to complete the driver and utility installation. II. Connect to Wireless Access Point After you finish installation the Configuration Utility appears as an icon on the system tray and desktop of Windows. You can open it by double-click on the icon. A.
Page 13
B. The utility of the adapter is displayed. Click “Available Network” and double-click on the wireless access point you want to connect to.
Page 14
C. Input the security setting and click “OK” to start network connection.
Page 15
* Use Windows Zero Configuration on Windows Vista: A. For Windows Vista user, you can use Windows Zero Configuration to connect to wireless access point. Click ‘Start’ button, then click ‘Control Panel. Click ‘Network and Internet’ in Control Panel. B. Click ‘Connect to a network’ under ‘Network and Sharing Center’...
Page 16
C. Click the access point you want to use if it’s shown, then click ‘Connect’. D. If it’s an unnamed access point (i.e. the SSID of this wireless access point is hidden), you’ll be prompted to input it’s name, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.
Page 17
E. If the access point is protected by encryption method, you have to input its security or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection between your computer and wireless access point is successfully established.
3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN PCI Express Adapter and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows. You can open it by double-click on the icon.
Utility Overview There are several parts in the utility screen. Please refer to the following table for the description. Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“...
It is the status bar that displays the current status of the utility. To close it, please disable the “Status Bar“ in the “View“ item. There are several tabs in the block for you to setup the function of the adapter. Please refer to the description in the following sections.
recommended that refresh the list while you have changed the connection network. Add to Profile A profile stores the setting of a network, so that you can connect to the network quickly. To add the selected network to a profile, click this button.
Page 22
Point or Router. IBSS – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router. IBSS – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router.
Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Description Available Profile(s) This list shows the preferred networks for the wireless connection. You can add, remove, edit, duplicate the preferred networks or set one of the networks as the default connection.
3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
Page 25
of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. Network Authentication This setting has to be consistent with the wireless networks that the adapter intends to connect. Open System –...
Page 26
Parameter Description Data Encryption Disabled – Disable the WEP Data Encryption. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This insures much greater security than the standard WEP security.
Page 27
Parameter Description Confirm Network Key Please enter network security key here again. EAP Type GTC – GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network. TLS – TLS is the most secure of the EAP protocols but not easy to use.
Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don’t ensure the status of the adapter and the network you are connecting, please go to the screen for more details.
Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want to recount the statistics value, please click “Reset“.
Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you don’t have to configure the wireless access point and setup data encryption by yourself.
Page 31
3. If you click ‘Yes’, and the following message will appear on your computer, please select the SSID of wireless access point that you wish to connect and click ‘Select’. 4. Please wait while the install procedure is running and wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you’ll be connected to that access point.
Page 32
Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless connection by WPS. Please be patient (This may require several seconds to one minute to complete).
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
Page 34
6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
Page 35
13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.