CONTENTS INTRODUCTION ..................0 1.1 FEATURES.....................1 1.2 PACKAGE CONTENTS ................1 INSTALLATION ...................2 CONFIGURATION AND MANAGEMENT ............7 3.1 AD-HOC MODE ..................7 To use this adapter in Ad-Hoc Mode ..............7 3.2 INFRASTRUCTURE MODE ..............8 To use this adapter in Infrastructure Mode............9 INTRODUCTION TO THE WIRELESS LAN UTILITY........
SP908GK supports AES function, offering a stronger encryption mechanism, which is often required by corporate and government users. With its various features and ability to support advanced technology, SP908GK is the most cost-effective solution to build your wireless network. - 0 -...
1.2 Package Contents Before you begin the installation, please check if the following items are in your package. The package should include the following items: Micronet SP908GK Wireless LAN CardBus Adapter Driver and Manual CD Quick Installation Guide If any of the above items is missing, contact your supplier as soon as possible.
Note2: The following installation was performed under Windows XP. (Procedures are similar for Windows 98SE/Me/2000.) Note3: If you have installed the Micronet Wireless LAN CardBus Adapter driver & utility before, please uninstall the old version first. Step1. Insert the Installation CD to your CD-ROM Drive. Execute the “setup” program.
Page 6
Step3. The welcome window pops up. Click the “Next” button to proceed Step4. Please wait while installation. Step5. This Windows Logo testing warning window may pop up upon installation. Please click the “Contiune Anyway” to continue. Step6. If you are using Windows 98se or ME, the system may ask for the driver CD. Please click the Browse button.
Page 7
Step7. Click the “Finish” button to complete driver and utility installation Step8. For Windows XP and 2000 users, insert this wireless adapter to your computer. If you are using Windows 98se or ME, please restart the system first before connect this wireless adapter to your computer. Step9.
Page 8
Step11. Select “Install the software automatically” and click the “Next” button. Step12. Please wait while the driver is being installed. The Windows logo testing warning window may pop up again. Please click the “Continue Anyway” button to continue. - 5 -...
Page 9
Step13. Click the “Finish” button after driver installation - 6 -...
3 Configuration and Management Read this chapter to understand the management interface of the device and how to manage the device. In the following instruction for making a network connection, we use the utility we provided to configure the wireless network settings. Note: For Windows XP users that want to configure the wireless network using this Utility, please perform the following procedures to disable the native Windows XP wireless support (Wireless Zero Configuration Service)
3. Click the OK button to confirm that you are connecting to an open wireless network. 4. Click OK to add this network into the profile list. Note: This example is an open wireless network. If you are going to connect to a Wireless adapter with security protection, you will have to configure the encryption settings in this profile to be corresponding to the other wireless adapter.
To use this adapter in Infrastructure Mode 1. Double click the icon on your desktop. 2. Click the “Available Network” button to scan available access points. Double click on the AP that you are going to connect to. 3. Click the OK button to confirm that you are connecting to an open wireless network. Note: This example is an open wireless network.
4 Introduction to the Wireless LAN Utility Note: This management instruction uses Windows XP as the presumed operation system. Some functions are not supported using Windows 98se or Windows ME. 4.1 Starting the Wireless LAN Utility Double click the shortcut on your desktop. The Wireless LAN Utility will pop up. You may click on the tabs above to configure this adapter.
Status: Check if the device associated to target network. The current connection speed Speed: Type: Infrastructure mode or Ad-Hoc mode. The performing encryption mode for connecting to current Encryption: network profile. SSID: The SSID (network name) of the connected wireless network. Signal Strength: Indicates the signal strength detected by this adapter.
WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for SP908GK and then only the device with the same SSID can interconnect to the card. If you want to add the network nearby to the profile list, pull down the menu, and all the networks will be listed for you to select from to add to the profile list.
Network This setting has to be consistent with the wireless networks Authentication Type that SP908GK intends to connect to. Open System – No authentication is needed in the wireless network. Shared Key – Only wireless devices using a shared key (WEP Key identified) are allowed to connect to each other.
Page 17
advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required by the corporate user or government users. The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WPA2-PSK –...
The IEEE 802.1X specification describes a protocol used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
Page 19
The EAP authentication protocols this card supports are listed below. This setting has to be consistent with the wireless APs or Routers that SP908GK intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol to be used within an encrypted tunnel.
4.1.3.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and requires a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
4.1.4 Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of Wireless LAN Adapter and automatically connect you to the wireless device with the greatest signal strength. The “Available Network”...
Page 22
Power Save None Disable Power saving function. Minimum power consumption Maximum power consumption Turbo Mode Disable turbo mode Enable turbo mode AUTO Enable or disable turbo automatically according to the detected environment Fragment Threshold The maximum size of a packet that is going to be segmented and transmitted. Select the size from 256 to 2432(default) bytes.
4.1.6 Status This tab shows the current connection status of this adapter. 4.1.7 Statistics This tab shows the transmission activity record. Clicking the “Reset” button recounts the values from zero. - 20 -...
4.2 AP mode management guide 4.2.1 General After configuring the adapter in AP mode, this “General” page will pop up and show the general information of this AP. SSID: The SSID (network name) of the wireless network constructed by this AP. BSSID: The MAC address of this AP Config:...
4.2.4 SoftAP This page allows users to select the adapter for connecting to public network. Please click on the device that are used for connecting to public network and click the “Select” button, and then click the “Apply” button to execute. - 23 -...
5 Troubleshooting This chapter provides solutions to problems commonly encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications, which provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream in wireless LAN technology for the home, office and public networks.
Page 28
Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7.
Page 29
receivers. 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secured, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
Page 30
Copyright 2006 Micronet Communications, Inc. All rights reserved. No Part of the contents of this guide maybe transmitted or reproduced in any form or by any means without the written permission of manufacturer. Printed in Taiwan. FCC Statement This product has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules.
Page 31
R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) R&TTE Directive repeals replaces...
Need help?
Do you have a question about the SP908GK and is the answer not in the manual?
Questions and answers