MicroNet SP907NS User Manual

11n wireless lan usb adapter

Advertisement

User Manual
11n Wireless USB Adapter
Model No.: SP907NS

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SP907NS and is the answer not in the manual?

Questions and answers

Summary of Contents for MicroNet SP907NS

  • Page 1 User Manual 11n Wireless USB Adapter Model No.: SP907NS...
  • Page 2: Table Of Contents

    Table of Content 1. INTRODUCTION ................... 2 1.1 Features......................2 1.2 Specifications ....................2 1.3 Package Contents..................... 3 2. INSTALLATION PROCEDURE ............... 4 2.1 Install the Driver and Utility ................4 2.2 Connect to Wireless Access Point ..............8 3. CONFIGURATION UTILITY ..............13 3.1 Utility Overview ....................
  • Page 3: Introduction

    Introduction Micronet SP907NS, 11N Wireless LAN USB Adapter, comes with stylish slim design, delivers next generation high speed and once again at a very affordable price tag. It is easily implemented for home users, medium-sized business and enterprise with its slim size design to allow immediate access to high speed wireless experience.
  • Page 4: Package Contents

    Drivers: Windows XP/Vista/7 LEDs: Link/Activity Transmit Power: 11n: 13±1.5dBm, 11g: 14±1.5dBm, 11b: 16±1.5dBm Dimension: 8(H) x 16(W) x 35.5(D) mm Temperature: Operating 32~104°F (0 ~40°C), Storage -13~149°F (-25~65°C) Humidity: Max. 95% (NonCondensing) Certification: FCC, CE 1.3 Package Contents Before you start the installation, please check the items of your package. The package should include the following items: One USB Adapter One CD (Driver/Utility/User’s Manual)
  • Page 5: Installation Procedure

    2. Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows Vista/7) Note2: If you have installed the Wireless PC Adapter driver & utility before, please uninstall the old version first.
  • Page 6 3. Select preferred language and click “OK” to proceed.
  • Page 7 4. Click “Next” to go to the next step. 5. Now you’ll see the following message, please click ‘Install’ to start the installation.
  • Page 8 6. The system starts to install the driver and utility. 7. Click “Finish” to complete the driver and utility installation.
  • Page 9: Connect To Wireless Access Point

    2.2 Connect to Wireless Access Point 1 To start configuring the SP907NS, double click the icon in the system tray or right click the icon and select open configuration utility. 2 The utility of the adapter is displayed. Click “Available Network” and double-click on the wireless access point you want to connect to.
  • Page 10: Use Windows Zero Configuration On Windows Vista

    2.3 Use Windows Zero Configuration on Windows Vista 1 For Windows Vista user, you can use Windows Zero Configuration to connect to wireless access point. Click ‘Start’ button, then click ‘Control Panel’. Click ‘Network and Internet’ in ‘Control Panel’. 2 Click ‘Connect to a network’ under ‘Network and Sharing Center’...
  • Page 11 3 Click the access point you want to use if it’s shown, then click ‘Connect’. 4 If it’s an unnamed access point (i.e. the SSID of this wireless access point is hidden), you’ll be prompted to input it’s name, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.
  • Page 13 5 If the access point is protected by encryption method, you have to input its security or passphrase here. It must match the encryption setting on the access point. 6 If you can see this image, the connection between your computer and wireless access point is successfully established.
  • Page 14: Configuration Utility

    Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN Mini USB Adapter and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows.
  • Page 15 Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“ is selected, the adapter works as a wireless adapter. If “Access Point“ is selected, the adapter will works as a wireless AP. View –...
  • Page 16: Available Network

    Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of SP907NS and automatically connect to the wireless network with the highest signal strength. From the “Available Network(s)”...
  • Page 17: General

    To add the selected network to a profile, click this button. 3.1.2 General Check the connection status of the SP907NS, select “General“. This screen shows the information of Link Speed, Network Type, Encryption Method, SSID, Signal...
  • Page 18 Strength, Link Quality and Network Address of the adapter. Parameter Description Status It will show the connection status of the adapter. Speed It shows the current speed Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router.
  • Page 19: Profile

    Network Address It shows the MAC, IP address and other information of the adapter. 3.1.3 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Description Available Profile(s)
  • Page 20: Configure The Profile

    Configure the Profile Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 21 If this item is selected, the adapter will work in Ad Hoc mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to.
  • Page 22 802.1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required to the corporate user or government users. The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP).
  • Page 23 due to possible incompatibility with other vendors’ passphrase generators. You must use the same passphrase or WEP key settings for all wireless computers within the network. Key Length When you select the “WEP and “PASSPHRASE“ and this function will display in the current status of the utility.
  • Page 24: Status

    limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer. PEAP & TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel.
  • Page 25: Statistics

    ensure the status of the adapter and the network you are connecting, please go to the screen for more details. 3.1.5 Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want to recount the statistics value, please click “s“.
  • Page 26: Wi-Fi Protect Setup

    3.1.6 Wi-Fi Protect Setup The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This Adapter supports the configuration setup using PIN configuration method or PBC configuration method. If the connected wireless Router/AP support Wi-Fi Protected Setup (WPS), you can use this USB Adapter to establish a wireless connection using either Push Button Configuration (PBC) method or PIN method.
  • Page 27 configure the wireless access point and setup data encryption by yourself. All you have to do is to go to the WPS setup page of this wireless card, click the PBC or PIN button, and then press a WPS button or enter a set of 8-digit code on the wireless access point you wish to establish a secure connection.
  • Page 28 3. If you click ‘Yes’, and the following message will appear on your computer, please select the SSID of wireless access point that you wish to connect and click ‘Select’. 4. Please wait while the install procedure is running and wait for few seconds to two minutes.
  • Page 29 Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless connection by WPS. Please be patient (This may require several seconds to one minute to complete).
  • Page 30 2. When the connection between this wireless network card and access point is successfully established by WPS, and the information about access point you connected to will be displayed.
  • Page 31: Software Ap

    3.2 Software AP This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, WEP encryption and so on are described as follows. Items Information SSID AP name of user type. BSSID The MAC address of locally-managed, generating from a 46 random code.
  • Page 32 Then switch from station mode to AP: At the same time, you will find that the icon on the system tray is changed. AP Properties Setting Note that Ad Hoc mode is not enabled for AP. SSID: AP name of user type. Channel: Manually force the AP using the channel.
  • Page 33: Ap Advanced

    Cancel: Cancel the above changes. OK: Apply the above changes. Network Authentication: Select the Security tab in the screen above. To define the security mode, select the desired security mode as follows. There are 4 types supported: Open System, Shared Key, WPA-PSK, WPA2-PSK. Please select a type from the drop down list. Data Encryption: There are 4 types supported: Disabled, WEP, TKIP and AES.
  • Page 34: Ap Statistics

    Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packets (milliseconds). The range for the beacon period is between 20-1000 milliseconds with a typical value of 100. DTIM Period Determines the interval the Access Point will send its broadcast traffic.
  • Page 35: Ics

    3.2.4 ICS If you want to connect to the internet through this SoftAP, you will need to make a bridge between our SoftAP and your internet connect. Select the internet connection in your SoftAP host machine and press the “Apply” button. Select “OK”.
  • Page 36: Appendix A: Specifications

    Appendix A: Specifications Standards IEEE802.11b/g/n Interface USB 2.0 Frequency Band 2.4000 ~ 2.4835GHz Data Rate 11b: 1/2/5.5/11Mbps 11g: 6/9/12/24/36/48/54Mbps 11n: up to 150 Mbps Output Power 11b:16dBm 11g:14dBm 11n : 13 dBm Receiver Sensitivity 11b:-84dBm 11g:-73dBm 11n : -68dBm Security WEP 64/128-bit WPA &...
  • Page 37: Appendix B: Troubleshooting

    Appendix B: Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 38 5. What is Infrastructure? An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS).
  • Page 39 recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.

Table of Contents