Table of Contents INTRODUCTION ..........................4 & B EATURES ENEFITS ..........................5 ACKAGE ONTENTS ..........................5 300M USB A IRELESS DAPTER ESCRIPTION ..............6 YSTEM EQUIREMENTS .......................... 6 PPLICATIONS ............................7 ETWORK ONFIGURATION ........................8 USB ADAPTER FOR WINDOWS (XP & VISTA/7) ..............10 EFORE EGIN ..........................10...
You could enjoy the racing speed of wireless connection, surfing on Internet without string wires. Adding LevelOne WUA-0616 to your Notebook or Computer, it provides an excellent performance and cost-effective solution for doing media-centric activities such as streaming video, gaming, and enhances the QoS (WMM) without any reduction of performance.
Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped in its original package. One WUA-0616 One CD-ROM with Drivers and User’s Manual Included...
One Quick Installation Guide 300Mbps _Max Wireless USB Adapter Description The USB adapter is a standard USB adapter that fits into any USB interface. PWR and LINK LED Indicator USB Connector WPS button System Requirements The following are the minimum system requirements in order to use the USB adapter.
30 MB of free disk space for installing the USB adapter driver and utility program. Applications The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs: a) Difficult-to-wire environments There are many situations where wires cannot be laid easily.
Network Configuration To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as: a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs.
Page 9
b) Infrastructure Mode The infrastructure mode requires the use of an Access Point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network.
2 USB Adapter for Windows (XP & Vista/7) Before You Begin WiFi Alliance certification recommends WPA2 AES to be the security mechanism under 11N mode. System driver will automatically bring down wireless data rate to 54Mbps if other security method such as WEP or WPA is used under 11n mode.
Installing the Drivers Follow the steps below in order to install the USB adapter drivers: 1. Insert the CD-ROM that was provided to you in this package. The setup should run automatically. If the setup does not run automatically, then must manually select the setup.exe file from the CD-ROM drive.
Page 12
2. Click on Windows Driver to start the install process.
Page 13
3. Once the setup begins you will see the InstallShield Wizard. Select Install driver and LevelOne WLAN Utility and then click on the Next> button.
Page 14
4. Click on the Install button to begin the installation.
Page 15
5. Wait for a few seconds until the driver and client utility is installed. 6. The installation is complete. Click on the Finish button. 7. Carefully insert the USB adapter into the USB port. Windows will then detect and install the new hardware.
8. An WUA-0616 icon will then appear in the system tray. Right click on the WUA-0616 icon and then click on Launch Config Utility. Note: Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Configuration (XP only feature).
Infrastructure Mode The infrastructure mode requires the use of an Access Point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations.
notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving. RTS Threshold: Place a check in this box if you would like to enable RTS Threshold. Any packet larger than the specified value (bytes) will send RTS/CTS handshake packets.
list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. Network Type: Select Ad-hoc from the drop-down list. Preamble: Select Auto from the drop-down list, unless you are aware of ...
WEP Encryption The WEP tab displays the WEP settings. Encryption is designed to make the data transmission more secure. You may select 64 or 128-bit WEP (Wired Equivalent Privacy) key to encrypt data (Default setting is Disable). WEP encrypts each frame transmitted from the radio using one of the Keys from a panel.
enter 5 alphanumeric or 10 hexadecimal characters. For 128-bit enter 13 alphanumeric or 26 hexadecimal characters. Click on the OK button to save the changes. Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it.
Click on the OK button to save the changes. Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it. WPA-PSK & WPS2-PSK Authentication & TKIP, AES Encryption WPA –...
password you type, click the Show Password box to check it. LEAP Authentication LEAP (Lightweight Extensible Authentication Protocol) also known as Cisco- Wireless EAP provides username/password-based authentication between a wireless client and a RADIUS server. LEAP is one of several protocols used with the IEEE 802.1X standard for LAN port access control.
Encryption: Select WEP, WPA-TKIP or WPA2-AES encryption. Click on the OK button to save the changes. 802.1x with PEAP 802.1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority. 802.1X uses an existing protocol called EAP.
Security) is an IETF standardized authentication protocol that uses PKI (Public Key Infrastructure) certificate-based authentication of both the client and authentication server. Identity: Enter the user name. Click on the OK button to save the changes. 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 802.1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority.
Click on the OK button to save the changes. 802.1x CA Server Depending on the EAP in use, only the server or both the server and client may be authenticated and require a certificate. Server certificates identify a server, usually an authentication or RADIUS server to clients.
Page 27
is verified against a list of trusted certificate authorities. If this parameter is true then the client will also accept a signature from a trusted intermediate certificate authority, otherwise it will not. Server name: Enter the server name if not selected from the existing drop- ...
Network (Site Survey) The Network tab displays a list of Access Points and Stations in the area, and allows you to connect to a specific one. The following information is included in this tab, as the image depicts below. The information is displayed in the following order: SSID, MAC, Channel, Mode, Security, and Signal.
Page 29
Mode: Displays the supporting AP mode. Signal: Displays the receiving signal strength from the Access Point. Rescan: Click on this button to view a list of Access Points in the area. Add to Profile: Click on this button to add the SSID and its associated ...
the transmission quality between one client, and another. Signal Strength: This bar displays the strength of the signal received from an AP or client. Noise Level: Displays the background noise level; a lower level indicates less interference. HT: High Through-Put / 802.11 n Section ...
WPS (Wireless Push Button) is used for WiFi Protected Setup. By pressing this button, the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi-Fi Protected Setup. Rescan: Click on this button to view a list of Access Points in the area. ...
USB adapter and its utility and repeat the installation procedure again. Follow the steps below in order to uninstall the client utility: 1. Click on Start > LevelOne Wireless > Uninstall LevelOne 300Mbps _Max Wireless USB Adapter...
Page 33
2. The un-installation process will then begin. 3. Click on the Yes button to confirm the un-installation process and then click on the Next button.
Page 34
4. The un-installation process is complete. Click Finish button. Then remove the USB adapter.
Appendix A – Glossary 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). Access Control List ACL. This is a database of network devices that are allowed to access resources on the network.
Page 36
AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions. Application layer 7th Layer of the OSI model. Provides services to applications to ensure that they can communicate properly with other applications on a network.
Page 37
Bit rate The amount of bits that pass in given amount of time Bit/sec Bits per second BOOTP Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user intervention Bottleneck A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data...
Page 38
Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer the cookie Data Information that has been translated into binary so that it can be processed or moved to another device Data Encryption Standard Uses a randomly selected 56-bit key that must be known by both the sender and the...
Page 39
the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network. DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate: An electronic method of providing credentials to a server in order to have access to it or a network...
Page 40
Extensible Authentication Protocol Email Electronic Mail is a computer-stored message that is transmitted over the Internet Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks. Fiber optic A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can...
Page 41
The amount an amplifier boosts the wireless signal Gateway A device that connects your network to another, like the internet Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second Graphical user interface H.323 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices...
Page 42
ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers Internet Information Server is a WEB server and FTP server provided by Microsoft Internet Key Exchange is used to ensure security for VPN connections Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain...
Page 43
IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate Internet Service Provider Java...
Page 44
A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer. Mbps Megabits per second Medium Dependent Interface is an Ethernet port for a connection to a straight-through...
Page 45
or another network, through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an updated version of NetBIOS NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to...
Page 46
Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Physical layer The first layer of the OSI model. Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive...
Page 47
Quality of Service RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
Page 48
An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices Session Initiation Protocol.
Page 49
different sources. Originally written for UNIX, it is now available for other operating systems, including Windows. Transmission Control Protocol TCP Raw A TCP/IP protocol for transmitting streams of printer data. TCP/IP Transmission Control Protocol/Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less features Throughput The amount of data that can be transferred in a given time period...
Page 50
Uniform Resource Locator is a unique address for files accessible on the Internet Universal Serial Bus Unshielded Twisted Pair Virtual Private Network VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN...
Page 51
Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide Area Network The larger network that your LAN is connected to, which may be the Internet itself, or a regional or corporate network Wi-Fi Wireless Fidelity...
Appendix B – FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Need help?
Do you have a question about the WUA-0616 and is the answer not in the manual?
Questions and answers