Preview only show first 10 pages with watermark. For full document please download

Wireless G Pci Card User Manual

   EMBED


Share

Transcript

Wireless G pci card user manual Model 524575 INT-524575-UM-0209-01 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS™ Wireless G PCI Card, Model 524575. Compatible with 802.11b and 802.11g wireless access points and routers, this card lets you upgrade your wireless network without the need to replace existing equipment. Transfer or receive digital images, videos and MP3 files with link speeds of up to 54 Mbps using proven and reliable Wireless G technology. With the easy-to-follow instructions in this manual, you’ll soon be able to enjoy the benefits of these additional features: • Detachable 2 dBi dipole antenna • Supports WEP (64/128 bit), WPA and WPA2 data encryption • Supports WMM (Wi-Fi Multimedia) for increased multimedia data throughput • Windows XP/Vista compatible • Lifetime Warranty FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and the receiver. • Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. 3 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference; and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC RF R adiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment, and should be installed and operated with a minimum distance of 2.5 cm (1 in.) between the radiator and your body. SAR (specific absorption rate) compliance has been established in laptop computer configurations with a USB port on the side near the center, as tested in the application for certification, and can be used in laptops with substantially similar physical dimensions, construction and electrical and RF characteristics. Use in other devices, such as PDAs or lap pads, is not authorized. This transmitter is restricted for use with the specific antenna(s) tested in the application for certification. The antenna(s) used for this transmitter must not be co-located or operated in conjunction with any other antenna or transmitter. R&TTE Compliance Statement This equipment complies with all the requirements of Directive 1999/5/EC of the European Parliament and the Council of March 9, 1999, on radio equipment and telecommunication terminal equipment (R&TTE) and the mutual recognition of their conformity. The R&TTE directive repeals and replaces Directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) as of April 8, 2000. EU Countries Intended for Use The ETSI version of this device is intended for home/office use in Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, the Netherlands, Portugal, Spain, Sweden and the U.K., and is also authorized for use in EFTA member states Iceland, Liechtenstein, Norway and Switzerland. (EU countries not intended for use: none.) 4 table of contents section page Installation...........................................................................................6 Hardware......................................................................................6 Software (Driver & Configuration Utility)......................................6 Zero Configuration Tool...........................................................7 Configuration .....................................................................................9 General....................................................................................... 10 Available Network.............................................................................11 Profile.......................................................................................... 12 Profile Configuration.............................................................. 12 Advanced.................................................................................... 15 Status.......................................................................................... 16 Statistics..................................................................................... 17 Wi-Fi Protect Setup.................................................................... 17 Set Wizard.................................................................................. 18 Frequently Asked Questions..................................................................21 Specifications................................................................................... 23 NOTE: Some of the installation and configuration procedures in this manual correspond to Windows XP. The procedures are similar for Windows Vista. Additionally, some screen images have been modified to fit the format of this manual. CONTENTS 5 installation hardware 1. Turn off your PC and remove its cover. 2. Insert the card into an empty PCI slot. 3. Replace the PC cover. 4. Connect the antenna to the card, turning clockwise to attach/tighten. 5. Turn on the PC. software (driver & configuration utility) NOTE: Prior to installing the Wireless G PCI Card software, uninstall any previously loaded version of the driver and utility. The following Windows XP procedure is similar for Windows Vista. 1. Insert the setup CD in the CD-ROM drive and run the “Setup.exe” program. 2. When the Choose Setup Language prompt displays, make your selection from the menu and click “OK.” 3. When the Welcome screen of the InstallShield Wizard displays, Click “Next.” 4. A Setup Status screen displays with a status bar indicating the progress of the driver Setup has finished installing the Wireless G PCI Card driver and utility installation. and utility on your computer. When complete, an “InstallShield Wizard Complete screen will display. Click “Finish.” 6 INSTALLATION Zero Configuration Tool The Windows Zero Configuration Tool helps you set up the Wireless G PCI Card. By default, this is enabled. For Windows XP 1. Right-click the icon in the system tray (as shown at right) to open the Zero Configuration Tool. 2. In the pop-up menu, double-click “View Available Wireless Networks.” 3. When the Choose a Wireless Network screen displays (below), select the desired option and click “Connect.” installATION 7 For Windows vista 1. Right-click the icon in the system tray (as shown at right) to open the Zero Configuration Tool. 2. In the pop-up menu, double click “Connect to a Network.” 3. When the Connect to a Network screen displays (below), select the desired option, then click “Connect.” 8 installATION configuration The configuration utility — which displays automatically once the card is connected — is a powerful application that helps you configure the card and monitor link status and statistics during the communication process. This card/adapter will auto-connect to the wireless device that has the better signal strength and no wireless security setting. The configuration utility appears as an INTELLINET NETWORK SOLUTIONS icon in the Windows system tray while the adapter is running. You can open it by double-clicking on the icon. Configuration of the Wireless G PCI Card is done by selecting the options and establishing the settings on the various screens made available when you click on any of the six menu tabs: General, Profile, Available Network, Advanced, Status and Statistics. The options and settings are presented in detail below. Each screen in the configuration utility displays a pair of option lines: one at the top (above the six menu tabs) and one at the bottom (to the left of the “Close” button). Set Wizard (S) Refresh: Click to update the card list under My Computer. INTELLINET NETWORK Set Wizard: Click to open the setup wizard. (See Set Wizard at the end of this section.) View: Click to display the current status of the utility. About: Click to check the version of the utility. Show Tray Icon: Select to display the red configuration utility icon in the system tray. Radio Off: Select to toggle between the On and Off status of the radio of the card. If the radio is turned off, the card will not work. Disable Adapter: Select to toggle between the Enable and Disable options for the card. CONFIGURATION 9 general This screen allows you to check the operational status of the card. Status: This is the current connection status of the card. Speed: This is the current speed at which the card is operating. Type: “Infrastructure” indicates that an 802.11 access point or router is connected to the card’s network; all communication is through the AP/router. Otherwise, “Ad hoc” displays, indicating you can connect to another wireless station or stations in the wireless LAN without an AP/router. (See Profile.) Encryption: This is the current encryption setting: “None,” “WEP,” “TKIP” or “AES.” (See Profile.) SSID: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents unintentional merging of two co-located WLANs. Signal Strength: This indicates the current wireless signal strength. 10 CONFIGURATION Link Quality: This indicates the current wireless link quality. Network Address: This shows the MAC, IP address and other information about the card. Renew IP: Click to renew the IP address. AVailable network As mentioned earlier, when you open the configuration utility, the system will scan all the channels to find access points/stations within range of your card, then automatically connect to the wireless network with the highest signal strength. All nearby networks will be listed on this screen, and you can change the connection to another network. Available Network(s): This list presents details about the available wireless networks within range of your card (SSID, channel, encryption, etc.). If you want to connect to any network on the list, just double-click the selected network. Refresh: Click to update the Available Networks list. This is a good idea any time you change the connection network. Add to Profile: A profile stores the settings of a network so you can connect to it quickly. Click to add the selected network to a profile. CONFIGURATION 11 profile This screen lets you manage the networks you frequently connect to. Available Profile(s): This list shows the preferred networks for the wireless connection. You can add, remove, edit, duplicate preferred networks or set one of the networks as the default connection. Add/Remove/Edit: Click to delete or edit a selected profile. NOTE: Click “Add” to manually enter a network that doesn’t appear on the Available Networks list. (See Configure the Profile below.) Duplicate: Select this option to create a new profile using the same settings as the current profile. Set Default: Click to designate a profile as the default network for the connection from the available profiles list. Configuring the profile Clicking “Add” on the Profile screen displays the configuration screen. Profile Name: Enter a recognizable profile name to easily differentiate among the networks. Network Name (SSID): Enter up to 32 printable ASCII characters to create a unique name that’s identifiable within the WLAN. This ID prevents the unintentional merging of two co-located WLANs. 12 CONFIGURATION You can specify an SSID for the card so only a device with the same SSID can interconnect to the card. This is a computerto-computer (ad hoc) network; wireless access points are not used.: There are two kinds of network types: Infrastructure requires the presence of an 802.11 access point or router, and all communication is through the AP/router; and ad hoc, which lets you connect to another wireless card in the WLAN network without an AP/router. If this option is selected, the card will work in Ad Hoc mode. Channel: This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same as the network you are connecting to. Network Authentication: This setting has to be consistent with the wireless networks the card is intended to connect with. Select one of seven options from the drop-down menu. • Open System – No authentication is needed within the network. • Shared Key – Only wireless stations using a shared key (WEP Key identified) are allowed to connect to each other. • WPA 802.1X – WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home CONFIGURATION 13  users that data will remain protected and that only authorized users may access their networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA offers the advantage of leveraging existing authentication databases and infrastructure. • WPA-PSK – This is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in his access point or gateway, as well as in each of the wireless stations in the network. WPA-PSK takes over automatically from that point, keeping unauthorized users that don’t have the matching password from joining the network while encrypting the data traveling between authorized devices. • WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES), which is required for the corporate or government user. The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES, whereas WPA uses TKIP. • WPA2-PSK – This is also for home and small business use. The difference between WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption via AES, whereas WPA-PSK uses TKIP. • WEP 802.1X – This is a special mode for using IEEE 802.1x/EAP technology for authentication and WEP keys for data encryption. Data Encryption: Select one of four options from the drop-down menu. NOTE: Options depend on the Network Authentication selection. • Disabled – Disables WEP Data Encryption. • WEP – Enables WEP Data Encryption. When this is selected, you need to continue with the setting of the WEP encryption keys. • TKIP – Temporal Key Integrity Protocol (TKIP) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than standard WEP security. • AES – This has been developed to ensure the highest degree of security and authenticity for digital information. It’s the most advanced solution defined by IEEE 802.11i for the security in the wireless network. 14 CONFIGURATION Note: All devices in the network should use the same encryption method to ensure the integrity of any communication. ASCII/Passphrase: Select either option and enter in the text field. You must use the same passphrase or WEP key settings for all wireless computers within the network. Network Key: Enter a key to encrypt data transmitted in the wireless network. NOTE: When “Passphrase” is selected, input a 10-digit hexadecimal value (0-9, a-f: “0123456aef,” for example) as the encryption key for 64-bit WEP; input a 26-digit hexadecimal value (0-9, a-f: “01234567890123456789abcdef,” for example) for 128-bit. Confirm Network Key: Enter the same network key to confirm. Key Index (advanced): Select one of the four keys to be the data encryption key. advanced This screen allows you to configure more advanced settings, such as Power Save and Wireless Mode. Power Save: Select one of three options. • None — This keeps the card in active mode. • Min — This places the card in a power saving mode when it’s idle, though some components of the card are still “alive,” or active. When this option is selected, the power consumption is greater than “Max.” CONFIGURATION 15 • Max — This places the card in a power saving mode when it’s idle. Wireless Mode: Select one of two options. • 802.11b — This card is compatible with both 802.11g and 802.11b wireless stations, but if you prefer to limit network access to 802.11b wireless stations only, you can set the card to this mode. • 802.11g/b — If you have a mix of 802.11b and 802.11g wireless stations in your network, this setting is recommended. RTS Threshold: Enter the minimum packet size required for an RTS (request to send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2432 bytes. Channel Plan: Select from the drop-down menu based on your locale. Set Defaults: Return any changed settings to default values. Apply: Click for any changes to take effect. status This screen displays details that include some current settings and information that may be needed for registration purposes and such. 16 CONFIGURATION statistics This screen displays real-time information about packet transmissions and the receiving status. To begin a new count, click “Reset.” wi-fi protect setup If your AP/router supports WPS, simply follow the on-screen instructions. CONFIGURATION 17 set wizard The set wizard can help you connect to a wireless LAN or build an adhoc wireless network. For example, if you want to connect to a wireless LAN in infrastructure mode: 1. Open the set wizard (it’s on the menu line at the top of each screen) and select “Station (infrastructure):” Then click “Next.” Set Wizard Cancel 2. When the Site Survey screen displays (below), highlight/select the network you want to connect to and click “Next.” Set Wizard Cancel 18 CONFIGURATION 3. When the Wireless Network Properties screen displays, enter the security settings for the wireless network you’re conecting to. CONFIGURATION 19 4. When the Setup TCP/IP screen displays, make your selections and click “Finish.” You can now connect to the wireless network. Set Wizard 20 CONFIGURATION frequently asked questions What is the IEEE 802.11g standard? 802.11g is an IEEE standard for high-speed wireless LAN communications, providing a data rate of up to 54 Mbps in the 2.4 GHz band. It defines the use of the same OFDM modulation technique specified in IEEE 802.11a for the 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as IEEE 802.11b. The 802.11g standard requires backward compatibility with 802.11b. The standard specifically calls for: • A new physical layer for the 802.11 Medium Access Control (MAC) in the 2.4 GHz frequency band, known as the extended rate PHY (ERP). The ERP adds OFDM as a mandatory new coding scheme for 6, 12 and 24 Mbps (mandatory speeds), and 18, 36, 48 and 54 Mbps (optional speeds). The ERP includes the modulation schemes found in 802.11b, including CCK for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps. • A protection mechanism called RTS/CTS that governs how 802.11g devices and 802.11b devices interoperate. What is ad hoc? An ad hoc-integrated wireless LAN is a group of computers, each with a wireless LAN card, connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. What is infrastructure? An integrated wireless and wireless-and-wired LAN is called an infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to a central database, or wireless application for mobile workers. What is BSS ID? A specific ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. What is WEP? Wired Equivalent Privacy is a data-privacy mechanism based on a 40bit shared-key algorithm as described in the IEEE 802.11 standard. FAQ 21 What is WPA? WPA is a more powerful security technology for Wi-Fi networks than WEP. It provides strong data protection by using encryption as well as strong access controls and user authentication. WPA utilizes 128-bit encryption keys and dynamic session keys to ensure your wireless network’s privacy and enterprise security. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the re-use of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard. What is AES? AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. What is DSSS? FHSS? What’s the difference? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be shortduration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for re-transmission. To an unintended receiver, DSSS appears as low-power wideband noise and is rejected (ignored) by most narrowband receivers. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade bandwidth efficiency for reliability, integrity and security. In other words, more bandwidth is 22 faq consumed than in the case of narrowband transmission, but the tradeoff produces a signal that is, in effect, louder and thus easier to detect, provided the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). specifications General • Standards: - IEEE 802.11b (11 Mbps Wireless LAN) - IEEE 802.11g (54 Mbps Wireless LAN) - IEEE 802.11e (Wi-Fi Multimedia (WMM) - IEEE 802.11i (Wireless Encryption) - IEEE 802.1X (RADIUS Authentication) • Bus type: 32-bit PCI card • Chipset: Realtek 8185L • Frequency band: 2.4000 - 2.4835 GHz (Industrial Scientific Medical Band) • Security: - 64/128-bit WEP data encryption - WPA and WPA2 - IEEE 802.1X RADIUS Authentication • Detachable 2 dBi dipole antenna • Maximum coverage distance: 100 m / 328 ft. (indoor), 300 m / 980 ft. (outdoor) • Certification: FCC Class B, CE Mark LEDs • Link • Tx/Rx Environmental • Dimensions: 19 (H) x 127( W) x 121 (D) mm (0.7 x 5 x 4.7 in.) • Weight: 0.25 kg (0.4 lbs.) • Operating temperature: 0 – 55°C (32 – 131°F) • Operating humidity: 10 – 95% RH, non-condensing • Storage temperature: 0 – 70°C (0 – 158°F) System Requirements • Desktop PC with Pentium 300 MHz- compatible processor or higher • Windows XP/Vista • Available 32-bit PCI slot Package Contents • Wireless G PCI Card • Antenna • Setup CD with user manual; quick install guide specifications 23 INTELLINET NETWORK SOLUTIONS™ offers a complete line of active and passive networking products. Ask your local computer dealer for more information or visit www.intellinet-network.com. Copyright © INTELLINET NETWORK SOLUTIONS All products mentioned are trademarks or registered trademarks of their respective owners.