Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector manual
- Read online or download the manual
- 43 pages
- 1.19 mb
Go to page of
Similar user manuals
-
Network Card
Efficient Networks 007-0075-002
2 pages 0.1 mb -
Network Card
Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector
43 pages 1.19 mb -
Network Card
Efficient Networks PCI 10/100
6 pages 0.72 mb -
Network Card
Efficient Networks EEE 802.11b/g Wireless USB 2.0 Adapter
48 pages 1.52 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector should contain:
- informations concerning technical data of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector
- name of the manufacturer and a year of construction of the Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector item
- rules of operation, control and maintenance of the Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Efficient Networks service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
8 8 0 0 2 2 . . 1 1 1 1 g g T T u u r r b b o o W W L L A A N N U U S S B B A A d d a a p p t t e e r r w w / / R R P P - - S S M M A A C C o o n n n n e e c c t t o o r r User Manual V ersion: 1.2 (May , 2007)[...]
-
Page 2
COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No part of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the prio[...]
-
Page 3
Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can ra[...]
-
Page 4
Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with USB port on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with subs tantially similar physical dimensions, construction, and electrical[...]
-
Page 5
CONTENTS 1 INTRODUCT ION ............................................................................. 1 1.1 Features ................................................................................................................... ...... 2 1.2 Specifications ........................................................................................[...]
-
Page 6
1 1 Introduction Thank you for purchasing the 802.11 g Turbo Wirele ss LAN USB Adapter with Reverse SMA Conne ctor. This USB adapter is designed with a Reverse SM A connector to accommodate attachable antenna, providing user the flexibility to change with suitabl e an tenna in different environments. It also desig ned to comply with IEEE 802.11g Wi[...]
-
Page 7
2 1.1 Features • Works with both IEEE 802. 11b and IEEE 802.11g products. • High-speed transfer data rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports WMM (IEEE 802.11e QoS standard) function to meet the multi-media data bandwidth requirement. • Supports 64/1[...]
-
Page 8
3 1.3 Package Contents Before you begin the inst a llation, please check the ite ms of your p ackage. The p ackage shoul d include the following items: • One USB Adapter • One External Antenna • One USB 2.0 Extension Cable (100 cm) • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact yo[...]
-
Page 9
4 2 Installation Procedure Before you proceed with the inst all ation, please notice following descriptio ns. Note1: Please do not connect the network adapte r with your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures ar e similar for Windows 98SE/Me/2000/2003[...]
-
Page 10
5 C. In Windows XP , there is a “Windows Zero Configur ati on T ool” for you to setup the wireless adapter . Y ou can choose to configure the adapter through the Wind ows Zero Configuration T ool or the Ralink Configuration T ool for the adapter . It is recommended to choose the Ralink Configuration T ool since it provides more function. Click [...]
-
Page 11
6 NOTE: In Windows V ist a, the following window will appear wh en you insert network adapter into computer , please ignore it and wait. It will disappear af ter driver inst allation is complete. F. Please click “Finish” to complete the installation.[...]
-
Page 12
7 3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adapter and monitor the link status and the statis tics during the communi cation process. When the adapter is installed, t he configuration utility will be displayed automatically. This adapter will auto connect to wireless device[...]
-
Page 13
8 Second W ay A. Right-click the icon and select “V iew Available Wirel e ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable th e utility for the adapter .[...]
-
Page 14
9 Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link status and statistics from the configuration utility of the adapter. 3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations within the acce ssi[...]
-
Page 15
10 3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activ[...]
-
Page 16
11 3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the uni ntentional merging of two co-located WLANs. Y ou may specify a S[...]
-
Page 17
12 Parameter Description Network T ype Infrastructure – This operation mode re quire s the presence of an 802.1 1 Access Point. All communication is done via the Access Point or Router . Ad-Hoc – Select this mode if you want to conne ct to anothe r wireless st ations in the Wireless LAN network without throug h an Access Point or Router . TX Po[...]
-
Page 18
13 3.2.1.2 Authentication and Security Parameter Description Authentication T ype This setting has to be cons istent with the wirele ss networks that the adapter intends to connect. Open – No authentication is needed among the wi reless network. Shared – Only wireless de v ices using a shared key (WEP Key identified) are allowed to connecting e[...]
-
Page 19
14 Parameter Description WP A-PSK – It is a special mode de signed for home and sm all business users who do n ot have access to network authenticatio n servers. In this mode, known as Pre-S hared Key , the user manually enters the st arting pa sswo rd in their access point or gateway , as well as in each wirel ess st ation in the network. WP A-P[...]
-
Page 20
15 Parameter Description AES – AES has been developed to ensu re the highest degree of security and authenticity for digit al information and it is the most advanced solution defined by IEEE 802.1 1i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication. WP A P[...]
-
Page 21
16 The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are those pro vided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Po[...]
-
Page 22
17 3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a dapter has supporte d are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that t[...]
-
Page 23
18 3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentic ation type such as TLS, TTLS or PEAP is selected and requi re d a certification to tell the client what server credentials to accept from the authenticat ion serve r in order to verify the server , you have to enable this function. Certificate Iss[...]
-
Page 24
19 3.3 Link Status From the “Link Status” option, you can view all t he inf ormatio n of the network you are connect ing to. Parameter Description S tatus Display the SSID and MAC ID of the network the adapter is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the n[...]
-
Page 25
20 Parameter Description Noise Level Display the noise level in the wireless e nvironment. 3.4 Statistics This option enables you to view the statistic informat ion of the con nectio n including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure m[...]
-
Page 26
21 Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to set the adapter to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adapter can be compatible with both 802.1 1g and 802.1 1b wireless st ations. If there are only[...]
-
Page 27
22 Parameter Description Tx Rate There are several options inclu ding Auto/1/2/5.5/1 1/6/9/12/18/24/36/48/54Mbps for you to select. When the “Auto” is selected, the device will ch oose the most suitable transmissi on rate automatically . The higher dat a rate you designated in the network, the shorter dist ance is allowed betwe en the adapter a[...]
-
Page 28
23 Parameter Description LEAP T urn on CCKM During normal operatio n, LEAP-enabled client devices mutually authenticate with a new access p oint by perfo rming a complete LEAP authen tication, incl uding communication with the main RADIUS server . When you configure your wirel ess LAN for fast re-associatio n, however , LEAP-enabled client devic es[...]
-
Page 29
24 Parameter Description WMM Enable Check on this item and click “Apply ” to enable WMM function, and then further you can configure WMM Power Save and Dire ct Link Setup function. WMM – Power Save Enable Check on this item to enable WMM Power Save function. Click “Setting” to further configure WMM Power Save setting, which includes: AC_B[...]
-
Page 30
25 3.8 Turbo Mode This adapter supports spe cific ways to increa se t he data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs, this feature (known as Turb o Mode) enables higher throughput than IE EE 802.11g standard (Up to 54Mbps). When the adapter is conn ecting to the Routers o[...]
-
Page 31
26 Parameter Description Rescan Click this button to scan for WPS-enabled access p oin t (perform a site survey) Information Select a found WPS-e nabled access poi nt first, then click ‘Information’ button. Detailed informatio n about sele cted access point will be displayed in a popup window . Pin Code The WPS Pin Code of this network adapter [...]
-
Page 32
27 3.10 SoftAP This adapter can run as a wirel ess AP. The relative configurations of the AP including channel, SSID, MAC Address Filtering and so on are described a s follows. Right click the Ralink Conf iguration Utility icon on the system tray of Windows and select “Swit ch to AP Mode” to turn on SoftAP function. 3.10.1 Config The Config pag[...]
-
Page 33
28 Parameter Description Wireless Mode Selects the wireless m ode support s by the AP . 802.1 1 B/G Mixed – The AP works in 1 1b+g mixed mode. 802.1 1 B Only – The AP works in 1 1b mode. 802.1 1 G Only – The AP works in 1 1g mode. TX Rate There are several options inclu ding Auto/1/2/5.5/1 1/6/9/12/18/24/36/48/54Mbps for you to select. When t[...]
-
Page 34
29 Parameter Description B/G Protection If you have a mix of 802.1 1 b and 802.1 1g wireless clients in the network, it is recommended to enable th e protection mechanism. This mechanism can decre ase the rate of dat a collision between 802.1 1b and 802.1 1g wireless clients. When the protection mode is enabled, the throughput of the AP will be a l[...]
-
Page 35
30 Parameter Description Default Click to use with default value. Apply Click to apply the setting change. 3.10.1.1 Auth. Vs. Security This option enables you to configure the authenticat io n mode and encryption algorithm u sed within the AP. Parameter Description Authentication T ype There are four types of authentication mode supporte d. Open ?[...]
-
Page 36
31 Parameter Description Encryption T ype Not Use - Disable the encryption mode. WEP - Enabl e the WEP Dat a Encryption. When the item is selected, you have to continue setting the WEP Key . TKIP - TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p acket is a kin d of message transmitted over a network.) This[...]
-
Page 37
32 3.10.2 Access Control The Access Control page enables you t o configure the access cont rol policy used within the AP. Parameter Description Access Policy Disable – Disable the MAC Address filtering function. Allow All – Only the wireless adapters with the MAC Address listed in Access List can co nnect to the AP . Reject All – The wirel es[...]
-
Page 38
33 3.10.3 Mac Table The Mac Table page displ a ys the detail information of the wireless adapters connected to the AP. Parameter Description MAC Address The MAC Address of the wireless adap ters connected to the AP . AID The Association ID of current connection . Power Saving Mode The supporting st atus of Power Saving Mode of the wireless adapter [...]
-
Page 39
34 3.10.4 Event Log The Event Log page displays all the event time and message. You may clear the table by clicking “Clear”. 3.10.5 Statistics The Statistics page displays the statistic information of the AP including tran smit statistics and receive statistics. You may reset the count ers by clicki ng “Re set Counters”.[...]
-
Page 40
35 3.10.6 About The About page displays the basic information abo ut the Utility, including Driver, Utility and EEPROM Version. The MAC Address of the adapter is di splaye d in the screen as well.[...]
-
Page 41
36 4 Glossary This chapter provides solutions to pro blems us ually encountered during the inst allation and operatio n of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly becoming[...]
-
Page 42
37 6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi re d Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix met[...]
-
Page 43
38 13. What is Spread S pectrum ? S pread S pectrum technolo gy is a wideband radio frequen cy technique developed by the milit ary for use in reliable, secure, missi on-critical communication system s. It is designed to trade of f bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than [...]