Gigabyte GN-WPKG manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Gigabyte GN-WPKG, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Gigabyte GN-WPKG one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Gigabyte GN-WPKG. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Gigabyte GN-WPKG should contain:
- informations concerning technical data of Gigabyte GN-WPKG
- name of the manufacturer and a year of construction of the Gigabyte GN-WPKG item
- rules of operation, control and maintenance of the Gigabyte GN-WPKG item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Gigabyte GN-WPKG alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Gigabyte GN-WPKG, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Gigabyte service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Gigabyte GN-WPKG.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Gigabyte GN-WPKG item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    54Mbs Wireless PCI Adapter GN-WPKG User’s Manual http: //ww w .gigabyte.com .tw Version 3.0[...]

  • Page 2

    Federal Communicati on Commission Inter ference St atement : This eq uipment has be en tested a nd fou nd to comply w ith the l imits for a C lass B dig ital devic e, pursuant to Pa rt 15 of th e FCC Rul es. These li mits ar e desig ned to prov ide reasonable prot ection against h armful inter ference i n a residen tial i nstallati on. This equipme[...]

  • Page 3

    Contents CHA PTER 1 PRODUCT OVERVIEW ...........................................1 1.1 I NTRODUCTION TO THE W PKG W I RELES S PCI A DAPT ER .............................................. 1 1.2 F EATURES ................................................................................................................ 1 1.3 P HYSICAL D IMENSIO NS & [...]

  • Page 4

    1 Chapter 1 Product Ove rview 1.1 Introduc tion to t he GN-WPKG Wireless PCI Adapter The Gigab yte W PKG Wireless PCI Adapter instal ls qui ckl y into your m otherboar d’s PCI slo t, connec ting wireless ly to your W i-Fi Router - i nstant ly transf orm ing your PC into a wireles s AP , broaden ing the r ange of your wireles s networ k . The W PK[...]

  • Page 5

    2 Package Content s • GN- W PKG PCI Adapt er • Low pr ofile ex ternal antenn a • Setup CD • Quick Start Guid e In case of any missi ng or damaged accessor ies, please c ontact y our local distr ibutor or authori zed resel ler im mediatel y. I f you req uire r eturni ng the damag ed pro duct, y ou must pack it in the origin al packing ma ter[...]

  • Page 6

    3 Chapter 2 In stallation This chap ter cover s the instal lation of the W PKG Adapt er for your desktop PC. The following sections will assist you w ith proper in stallation of th e PCI Adapt er, and also with installing the nec essary drivers and utilities. For specific information regarding y our Version of W indow s, please refer t o the appr o[...]

  • Page 7

    4 2-2. Installing the Dri ver & Utility After rest arting y our computer the W indow s Found New Hardware wiz ard w ill open. W hen it does, please c lick Cancel to close it. GIGABYTE drivers and utilities offer more power and control ov er y our new WPKG PCI Adapter t han do es W indow s native Zero Configu ration Utility. Step 1: At the Found[...]

  • Page 8

    5 Step 4: InstallShield will install the W PKG drivers. Click Next to proceed. Step 5: Setup will detec t your version of W indows. Click Next .[...]

  • Page 9

    6 Step 6: Since your card is already inserted, Click OK . Step 7: Click Finish to complete inst allation.[...]

  • Page 10

    7 Chapter 3 Using the Wireless Utility The WPKG W ireless Utility is a powerf u l application that helps you to conf igure the network card and monitor the statisti cs o f the commu nicatio n link. This appli cation permits the con figuratio n for paramet ers w hile the c ard is op erating. It also offers more configurati on opti ons a nd suppor ts[...]

  • Page 11

    8 Figure 3-2. Curren t prof ile Description of item s in Figure 3-2 is as f ollows: Profile Name: A profile ca n be saved for v arious w ireless setting s in di ff erent environme nts, i.e. h ome, office, and the cor ner coffee shop. SSID: Displ ays the S SID o f the Ada pter or Ac cess Point. Channel: Shows the current wir eless channe l. A uthent[...]

  • Page 12

    9 Figure 3-3. Con figurati on Description of item s in Figure 3-3 is as follows: Profile Name: Us ers can sav e different pro f iles na mes for di fferent con figurations . SSID: Selec t the AP detected by the system fro m the dr op-dow n menu or input a SSID. (Default: ANY) Power Saving mode: Select “Pow er Saving Mode” (PSM) to turn off the A[...]

  • Page 13

    10 Figure 3-4 – Configuration Screen TX Power: Sel ect perc entage of trans mitted p ower. ( Default: A uto) RTS Threshold: This is a mechanism i mplemen ted to prevent the “Hi dden Node” probl em, “Hidden N ote” is a situ ation i n whic h two stati ons are withi n range o f the sam e Access Point, but are not within range of each other. [...]

  • Page 14

    11 Figure 3-5. Authentic ation and Sec urity A uthentication: Befor e a statio n connec ts to a SSID , the auth entication ty pe used by the SSID must be k nown. Authenti cation types include O PEN SYS TEM, W AP, W AP- PSK a nd SHAR ED. (Default: W PA-PSK) Encryption: To pr event u nauthori zed acc ess to d a ta transmitt ed o n the netw ork, the A[...]

  • Page 15

    12 He x k ey. WPA-PSK encry ption: W PA-PS K (Preshar ed Key ) uses TK IP or A ES based on your choice. You create a password (or P assphrase a s its often called) and the system will use the Passp hrase to create a ci pher co de in w hich it will encr ypt the da ta. To use WPA-PSK: 1. Creat e a Pass phrase, a nd key it in. U se 8~63 A SCII digits.[...]

  • Page 16

    13 Identity : The Account’s User ID. Password: Passw ords for users accounts c an be used w hen LEAP and MD 5-Chal lenge are selected as authentication types. Use Client Certifi cate: This certi fic ate is nec essary for TLS and an option for PEPA and TTLS. Check “Use Client Ce rtificate” to veri fy the authenticity o f a Client Certificate d[...]

  • Page 17

    14 3-1-2-2. 802. 1x Settings - CA Server Tab CA Serv er is used w h en TLS, TTLS or PEA P is i n use. W hen Use cert ificat e chain is checked, the Clie nt can verify if su ch server is reliable and then transm it Client Certificat e after the v erification is confir med. Figure 3-8. CA Serv er Setting To veri f y the CA s erv er: 1. Confirm i f th[...]

  • Page 18

    15 3-1-3. A dvanced Screen The A dvanced screen i ncludes fiel ds of vari ous parameter s to rev i ew or change driv ers. Just click OK to appl y any chang es in paramet ers in the t ab. A rebo ot is not neede d for changes to t a ke effect. (s ee Figure 3-12 ) Figure 3-1 2 Description of item s in Figure 3-12 is as follows: Wireless Mode: Sets i n[...]

  • Page 19

    16 collision when W LAN equipments require transmission. TX Rate: This option adjusts settings o f TX Rate according to the setting of “Infrastructur e W ireless Mode”. (Defau lt: Aut o ) 3.2. Link Status Tab The Link Status tab di splays the cur rent ass ociation infor mation ab out the Adapters connection with a w ireless networ k. (see Figur[...]

  • Page 20

    17 3.3. Site Sur vey Tab The Site Surv e y tab s hows you the list o f reachable access points a nd/or peer-to- peer Stations. Jus t doubl e click on the SSID that y ou want t o connec t or cl ick the Connect button. (see Figure 3-9 ) Figure 3-10. Site Sur vey Description of item s in Figure 3-10 is as follows: SSID: The name o f the w i reless net[...]

  • Page 21

    18 3.4. Statist ics Tab The St atistic s tab sh ows you the nu mber of packets sent an d received by the Ada pter (see Figure 3-11 ) Figure 3-11. Statistics Description of item s in Figure 3-11 is as follow s: Frames Transmitt ed Successfully : Number of frames tr ansmitted successfully . Frames Transmitted Succe ssfully W i thout Retry: Number of [...]

  • Page 22

    19 3.5. About Tab The A b out tab displays in formation a bout cur rent driv ers and physical MAC addr ess (see Figure 3-13 ) . Figure 3-13. About Tab GbConfig Version (D ate) – The version num ber (and date) of the Adapter Utility Driver Vers ion (Date) – The v er si on nu mb er ( and date) o f the Adapt er Driv er. EEPROM Version - Hardware v[...]

  • Page 23

    20 A ppendix A Troublesho oting This troubl eshooting gui de prov ides answers to so me co mmon pr oblems w hich you may encounter w hile installing or using GIGABYTE Wireless Adapters. Contact the GIGABY TE W irel ess T echnical Su ppor t Tea m at www.giga- byte.com i f you enc ounter probl ems no t mentione d in this section. Problem: Ca nnot con[...]

  • Page 24

    21 A ppendix B Specifications 1. System Host Interf ace PCI Operating Vo ltag es 5V ± 5% 2. RF Perf orm ance 802.11g (backward compatible to 802.11b) Frequenc y Bands 2412 ~ 248 4 MHz ( subjec t to loca l reg ulations ) Modulatio n Tec hnolog y OFDM and DS SS Modulat ion Tec hniques 64QAM, 1 6QAM, Q PSK, B PSK, CCK, DQP SK, DBPS K Data Rates 54, 4[...]

  • Page 25

    22 A ppendix C Regulatory Information CE Mark Wa rning: This is a Cl ass B pr oduct. In a d omestic enviro nment, this pro duct m ay caus e radi o inter feren ce, in whic h case the us er ma y be requir ed to tak e adeq uate m easur es. FCC St ateme nt: T his equi pment h as been tested and f ound to c ompl y with t he lim its for a Class B digital[...]

  • Page 26

    23 A ppendix D Warranty Limited Warranty Statement (1-Year W arranty ) Thank you for p urc hasi ng th e GIGABYTE Product. This limited warrant y statem ent will provide you one year warranty starting from the purchase date. Of which if any defe ct is occ urred due t o accidents or an y man-m ade fac tors, o r an y unauth orized t orn-off or dam age[...]