Planet Technology WL-U357v2 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Planet Technology WL-U357v2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Planet Technology WL-U357v2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Planet Technology WL-U357v2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Planet Technology WL-U357v2 should contain:
- informations concerning technical data of Planet Technology WL-U357v2
- name of the manufacturer and a year of construction of the Planet Technology WL-U357v2 item
- rules of operation, control and maintenance of the Planet Technology WL-U357v2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Planet Technology WL-U357v2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Planet Technology WL-U357v2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Planet Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Planet Technology WL-U357v2.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Planet Technology WL-U357v2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    54/108Mbps Super G W ir eless LAN USB Adapter WL-U357v2 User ’ s Manual (V ersion 1.0)[...]

  • Page 2

    Copyright Copyright © 2006 by PLANET T echnology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retr ieval system, or translated into any language o r computer language, in any fo rm or by any means, el ectronic, mechanical, magnetic, optical, chemical, manual or otherwise, without t[...]

  • Page 3

    This equipment compli es with all the requir ements of DIRECT IVE 1999/ 5/CE OF THE EUROPEAN P A RLIAMENT AND THE COUNCIL OF 9 March 1 999 on radio equipment and tel ecommunication terminal Equipment and the mutual rec ognition of their conformity (R&TTE) The R&TTE Directive repe als and replaces in the directive 98/13/EEC (T elecommunicati[...]

  • Page 4

    Content s 1. Introduction ............................................................................................... 1 1.1 Features ................................................................................................ 1 1.2 Application ............................................................................................. 1 1.[...]

  • Page 5

    1. Introduction Complying with the IEEE 802.1 1g standard, WL-U357v2 provides simple, reliable, high-speed wireless connectivity for both desktop and laptop users. By combining two, state-of-the-art te chnologies - USB 2.0 and Super G - WL-U357v2 provides up to 108Mbps dat a rate in 2.4GHz unlicensed ISM band. Thus makes WL-U357v2 more suitable for[...]

  • Page 6

    wireless signals. For enterpris e users, the installation of multiple Access Point s to enlarge the coverage of wireless si gnals can provide wireless users with seamless network access. The Infrastructure mode is appropriate fo r enterprise-scale wireless access to a central database or provides various wir eless applications for mobile users. Inf[...]

  • Page 7

    General Application WL-U357v2 offers a fast, reliable, cost-e ffective solution for wireless access to the various network scenarios: 1. Remote access to corporate network for information E-mail, file transfer and terminal service. 2. Difficult-to-wire environments Historical or old buildings, public occasions, venues and open area where it is diff[...]

  • Page 8

    Emission type Direct Sequence Spread Spectrum (DS SS) Technology RF Modulation OFDM with BPSK, QPSK, 16QAM, 64QAM RF Output Power 15dBm Data Rate 802.11b: 1, 2, 5.5, 11Mbps 802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps Super G: up to 108Mbps Security 64/128bit WEP WPA-PSK / WPA2-PSK WPA / WPA2 Antenna Internal Patch Antenna Sensitivity IEEE802.11b: 2Mb[...]

  • Page 9

    1.5 Minimum System Requirement s Before installation, please check the following requirement s with your equipment. • Pentium Based (above) IBM-compat ible PC system with one vacancy USB 1.1/2.0 port • CD-ROM drive • Windows 98SE/2000/ME/XP and Server 2003 • At least 5MBytes of free disk spac e for utility and driver installation 1.6 Inst a[...]

  • Page 10

    2. Inst allation Procedure Before you proceed with the installati on, it is necessary that you have enough information about the W ireless USB Adapter . Follow the procedure described below in this chapter to install the USB adapter under W indows 98SE/ME/2000/XP . 2.1 Utility & Driver Inst allation The following installation operates under W i[...]

  • Page 11

    4. Y ou can click “Browse” to specify the Destination Folder that you want to install the utility . Or keep the default setting and click ”Next” to continue. 5. Y ou can change the Program Folder name as you wis h or use the default name to continue. Please c lick “Next” for next step. 7[...]

  • Page 12

    6. Installation will st art copy dr iver and utility to your OS. 7. When this dialog box appear , please click “Continue Anyway”. 8[...]

  • Page 13

    8. Please click “Finish” to complete the installation. 9. Please click “Finish” to restart your PC 9[...]

  • Page 14

    2.2 Hardware Inst allation 1. After PC rest art. Please select the correct Country Domain in the pull down list and press “OK” to continue. 2. Please connect WL-U357 to your PC’ s USB port. If your PC’s USB interface is not USB 2.0, Windows will prompt you there is a High-S peed device connect to non-High-S peed USB hub. Please don’t worr[...]

  • Page 15

    select “Continue Anyway” to continue. 5. After the driver inst allation comp lete appears. Please click “Finish”. 11[...]

  • Page 16

    3. Configuration 3.1 Link Information The default page is as below afte r you launch the Utility program. Status: Shows the SSID associated, which c an be used to identify the wireless network. SSID: Shows current SSID, which must be t he same for the wireless client and AP in order for communication to be established. Frequency: Shows the current [...]

  • Page 17

    3.2 Configuration This is the page where you can change the basic settings of the Access Point with the minimum amount of effort to implement a secure wireless network environment. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in t[...]

  • Page 18

    European (ETSI) domain and 1 to 14 for Japanese domain. Power Mode: There are 3 modes to choose. ● Continuous Access Mode (default) – the USB Dongle is constantly operating with full power and it consumes the most power. ● Maximum Power Save – the USB Dongle consumes the least power and only operates when there is wireless network activity.[...]

  • Page 19

    Auth. Mode: 5 options are available: Open System, Share key, Auto, WPA/WPA2 , WPA-PSK/WPA2-PSK and Disable . Select Open System, Share key or Auto for WEP data encryption feature. If one of the three options is selected, it is requir ed to configure the followi ng settings from the next dropping list. If WPA/WPA2 is selected, configuration is enabl[...]

  • Page 20

    If WPA-PSK/WPA2-PSK is selected, click the co nfiguration button. The popping window is as the below. Please enter the key. The following will only be activated to allow for configuration when Open System, Share Key or Auto is enabled in “ Auth. Mode ”. Default Key: select one of the 4 keys to use. Network Ke y : choose the encryption way, eith[...]

  • Page 21

    Available Network – displays the wireless networks (wireless clients and Access Points) that are in your signal range. Select any one of them to establis h communications by simply mouse double-click or click on the “ Connect ” button. Click “ Refresh ” button to start scanning fo r available network again. Profile – You can create and [...]

  • Page 22

    3.5 About US This page displays some information about the 108Mbps Wireless Network USB Dongle utility , which includes the ve rsion numbers for Driver , Firmware and Utility . When there is new version of so f tware available for upgrade, you will be able to identify by version numbers. 18[...]

  • Page 23

    19[...]

  • Page 24

    4. Glossary Access Point: An internetworking device that seamlessly connects wired and wireless networks. Ad-Hoc: An independent wireless LAN network formed by a group of computers, each with a network adapter. AP Client: One of the additional AP operating modes offered by 54Mbps Access Point, which allows the Access Point to act as an Ethernet-to-[...]

  • Page 25

    Bit: A binary digit, which is either -0 or -1 for value, is the smallest unit for data. Bridge: An internetworking functi on that incorporates the lowest 2 layers of the OSI network protocol model. Browser: An applicat ion program that enables one to read the content and interact in the World Wide Web or Intranet. BSS: BSS stands for “Basic Servi[...]

  • Page 26

    DSSS: Direct Sequence Spread Spectrum. DSSS generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the pr obability that the or iginal data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques e[...]

  • Page 27

    Gateway : a device that interconnects netwo rks with different, incompatibl e communication protocols. HEX: Hexadecimal, HEX, consists of numbers from 0 – 9 an d letters from A – F. IEEE: The I nstitute of E lectrical and E lectronics E ngineers, which is the largest technical professional society that prom otes the development and application [...]

  • Page 28

    Preamble Type: During transmission, the PSDU shall be appended to a PLCP preamble and header to creat e the PPDU. Two different preambles and headers are defined as the mandat ory supported long preamble and header which interoperates with the current 1 and 2 Mbi t/s DSSS specification as described in IEEE Std 802.11-1999, and an optional short pre[...]

  • Page 29

    Throughput: The amount of data transferred su ccessfully from one point to another in a given period of time. WEP: Wired Equiv alent Privacy (WEP) is an encryption scheme used to protect wireless data communicati on. To enable the icon will prevent other stations without the same WEP key from linking with the AP. Wireless Bridge – One of the addi[...]

  • Page 30

    5. T roubleshooting This section provides solutions to pr oblems usually encountered during the installation and operation of the USB adapter . Read the description below to dif fuse your doubts. What is the IEEE 802.1 1g standard? 802.1 1g is the latest IEEE standard for high-speed WLAN co mmunications that provides up to 54Mbps data rate in the 2[...]

  • Page 31

    new generation and has been incorporat ed into the newly- approved security standard 802.1 1i. It supports 128, 1 92 and 256-bit encryption key length and adopts Rijndael algorithm. It is widely believed it is impossible to crack AES. What is DSSS? What is FHSS? And what are their differences? Frequency-hopping spread-spectrum (FH SS) uses a narrow[...]