54/108Mbps Super G Wireless LAN USB Adapter
WL-U357
User’s Manual
1
Download from Www.Somanuals.com. All Manuals Search And Download.
Federal Communication Commission (FCC) Radiation Exposure
Statement
This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In
order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to
the antenna shall not be less than 20 cm (8 inches) during normal operation.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. However,
special attention must be paid to the dangers of electric shock and static electricity when working with
electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed
at all times to ensure the safe use of the equipment.
Revision
User’s Manual for PLANET Wireless USB Adapter
Model: WL-U357
Rev: 1.0 (June. 2005)
Part No. EM-WLU357
3
Download from Www.Somanuals.com. All Manuals Search And Download.
TABLE OF CONTENTS
1.1 Features...............................................................................................1
1.3 Specification.........................................................................................3
1.6 Installation Considerations ...................................................................4
3.1 Current Status ....................................................................................11
3.2.1 Add a Profile .......................................................................................................................15
3.2.2 Modify a Profile...................................................................................................................25
3.2.3 Remove a Profile................................................................................................................25
3.2.4 Switch Profiles....................................................................................................................26
3.2.5 Import a Profile ...................................................................................................................26
3.2.6 Export a Profile...................................................................................................................26
3.2.7 Scan for Available Networks...............................................................................................26
3.2.8 Auto Profile Selection Management....................................................................................27
4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 1 Introduction
Complying with the IEEE 802.11g standard, WL-U357 provides simple, reliable, high-speed wireless
connectivity for both desktop and laptop users. By combining two, state-of-the-art technologies—USB 2.0
and Super G— WL-U357 provides up to 108Mbps data rate in 2.4GHz unlicensed ISM band. Thus
makes WL-U357 more suitable for multimedia applications which required more bandwidth
Support of 64, 128 and 152-bit WEP encryption plus WPA (Wi-Fi Protected Access) high-level encryption
prevents your wireless communications from unauthorized access and ensures secure data transfer. The
WL-U357 is also backward compatible with 802.11b Access Points. Easy installation and Hot-plugging
offers full mobility and high availability, making the device a perfect choice for users who are getting tired
of running cables or in constant need of wireless access.
1.1 Features
ꢀ
ꢀ
ꢀ
ꢀ
ꢀ
ꢀ
2.4GHz ISM band, unlicensed operation
Wireless connectivity without the hassles and cost of running cables
IEEE 802.11b/g standard compliant
USB 2.0 A-type standard connector, compatible with USB 1.1
Super G mode provides up to 108Mbps data rate
Utilization of Direct Sequence Spread Spectrum plus OFDM modulation to provide robust,
interference-resistant solution in a multi-user environment
Support of 64/128/152-bit WEP encryption and WPA (Wi-Fi Protected Access) high-level
encryption
ꢀ
ꢀ
ꢀ
Support of Ad-Hoc / Infrastructure mode
Support of most popular operating systems including Windows 98SE/ME/2000/XP/Server
2003
ꢀ
Plug-and -Play installation
1.2 Application
Infrastructure
The major difference between Infrastructure network and Ad-hoc wireless network is that the former
requires an Access point. For old buildings, open areas, or frequently changing environments, just install
the WL-U357 on your desktop or laptop, and thus you can get connected to the wired Ethernet through a
wireless Access Point. SOHO users can then access the Internet and share all kinds of data with the
other wired or wireless clients within the coverage of wireless signals. For enterprise users, the
installation of multiple Access Points to enlarge the coverage of wireless signals can provide wireless
users with seamless network access.
The Infrastructure mode is appropriate for enterprise-scale wireless access to a central database or
provides various wireless applications for mobile users.
Infrastructure mode also supports roaming capabilities for mobile users. More than one BSS can be
configured as an Extended Service Set (ESS). The continuous wireless network connectivity allows
users to roam freely within an ESS. All wireless clients using WL-U357 or other IEEE 802.11b compliant
wireless adapters within one ESS must be configured with the same ESS ID and to use the same radio
1
Download from Www.Somanuals.com. All Manuals Search And Download.
channel.
Before adopting an ESS with roaming capability, choosing an available radio channel with less
interference is highly recommended. Proper Access Point positioning combined with a clear radio
channel will greatly enhance performance.
Ad-Hoc
Still complaining about the high price of wireless access points? This mode is the easiest and
cost-effective way to meet your requirements. It enables you to construct wireless networking in no time
without any access point.
Ad-hoc mode is a wireless network type in which a group of computers equipped with WL-U357 or other
wireless adapters are connected together to form an independent wireless LAN. All computers operating
in this mode must be configured to share the same radio channel.
In this scenario, new devices can be quickly added; however, wireless stations can only communicate
with the other peers that belong to the same IBSS (Independent Basic Service Set).
General Application
WL-U357 offers a fast, reliable, cost-effective solution for wireless access to the various network
scenarios:
1. Remote access to corporate network for information
E-mail, file transfer and terminal service.
2. Difficult-to-wire environments
2
Download from Www.Somanuals.com. All Manuals Search And Download.
Historical or old buildings, public occasions, venues and open area where it is difficult to wire.
3. Frequently changing environments
Factories, Retailers, and Offices that frequently change locations and rearrange the workplace
4. Temporary network access
Events, exhibitions, construction sites or some important occasions that require temporary
network access.
5. Access to database for mobile workers
Doctors, nurses, retailers, white-collar workers who need access to database while roaming in
the hospital, retail store or office.
6. SOHO (Small Office and Home Office) users
SOHO users who are in need of easy-to-install and wide coverage networking.
1.3 Specification
Attached Interface
USB 2.0 A-type connector
Operating Frequency /
Channel
2.412~2.462GHz (FCC, Canada) / 11 Channels
2.412~2.472GHz (ETSI, Europe) / 13 Channels
2.412~2.484GHz (TELEC, Japan) / 14 Channels
Emission type
RF Modulation
RF Output Power
Direct Sequence Spread Spectrum (DSSS) Technology
OFDM with BPSK, QPSK, 16QAM, 64QAM
15dBm
802.11b: 1, 2, 5.5, 11Mbps
Data Rate
802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps
Super G: up to 108Mbps
64/128/152bit WEP
802.1x
Security
Antenna
WPA-PSK
WPA-RADIUS
Internal Patch Antenna
IEEE802.11b:
2Mbps (QPSK): -87dBm
11 Mbps (QPSK): -82dBm
(Typically @PER < 8% packet size 1024 and @25ºC + 5ºC)
IEE802.11g:
54Mbps (64QAM): -66dBm
Sensitivity
48Mbps (64QAM): -69dBm
36Mbps (16QAM): -74dBm
24Mbps (16QAM): -78dBm
18Mbps (QPSK): -82dBm
12Mbps (QPSK): -84dBm
3
Download from Www.Somanuals.com. All Manuals Search And Download.
9Mbps (BPSK): -86dBm
6Mbps (BPSK): -88dBm
(Typically @PER < 10% packet size 1024 and @25ºC +
5ºC)
Working Mode
Power Consumption
Compatibility
Infrastructure, Ad-Hoc
Continuous TX: 472mA,
Continuous RX: 290mA
Windows 98SE/ME/2000/XP/Server 2003
1.4 Package Contents
Before installation, please check the items of your package. The package should include the following
items:
•
•
•
•
One Wireless USB Adapter
One USB Cable
One CD-ROM (Including the Configuration Utility, Driver and User’s Manual)
One Quick Installation Guide
If any of the above items is missing, contact your supplier as soon as possible.
1.5 Minimum System Requirements
Before installation, please check the following requirements with your equipment.
•
•
•
•
Pentium Based (above) IBM-compatible PC system with one vacancy USB 1.1/2.0 port
CD-ROM drive
Windows 98SE/2000/ME/XP Operating System
At least 5MBytes of free disk space for utility and driver installation
1.6 Installation Considerations
ꢀ
ꢀ
ꢀ
Beware of the walls and ceilings. Each wall or ceiling can reduce your wireless cover range
form 3-90 feet. Properly position your Access Points, Residential Gateways, and computers
so that the number of walls or ceilings residing between Access Points and clients is
minimized.
Building materials make a difference – A solid metal door or aluminum studs may have a
negative effect on signal coverage range. Try to properly position Access Points and
computers with wireless adapters so that there would be less obstacles existing between
them.
Keep your wireless LAN devices away from microwaves, cordless phones and child
incubators. It is likely that the latter will cause interferences to the operation of your wireless
LAN devices.
4
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2 Installation Procedure
Before you proceed with the installation, it is necessary that you have enough information about the
Wireless USB Adapter. Follow the procedure described below in this chapter to install the USB adapter
under Windows 98SE/ME/2000/XP.
2.1 Configuration Utility & Driver Installation
The following installation operates under Window XP. The procedure also applies to Windows
98SE/ME/2000.
Note 1: If you had ever installed the other Wireless Cards before, please uninstall the existed
drivers and utilities first.
Note 2: Please install the configuration utility before insert WL-U357 into the USB port of the
computer.
A.
Insert the bundled CD into the CD-ROM drive to launch the autorun program. Once completed, a
menu screen will show up as follows.
B.
Depending on the operating system you use, click on “For Windows 2000/XP” or “For Windows
98/ME” hyper link to initiate the installation procedure. You will see the below InstallShield Wizard
window. Please click “Next” to continue.
5
Download from Www.Somanuals.com. All Manuals Search And Download.
Note: If the screen in step A does not appear, click “Start” at the taskbar. Then, select “Run”
and type “E:\Utility” to access the folder, where E is your CD-ROM drive. Execute the
appropriate utility for your operating system.
C.
Select “I accept the terms of the license agreement” and click “Next” button to continue.
6
Download from Www.Somanuals.com. All Manuals Search And Download.
D. Select “Install Client Utilities and Driver (recommended)” and click “Next” button to continue.
E. Click “Yes” button to continue.
F. You can click “Browse” to specify the Destination Folder that you want to install the configuration
utility. Or you can keep the default setting and click ”Next” to continue.
7
Download from Www.Somanuals.com. All Manuals Search And Download.
G. Select the program folder you want to install this utility to. Or you can keep the default setting and
click ”Next” to continue
8
Download from Www.Somanuals.com. All Manuals Search And Download.
H. Click “Next” to continue
I.
It is recommended to select “PLANET WL-U357 Utility and Supplicant” option. If “Third Party
Supplicant” is selected, some functions may not work normally. Click “Next” to continue
9
Download from Www.Somanuals.com. All Manuals Search And Download.
J.
Insert WL-U357 when the dialog box pops up. Click “OK” to continue.
K. Click “Continue Anyway” to continue
L. Select “OK” to restart your computer right away
10
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3 Configuration Utility
The Configuration Utility is a powerful tool that helps you to configure WL-U357 easily and monitor the
status of wireless communication.
Right-click the icon
in the system tray, there are some items for you to use the configuration utility:
ꢁ
ꢁ
ꢁ
ꢁ
Help: Show Manual Webpage.
Exit: Select this to close the configuration utility tool.
Open PLANET WL-U357 Utility: It enables you to open the configuration utility tool.
Preferences: Select what you want to appear on the popup menu.
ꢁ
ꢁ
ꢁ
Disable Radio: Disable RF signals
Select Profile: Select profile that you want to use
Show Connection Status: Show Connection Status such as Active Profile etc.
3.1 Current Status
When you open the configuration utility, the system will scan all the channels to locate available access
points and wireless stations within the signal coverage. Then it will automatically connect to the access
11
Download from Www.Somanuals.com. All Manuals Search And Download.
point or wireless station with the strongest signal strength. This screen displays all the information about
the current wireless connection.
Profile Name The name of the current selected configuration profile.
Link Status Shows whether the station is associated to the wireless network.
Wireless Mode Displays the wireless mode.
IP Address Displays the computer’s IP address.
Network Type The type of network the station is connected to. The options include
Infrastructure (access point) and Ad Hoc.
Current Channel Shows the currently connected channel.
Server Based Shows whether server based authentication is used.
Authentication
Data Encryption Displays the encryption type the adapter is using.
Signal Strength Shows the strength of the signal.
Click the Advanced button to see the advanced status diagnostics.
Displays the wireless network name.
Network Name
(SSID)
Shows whether server based authentication is used.
Displays the encryption type the adapter is using.
Server Based
Authentication
Data Encryption
12
Download from Www.Somanuals.com. All Manuals Search And Download.
Displays the authentication mode. .
Authentication
Type
Shows whether MIC is enabled. MIC prevents bit-flip attacks on
encrypted packets.
Message Integrity
Check
Displays the name of the access point the wireless adapter is
associated to.
Associated AP
Name
Shows the IP address of the access point the wireless adapter is
associated to.
Associated AP IP
Address
Displays the MAC address of the access point the wireless adapter
is associated to.
Associated AP
MAC Address
Shows the power save mode. Power management is disabled in ad
Power Save Mode
hoc mode.
Displays the transmit power level rate in mW.
Shows the 802.11b/g available power levels.
Shows the current signal strength in dBm.
Displays the current noise level in dBm.
Current Power
Level
Available Power
Levels
Current Signal
Strength
Current Noise
Level
Shows how long the client adapter has been receiving power (in
hours:minutes:seconds). If the adapter runs for more than 24
hours, the display shows in days:hours:minutes:seconds.
Up Time
Displays the 802.11b preamble format.
802.11b Preamble
Shows the current receive rate in Mbps.
Current Receive
Rate
Displays the current transmit rate in Mbps.
Current Transmit
Rate
Shows the currently connected channel.
Displays frequency the station is using.
Shows the current channel set.
Channel
Frequency
Channel Set
13
Download from Www.Somanuals.com. All Manuals Search And Download.
Menu Bar
ꢁ
Action:
ꢂ
Disable Radio: Disable RF signals.
ꢂ
ꢂ
Disable Tray Icon: Disable the utility icon
in the system tray.
Exit: Select this to close the configuration utility tool.
ꢁ
ꢁ
Options: Select the display units of the Signal strength or Data.
Help:
ꢂ
PLANET WL-U357 Utility Help: display Manual Webpage.
About PLANET WL-U357 Utility: display Utility Version.
ꢂ
14
Download from Www.Somanuals.com. All Manuals Search And Download.
3.2 Profile Management
3.2.1 Add a Profile
To add a new configuration profile, click New on the Profile Management tab. The Profile Management
dialog box displays the General tab.
Please note that the WL-U357 utility only allows the creation of 16 configuration profiles. After the
creation of 16 profiles, clicking the New button displays an error message
3.2.1.1 General Tab
Profile Name Identifies the configuration profile. This name must be
unique. Profile names are not case sensitive.
Client Name Identifies the client machine.
15
Download from Www.Somanuals.com. All Manuals Search And Download.
Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a
maximum limit of 32 characters. WL-U357 can configure up
to three SSIDs (SSID1, SSID2, and SSID3).
3.2.1.2 Security Tab
This section describes the security settings of the PLANET WL-U357 Utility.
WPA & 802.1x Setting
Using EAP-TLS Security
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded
16
Download from Www.Somanuals.com. All Manuals Search And Download.
onto it. Check with the IT manager.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TLS from the drop-down menu.
3. Click the Configure button.
4. Select the appropriate certificate authority from the list. The server/domain name and the login
name are filled in automatically from the certificate information. Click OK.
5. Activate the profile.
Using EAP-TTLS Security
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded
onto it. Check with the IT manager.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TTLS from the drop-down menu.
17
Download from Www.Somanuals.com. All Manuals Search And Download.
3. Click the Configure button.
4. Select the appropriate certificate from the drop-down list and click OK.
5. Enter a EAP user name in the User Name field and password and start the EAP authentication
process.
6. Click Advanced and:
o
Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o
o
Enter the domain name of the server from which the client will accept a certificate.
Change the login name if needed.
7. Click OK.
8. Enable the profile.
Using PEAP-GTC Security
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server
properties must already be set. Check with the IT manager.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-GTC) from the drop-down menu.
18
Download from Www.Somanuals.com. All Manuals Search And Download.
3. Click the Configure button.
4. Select the appropriate network certificate authority from the drop-down list.
5. Enter a PEAP user name in the User Name field to use a separate user name and start the
PEAP authentication process.
6. Choose Token or Static Password, depending on the user database.
Note that Token uses a hardware token device or the Secure Computing SofToken program
(version 1.3 or later) to obtain and enter a one-time password during authentication.
7. Click Advanced and:
o
Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o
o
Enter the domain name of the server from which the client will accept a certificate.
The login name used for PEAP tunnel authentication, fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change
the login name if needed.
8. Click OK.
9. Enable the profile.
Using PEAP-MSCHAP V2 Security
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the
server properties must already be set. Check with the IT manager.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu.
19
Download from Www.Somanuals.com. All Manuals Search And Download.
3. Click the Configure button.
4. Select the appropriate certificate from the drop-down list.
5. Enter a PEAP user name in the User Name field to use a separate user name and start the
PEAP authentication process.
6. Click Advanced and:
o
Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o
o
Enter the domain name of the server from which the client will accept a certificate.
The login name used for PEAP tunnel authentication, fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change
the login name if needed.
7. Click OK.
8. Enable the profile.
Using LEAP Security
LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for
LEAP authentication. Check with the IT manager.
1.
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down
menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down
menu.
20
Download from Www.Somanuals.com. All Manuals Search And Download.
2.
Click the Configure button.
3.
Select to Use Temporary User Name and Password by choosing the radio button. Check
Manually Prompt for LEAP User Name and Password to manually login and start the LEAP
authentication process.
4.
5.
Select to Use Saved User Name and Password by choosing the radio button and specify the
LEAP user name, password, and domain to save and use.
Specify a domain name:
o
Check the Include Windows Logon Domain with User Name setting to pass the
Windows login domain and user name to the RADIUS server. (default)
o
OR: Enter a specific domain name.
6.
7.
If desired, check No Network Connection Unless User Is Logged In to force the wireless
adapter to disassociate after logging off.
Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how
long LEAP should wait before declaring authentication failed, and sending an error
message. The default is 90 seconds.
8.
9.
Click OK.
Enable the profile.
WPA Passphrase Setting
21
Download from Www.Somanuals.com. All Manuals Search And Download.
1. On the Security tab, choose the WPA Passphrase radio button
2. Click on the Configure button.
3. Fill in the WPA Passphrase
4. Click OK
Pre-Shared Key setting
1. Click the Define Pre-Shared Keys radio button on the Security tab.
2. Click on Configure button.
3. Fill in the fields in the Define Pre-Shared Keys dialog box
4. Click OK for the changes to take effect
22
Download from Www.Somanuals.com. All Manuals Search And Download.
Key Button
Description
Key Entry
Determines the entry method for an encryption key: hexadecimal (0-9, A-F),
or ASCII text (all keyboard characters except spaces).
Encryption Keys Selects the default encryption keys used. Only allows the selection for a
shared First, Second, Third, or Fourth key whose corresponding field has
been completed.
WEP Keys (1-4)
Defines a set of shared encryption keys for network configuration security. At
least one Shared Key field must be populated to enable security using a
shared key.
Click on the radio button to set the key as the default encryption key.
Defines the size for each encryption key. The options include:
WEP Key Size
o 64- bit (enter 10 digits for hexadecimal, 5 ASCII characters)
o 128- bit (enter 26 digits for hexadecimal, 13 digits for ASCII)
o 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII)
Overwriting an Existing Static WEP Key
1. Click the Pre-Shared Key radio button on the Security tab.
2. Click on Configure.
3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click
in the field of the existing static WEP key to overwrite.
4. Delete the asterisks in that field.
5. Enter a new key.
6. Make sure to select the Transmit Key button to the left of this key is selected for the key to
transmit packets.
7. Click OK.
Disabling Static WEP
•
To disable static WEP for a particular profile, choose None on the Profile Management tab and
click OK.
•
OR: Select any other security option on the Profile Management tab to automatically disable
static WEP.
23
Download from Www.Somanuals.com. All Manuals Search And Download.
3.2.1.3 Advanced Tab
Transmit Power Selects the transmit power level for 80211b/g in mW. Actual transmit
Level power may be limited by regulatory domain or hardware limitations.
Power Save Mode
•
•
•
Maximum: causes the access point to buffer incoming
messages for the wireless adapter. The adapter up periodically
polls the access point to see if any messages are waiting.
Normal: uses maximum when retrieving a large number of
packets, then switches back to power save mode after retrieving
the packets.
Off: turns power saving off, thus powering up the wireless
adapter continuously for a short message response time.
Network Type Specifies the network as either infrastructure (access point mode) or ad
hoc.
802.11b Preamble Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in
the 802.11b frames. The adapter can only use short radio headers if the
access point supports and uses them. Set to Long Only to override
allowing short frames.
Wireless Mode Specifies 2.4 GHz 54 Mbps, 2.4 GHz 11 Mbps, or Super G operation in an
24
Download from Www.Somanuals.com. All Manuals Search And Download.
access point network.
The wireless adapter must match the wireless mode of the access point it
associates to.
Wireless Mode This mode allows selection of the channel the wireless adapter uses. The
when Starting an channels available depend on the regulatory domain. If the adapter finds
Ad Hoc Network no other ad hoc adapters, this selection specifies which channel with the
adapter starts the ad hoc network with.
The wireless adapter must match the wireless mode and channel of the
clients it associates to.
802.11a Select what mode the wireless adapter uses to authenticate to an access
Authentication point:
Mode
•
•
Auto: causes the adapter to attempt authentication using
shared, but switches it to open authentication if shared fails.
Open: enables an adapter to attempt authentication regardless
of its WEP settings. It will only associate with the access point if
the WEP keys on both the adapter and the access point match.
•
Shared: only allows the adapter to associate with access points
that have the same WEP key.
For infrastructure (access point) networks, click the Preferred APs button to specify up to four
access points to which the client adapter should attempt to associate.
3.2.2 Modify a Profile
To modify a configuration profile, select the configuration from the Profile list and click the Modify button.
Please refer to above sections for detailed explanations about the settings.
3.2.3 Remove a Profile
To remove a configuration profile, select the configuration from the Profile list and click the Remove
button.
The WL-U357 utility only allows the creation of 16 configuration profiles. After the creation of 16 profiles,
clicking the New button displays an error message. Remove an old profile or modify an existing profile for
a new use.
25
Download from Www.Somanuals.com. All Manuals Search And Download.
3.2.4 Switch Profiles
1. To switch to a different profile, go to the Profile Management tab.
2. Click on the profile name in the Profile List.
3. Click the Activate button.
3.2.5 Import a Profile
1. From the Profile Management tab, click the Import button. The Import Profile window appears.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open. The imported profile appears in the profiles list.
3.2.6 Export a Profile
1. From the Profile Management tab, highlight the profile to export.
2. Click the Export button. The Export Profile window appears.
3. Browse to the directory to export the profile to.
4. Click Save. The profile is exported to the specified location
3.2.7 Scan for Available Networks
Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc
networks. On this list, click Refresh to refresh the list at any time.
The Scan Result List provides icons below that specify the operational state and the signal strength for
available stations.
26
Download from Www.Somanuals.com. All Manuals Search And Download.
3.2.8 Auto Profile Selection Management
Including a profile in the auto selection feature allows the wireless adapter to automatically select that
profile from the list of profiles and use it to connect to the network.
Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button.
2. The Auto Profile Selection Management window appears, with a list of all created profiles in the
Available Profiles box.
3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto
Selected Profiles box.
Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box.
2. Click Move Up or Move Down as appropriate.
The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest
priority.
3. Click OK.
4. Check the Auto Select Profiles box.
5. Save the modified configuration file.
When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab,
the client adapter scans for an available network. The profile with the highest priority and the same SSID
as one of the found networks is the one that is used to connect to the network. If the connection fails, the
client adapter tries the next highest priority profile that matches the SSID, and so on.
27
Download from Www.Somanuals.com. All Manuals Search And Download.
3.3 Diagnostics
The Diagnostics tab of the WL-U357 Utility provides buttons used to retrieve receive and transmit
statistics. The Diagnostics tab does not require any configuration.
The Diagnostics tab lists the following receive and transmit diagnostics for frames received by or
transmitted by the wireless network adapter:
•
•
•
•
Multicast frames transmitted and received
Broadcast frames transmitted and received
Unicast frames transmitted and received
Total bytes transmitted and received
Click the Adapter Information button for more general information about the WL-U357 and its driver.
Click the Advanced Statistics button on the Diagnostics tab to also show receive and transmit statistical
information for the following receive and transmit diagnostics for frames received by or transmitted to the
WL-U357:
Transmitted Frames
Received Frames
•
•
•
•
Frames transmitted OK
•
•
•
•
Frames received OK
Frames retried
Frames dropped
No ACK frames
Beacons
Frames with errors
CRC errors
28
Download from Www.Somanuals.com. All Manuals Search And Download.
•
•
•
ACK frames
•
•
•
•
•
•
Encryption errors
RTS Frames
Duplicate frames
Clear-to-send (CTS)
Frames
AP mismatches
Data rate mismatches
•
•
•
No CTS frames
Retried RTS frames
Retried data frames
Authentication time-out
Authentication rejects: the number of AP
authentication failures received by the
wireless network adapter
Association time-out
•
•
Association rejects: the number of access
point authentication rejects received by the
wireless network adapter
Standard MIC OK
•
•
•
•
Standard MIC errors
CKIP MIC OK
CKIP MIC errors
29
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4 Troubleshooting
This section provides solutions to problems usually encountered during the installation and operation
of the USB adapter. Read the description below to diffuse your doubts.
What is the IEEE 802.11g standard?
802.11g is the latest IEEE standard for high-speed WLAN communications that provides up to
54Mbps data rate in the 2.4GHZ band. It has become the mainstream technology of current
WLAN networks. It uses OFDM modulation to reach higher data transmission rate and
backward compatible with 802.11b
What is the IEEE 802.11b standard?
The IEEE 802.11b WLAN standard subcommittee, which formulates a standard for the industry.
The objective is to enable WLAN hardware from different manufacturers to interoperate.
What features does the IEEE 802.11 standard provide?
The product supports the following IEEE 802.11 functions:
‧ CSMA/CA plus Acknowledge protocol
‧ Multi-Channel Roaming
‧ Automatic Rate Selection
‧ RTS/CTS feature
‧ Fragmentation
‧ Power Management
What is Ad-hoc?
An Ad-hoc mode is a wireless network type in which a group of computers equipped with
wireless adapters are connected as an independent wireless LAN without any access point. All
computers operating in this mode must be configured to share the same radio channel and
SSID.
What is Infrastructure?
The difference between Infrastructure network and Ad-hoc network is that the former requires
an Access point. The Infrastructure mode is appropriate for enterprise-scale wireless access to
a central database or provides various wireless applications for mobile users.
What is BSS ID?
An Infrastructure network is called a Basic Service Set (BSS). All the wireless stations in a BSS
must share the same BSS ID.
What is TKIP?
It is another encryption method to overcome the inherent weaknesses of WEP, a next
generation of WEP. It adopts new algorithm (Michael) to generate 128/192-bit encryption keys
and provides per-packet key mixing, a message integrity check and a re-keying mechanism.
What is AES?
AES (Advanced Encryption Standard) is a chip-based encryption method of new generation
and has been incorporated into the newly-approved security standard 802.11i. It supports 128,
192 and 256-bit encryption key length and adopts Rijndael algorithm. It is widely believed it is
impossible to crack AES.
What is DSSS? What is FHSS? And what are their differences?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes
frequency in a pattern that is known to both transmitters and receivers. Properly synchronized,
the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears
to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a
redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping
code). The longer the chip is, the greater the probability that the original data can be recovered.
Even if one or more bits in the chip are damaged during transmission, statistical techniques
embedded in the radio can recover the original data without-the need for retransmission. To an
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by
most narrowband receivers.
What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the
30
Download from Www.Somanuals.com. All Manuals Search And Download.
military for use in reliable, secure, mission-critical communication systems. It is designed to
trade off bandwidth efficiency for reliability, integrity, and security. In other words, more
bandwidth is consumed than in the case of narrowband transmission, but the trade off
produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver
knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned
to the right frequency, a spread –spectrum signal looks like background noise. There are two
main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread
Spectrum (FHSS).
31
Download from Www.Somanuals.com. All Manuals Search And Download.
|
Philips Blu ray Player BDP3008 User Manual
Philips Bottle Warmer SCD260 User Manual
Philips Cell Phone 535 User Manual
Philips Home Theater System 19C5808E User Manual
Philips TV DVD Combo 21PT6818 User Manual
Philips TV Receiver 21PT2217B User Manual
Pioneer Flat Panel Television PRO 930HD User Manual
Planet Technology Cordless Telephone VIP 321 User Manual
Poulan Tiller 418121 User Manual
Pride Mobility Mobility Aid Jazzy Select 6 User Manual