Rosewill Computer Hardware RNX N360PC User Guide

Wireless N PCI Adapter RNX-N360PC  
User Manual  
1910020413  
Download from Www.Somanuals.com. All Manuals Search And Download.  
National Restrictions  
2400.0-2483.5 MHz  
Country  
Restriction  
Reason/remark  
Bulgaria  
General authorization required for outdoor  
use and public service  
France  
Outdoor use limited to 10 Military Radiolocation use. Refarming of the  
mW EIRP. within the band 2.4 GHz band has been ongoing in recent  
2454-2483.5 MHz  
years to allow current relaxed regulation. Full  
implementation planned 2012  
Italy  
If used outside of own premises, general  
authorization is required  
Luxembourg  
Norway  
General authorization required for network  
and service supply(not for spectrum)  
Implemented  
This subsection does not apply for the  
geographical area within a radius of 20 km  
from the centre of Ny-Ålesund  
Russian  
Only for indoor applications  
Federation  
Note: Please don’t use the product outdoors in France  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table of Content  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Package Contents  
The following items should be found in your package:  
¾
¾
¾
One RNX-N360PC Wireless N PCI Adapter  
Quick Installation Guide  
One Resource CD for RNX-N360PC, including:  
Wireless N Client Utility and Drivers  
User Guide  
Other Helpful Information  
Note:  
)
Make sure that the package contains the above items. If any of the listed items are  
damaged or missing, please contact with your distributor.  
Conventions:  
The ‘Adapter’ mentioned in this user guide stands for RNX-N360PC Wireless N PCI  
Adapter without any explanations.  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1 Overview  
Thank you for choosing RNX-N360PC Wireless N PCI Adapter.  
1.1 Overview of the product  
The adapter is an 802.11n client device; it is designed to provide a high-speed and  
unrivaled wireless performance for your notebook. With a faster wireless connection, you  
can get a better Internet experience, such as downloading, gaming, video streaming and  
so on.  
With the 802.11n technology, higher throughput improvements using MIMO (multiple input,  
multiple output antennas), the RNX-N360PC’s auto-sensing capability allows high packet  
transfer rate of up to 300Mbps for maximum throughput. It has good capability on  
anti-jamming, and it can also interoperate with other wireless (802.11b) products. The  
adapter supports WEP, WPA and WPA2 encryption to prevent outside intrusion and  
protect your personal information from being exposed.  
The adapter is easy to install and manage. The Quick Setup Wizard guides you  
step-by-step through the installation process; the Wireless N Client Utility helps you create  
a wireless connection immediately.  
With unmatched wireless performance, reception, and security protection, the  
RNX-N360PC is the best choice for easily adding or upgrading wireless connectivity to  
your notebook computer.  
1.2 Features  
¾
¾
Complies with IEEE802.11n, IEEE802.11g, IEEE802.11b standards  
Supports WPA/WPA2 data security, IEEE802.1x authentication, TKIP/AES encryption,  
64/128/152-bit WEP encryption  
¾
Supports high rate of up to 300Mbps for maximum throughput, supports automatically  
adjust to lower speeds due to distance or other operating limitations  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
¾
¾
¾
¾
¾
¾
¾
Provides 32-bit PCI interface  
Supports Ad-Hoc and Infrastructure modes  
Good capability on anti-jamming  
Supports roaming between access points when configured in Infrastructure mode  
Ease to configure and provides monitoring information  
Supports Windows 2000/ XP/ Vista/ 7  
Three External antennas which are listed in a format of 3x3 for three receivers and  
three transmitters.  
1.3 LED Status  
LED Indications Status  
Working Status  
The adapter is inserted in the slot and the power  
is on.  
Status  
Solid Light  
The adapter is trying to scan a networking  
connection;  
Flashing Slowly  
The adapter is already connected but is not  
transmitting or receiving data.  
Activity  
Flashing Quickly The adapter is transmitting or receiving data.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 2 Installation Guide  
2.1 Hardware Installation  
To install the adapter, follow these steps listed below:  
1. Turn off your desktop PC and disconnect the power.  
2. Remove your PC case and locate an available PCI slot on the motherboard. Remove  
the metal slot cover on the back of the PC. Check with your computer manufacturer for  
instructions if needed.  
3. Slide the PCI Adapter into the PCI slot. Make sure that all of its pins are touching the  
slot's contacts. Once the adapter is firmly in place, secure its fastening tab to your PC's  
chassis with a mounting screw. Then, close your PC case.  
4. Reconnect your PC’s power and turn on your desktop PC.  
2.2 Software Installation  
2.2.1 Overview  
The Adapter’s Setup Wizard will guide you through the Installation procedure for Windows  
2000/ XP/ Vista/ 7. The Setup Wizard will install the Wireless N Client Utility and drivers.  
When you install the hardware prior to before installing the software, the system will  
prompt “Found New Hardware Wizard”, click Cancel, and run the Setup Wizard program  
on the CD-ROM.  
The Setup steps for Windows 2000/ XP/ Vista/ 7 are very similar. The following setup  
steps are for Windows XP and for Windows Vista.  
2.2.2 Software Installation for Windows XP  
1. Insert the Resource CD into your CD-ROM drive, and open the folder named  
RNX-N360PC. Double-click Setup.exe in the proper folder to start the installation,  
and then the following screen for preparing setup will appear.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
           
Figure 2-1  
2. Soon, Figure 2-2 will display after a moment. Click Next to continue.  
Figure 2-2  
3. After that, you should choose a Setup type. It is recommended that you select Install  
Client Utilities and Driver. Select Install Driver Only to install driver only (shown in  
Figure 2-3). Click Next to continue.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Figure 2-3  
4. Click Browse to change the destination location for the software, then click Next in  
the screen below (shown in Figure 2-4).  
Figure 2-4  
5. After that, select the program folder, you should create a new folder name or select  
one from the Existing Folders list. It is recommended that you keep the default  
setting. Click Next to continue the installation.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Figure 2-5  
6. Choose configuration tool, if you are not sure, please leave it default. Then click Next  
to continue.  
Figure 2-6  
7. Wait a while for the setup as shown in Figure 2-7.  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-7  
Note:  
)
1) For Windows XP, the Setup Wizard will notify you of how to proceed with the  
installation duringthese steps (shown inFigure 2-8). Our drivers have been tested  
thoroughly, and are able to work with the operating system. Click Continue  
Anyway to continue the Installation.  
Figure 2-8  
2) In Windows 2000, the warning screen is shown below (Figure 2-9), and please  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
select Yes to continue installation.  
Figure 2-9  
8. After all the steps above, you will see the screen below, click Finish to complete the  
installation.  
Figure 2-10  
2.2.3 Software Installation for Windows Vista  
1.  
Insert the Resource CD into your CD-ROM drive, and open the folder named  
RNX-N360PC. Double-click Setup.exe in the proper folder to start the installation,  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
then the following screen for preparing setup will appear.  
Figure 2-11  
2.  
Soon, Figure 2-12 will display after a moment. Click Next to continue.  
Figure 2-12  
3.  
Click Yes to continue.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Figure 2-13  
4.  
The following page will display and please wait a moment.  
Figure 2-14  
Note:  
)
For Windows Vista, the Setup Wizard will notify you of how to proceed with the installation  
during these steps (shown in Figure 2-15). Our drivers have been tested thoroughly, and  
are able to work with the operating system. Click Install this driver software anyway to  
continue the Installation.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 2-15  
Click Finish to complete the installation.  
5.  
Figure 2-16  
2.2.4 Software Installation for Windows 7  
1. Insert the Resource CD into your CD-ROM drive. To continue, find the CD/DVD drive  
where the installation CD was placed. Open RNX-N360PC folder, and double-click  
Setup.exe. Then you will see Figure 2-17.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 2-17  
2. Soon, Figure 2-18 will display after a moment. Click Next to continue.  
Figure 2-18  
3. Wait a while for the setup as shown in Figure 2-19.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Figure 2-19  
Note:  
)
For Windows 7, the Setup Wizard will notify you about the Windows Security with the  
installation during these steps (shown in Figure 2-20). Our drivers have been tested  
thoroughly, and are able to work with the operating system. Click Install this driver  
software anyway to continue the installation.  
Figure 2-20  
4. Then you will see Figure 2-21. Click Finish to complete.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Figure 2-21  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3 Configuration Guide  
RNX-N360PC can be configured by Wireless N Client Utility. This chapter describes how  
to configure your Adapter for wireless connectivity on your Wireless Local Area Network  
(WLAN) and use the data security encryption features.  
After Installing the Adapter, the Adapter’s tray icon  
will appear in your system tray. It  
appears at the bottom of the screen, and shows the signal strength using color and the  
received signal strength indication (RSSI).  
If the icon is gray, there is no connection.  
If the icon is red, there is poor signal strength and the RSSI is less than 5dB.  
If the icon is yellow, there is poor signal strength and the RSSI is between 5dB and  
10dB.  
If the icon is green, there is good signal strength and the RSSI is between 10dB and  
20dB.  
If the icon is green, there is excellent signal strength and the RSSI is more than 20dB.  
Double-click the icon and the Wireless N Client Utility will run. You can also run the utility  
by clicking the Start All programs rosewill Wireless N Client Utility →  
Wireless Client Utility. The Wireless N Client Utility provides some integrated and easy  
tools to:  
¾
¾
¾
Display current status information  
Edit and add configuration profiles  
Display current diagnostics information  
The section below introduces these above capabilities.  
3.1 Current Status  
The Current Status tab contains general information about the program and its operations.  
The Current Status tab needn’t any configurations.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 3-1  
The following table describes the items found on the Current Status screen.  
¾
Profile Name - This shows the name of current selected configuration profile. The  
configuration of Profile name will be described on the General tab of Profile  
Management.  
¾
¾
¾
Link Status - This shows whether the station is associated to the wireless network.  
Wireless Mode - Here displays the wireless mode.  
Network Type - The type of network and the station currently connected are shown  
here. The options include:  
Infrastructure (Access Point)  
Ad Hoc  
Note:  
)
You can configure the network type and wireless mode on the  
tab of  
Profile  
Advanced  
.
Management  
¾
¾
¾
IP Address - This displays the computer’s IP address.  
Control Channel - This shows the currently connected channel.  
Data Encryption - Here displays the encryption type the driver is using. You can  
configure it on the Security tab of Profile Management.  
¾
Server Based Authentication - This shows whether the server based authentication  
is used.  
¾
Signal Strength - This shows the strength of the signal.  
Click Advanced on the screen above, you can see advanced information about the  
program and its operations.  
3.2 Profile Management  
Click the Profile Management tab of the Wireless N Client Utility and the next screen will  
appear (shown in Figure 3-2). The Profile Management screen provides tools to:  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
¾
¾
¾
¾
¾
¾
¾
¾
Add a new profile  
Modify a Profile  
Remove a Profile  
Activate a Profile  
Import a Profile  
Export a Profile  
Scan Available Networks  
Order profiles  
Figure 3-2  
3.2.1 Add or Modify a Configuration Profile  
To add a new configuration profile, click New on the Profile Management tab. To modify a  
configuration profile, select the configuration profile from the Profile list and click Modify.  
Then you will see the Management dialog box (shown in Figure 3-3).  
1. Edit the General tab  
¾
Profile Name - Please enter the Profile name which identifies the configuration  
profile. This name must be unique. Note that the profile names are not case-sensitive.  
¾
¾
Client Name - Please enter the Profile name which identifies the client machine.  
Network Names (SSIDs) - Please enter the IEEE 802.11 wireless network name.  
This field has a maximum limit of 32 characters.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 3-3  
2. Edit the Security tab  
Select the Security tab in the screen above, and then you can edit the fields to configure  
the profile. To define the security mode, select the radio button of the desired security  
mode as follows.  
Figure 3-4  
¾
¾
¾
¾
WPA/WPA2: Wi-Fi Protected Access  
WPA/WPA2 Passphrase: Wi-Fi Protected Access Passphrase  
802.1x: Enables 802.1x security.  
Pre-Shared Key (Static WEP): Enables the use of shared keys that are defined on  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
both the access point and the station. To define shared encryption keys, choose the  
Shared Key radio button and click Configure to fill in the Define Shared Keys window  
(shown in Figure 3-5).  
Note:  
)
The  
security mode is not available for 802.11n.  
WEP  
None: No security (not recommended).  
Note:  
¾
)
If the access point which the Adapter is associated has WEP set and the client has WEP  
enabled, make sure that Allow Association to Mixed Cells is checked on the Security  
tab to allow association. To complete WEP encryption configuration, you must select the  
802.11 Authentication Mode as appropriate on the Advanced tab of this Profile  
Management dialog.  
To configure the Encryption Keys under the Pre-Shared keys (Static WEP) Security mode:  
Figure 3-5  
Note:  
)
Select different Security Options, the configurations are different; you can select the  
appropriate security option and configure the exact key as your need.  
3. Edit the Advanced tab  
This screen below allows you to make advanced configuration for the profile.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Figure 3-6  
¾
Power Save Mode - Please select the power save mode in the drop-down list.  
Maximum-Selects maximum mode to let the access point buffer incoming  
messages for the Adapter. The Adapter will detect the access point if any  
messages are waiting periodically.  
Normal -Normal mode uses maximum when retrieving a large number of  
packets, then switches back to power save mode after retrieving the packets.  
Off - Turns power saving off, thus powering up the Wireless PCI Adapter  
continuously for a short message response time.  
¾
Network Type: There are basically two modes of networking:  
Infrastructure- All wireless clients will connect to an access point or wireless  
router.  
Ad-Hoc- Directly connecting to another computer, for peer-to-peer  
communication, using wireless network adapters on each computer, such as two  
or more RNX-N360PC wireless adapters.  
Note:  
)
1) An Infrastructure network contains an Access Point or wireless router. All the wireless  
devices or clients will connect to the wireless router or access point.  
2) An Ad-Hoc network contains only clients, such as laptops with wireless desktop  
adapters. All the adapters must be in Ad-Hoc mode to communicate.  
¾
Wireless Mode: Specifies 2.4 GHz 300 Mbps, 2.4 GHz 54 Mbps or 2.4 GHz 11 Mbps  
operation in an access point network. The Wireless adapter must match the wireless  
mode of the access point with which it associates.  
¾
Wireless Mode when Starting Ad Hoc Network: Specifies 2.4 GHz 300/54/11 Mbps  
to start an Ad Hoc network if no matching network name is found after scanning all  
available modes. This mode also allows the selection of the channel that the Wireless  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Adapter uses. The channels available depend on the regulatory domain. If the  
adapter finds no other ad hoc adapters, the channel that the adapter starts the ad hoc  
network with will be selected automatically. The Adapter must match the wireless  
mode and channel of the clients it associates.  
¾
802.11 Authentication Mode: Select which mode the Adapter uses to authenticate  
to an access point:  
Auto causes the adapter to attempt authentication using shared, but switches it  
to open authentication if shared fails.  
Open enables an adapter to attempt authentication regardless of its WEP  
settings. It will only associate with the access point if the WEP keys on both the  
adapter and the access point match.  
Shared only allows the adapter to associate with access points that have the  
same WEP key.  
For infrastructure (Access Point) networks, click Preferred APs… to specify four access  
points at most to the client adapter that attempts to be associated to the access points.  
The four access points have different priorities; the frontal has the higher priority.  
Figure 3-7  
3.2.2 Remove a profile  
1. Go to the Profile Management tab (shown in Figure 3-2).  
2. Select the profile name in the Profiles List.  
3. Click Remove.  
Note:  
)
The profile being used can’t be removed.  
3.2.3 Switch a profile  
1. Go to the Profile Management screen (shown in Figure 3-2).  
2. Select the profile name required in the Profiles List.  
3. Click Activate.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
3.2.4 Export a profile  
1. From the Profile Management screen (shown in Figure 3-2), highlight the profile to  
export.  
2. Click Export…, the Export Profile window will then appear below.  
3. Browse the directory to export the profile to.  
4. Click Save. The profile should then be exported to the specified location.  
Figure 3-8  
3.2.5 Import a Profile  
1. From the Profile Management screen (shown in Figure 3-2), click Import…. Then the  
Import Profile will appear below.  
2. Browse to the directory where the profile is located.  
3. Highlight the profile name.  
4. Click Open, the imported profile will then appear in the Profiles List.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 3-9  
3.2.6 Scan Available Networks  
1. Click Scan on the Profile Management screen (shown in Figure 3-2), the Available  
Infrastructure and Ad Hoc Networks window will appear below.  
2. Click Refresh to refresh the list at any time.  
3. Highlight a network name and click Activate to connect to an available network. If no  
configuration profile exists for that network, the Profile Management window will open  
the General tab screen. Fill in the Profile name and click OK to create the  
configuration profile for that network.  
Figure 3-10  
3.2.7 Auto Profile Selection Management  
The auto selection feature allows the adapter to automatically select a profile from the list  
of profiles and use it to connect to the network. To add a new profile into the Auto Selected  
Profiles list, please follow these steps.  
1. On the Profile Management screen (shown in Figure 3-2), click Order Profiles….  
2. The Auto Profiles Selection management window will appear (shown in Figure 3-11)  
with a list of all created profiles in the Available Profiles.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 3-11  
3. Highlight the profiles to add to auto profile selection, and click Add. The profile will  
appear in the Auto Selected Profiles box.  
4. Highlight a profile in the Auto Selected Profiles box.  
5. Click Move Up or Move Down as appropriate.  
Note:  
)
The first profile in the Auto Selected Profiles box has highest priority, while the last profile  
has the lowest priority.  
6. Click OK.  
7. Check the Auto Select Profiles checkbox on the Profile Management tab (shown in  
Note:  
)
When auto profile selection is enabled by checking Auto Select Profiles on the Profile  
Management tab, the client adapter will scan for an available network. The profile with the  
highest priority and the same SSID as one of the found networks will be used to connect  
to the network. If the connection fails, the client adapter will try the next highest priority  
profile that matches the SSID until an available network is found.  
3.3 Diagnostics  
The Diagnostics tab of the Wireless N Client Utility provides buttons used to retrieve  
receiving and transmitting statistics. The Diagnostics tab does not require any  
configuration.  
The Diagnostics tab lists the following receiving and transmitting diagnostics for frames  
received or transmitted by the wireless network adapter:  
¾
Multicast frames transmitted and received  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
¾
¾
¾
Broadcast frames transmitted and received  
Unicast frames transmitted and received  
Total bytes transmitted and received  
Figure 3-12  
3.3.1  
Check Driver Information  
Click the Adapter Information button in the screen above, you will see the adapter  
information, including general information about the wireless network adapter and the  
Network Driver Interface Specification (NDIS) driver. Access the adapter information from  
the Diagnostics tab.  
¾
¾
¾
¾
¾
¾
Card Name - The name of the wireless network adapter.  
MAC Address - The MAC address of the wireless network adapter.  
Driver - The driver name and path of the wireless network adapter driver.  
Driver Version - The version of the wireless network adapter driver.  
Driver Date - The creation date of the wireless network adapter driver.  
Client Name - The name of the client computer.  
3.3.2  
Check Receive and Transmit Statistical Information  
The Advanced Statistics show receiving and transmitting statistical information about the  
following receiving and transmitting diagnostics for frames received by or transmitted to  
the wireless network adapter.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Figure 3-13  
3.4 Configuration for Windows Vista  
After the Adapter's driver has been installed, Windows Vista will display a wireless  
Network Connection message like this one.  
Figure 3-14  
To establish a connection, please follow the steps below.  
1. Right-click the icon  
in your system tray, then click Connect to a network.  
Figure 3-15  
2. The following screen will show you available wireless networks. Highlight the one you  
want to join, and then click Connect.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Figure 3-16  
3. To continue, click Connect Anyway. Click the Cancel button to end the connection.  
Figure 3-17  
4. If the connection is successfully established, the following screen will appear, click  
Close to finish the connection.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 3-18  
3.5 Configuration for Windows 7  
Wireless N Client Utility is not available for Windows 7. So after the Adapter's driver has  
been installed, we have to use Windows WLAN Autoconfig to establish a connection.  
Please follow the steps below.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
1. Right-click the icon  
at the bottom of your screen in your system tray and then  
you will see the available wireless network list. Select the SSID of your Access Point,  
take rosewill for example. Click Connect.  
Figure 3-19  
2. If your wireless network is secured, you will be required to enter the security key as  
shown in Figure 3-20. Enter the passphrase, take 1234567890 for example. And then  
click OK.  
Figure 3-20  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3. If the key entered is correct, you will successfully connect to the network as shown in  
Figure 3-21  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 4 WPS Configuration  
WPS (Wi-Fi Protected Setup) function allows you to add a new wireless device to an  
existing network quickly.  
If the wireless card supports WPS, you can establish a wireless connection between  
wireless card and router using either Push Button Configuration (PBC) method or PIN  
method.  
First, the WPS software should be installed. Insert the Resource CD into your CD-ROM  
drive, and open the folder named RNX-N360PC. Double-click WPS.exe in the proper  
folder to start the installation, then the following screen for preparing setup will appear.  
Figure 4-1  
Then, please follow the clue of the Operation System to complete the WPS installation.  
After that, WPS function can be enabled. Here we will introduce two ways to configure the  
WPS (For the configuration of WPS, here takes the Wireless Router of our company for  
example).  
4.1 PBC (Push Button Configuration) method  
1. Firstly, press the WPS button directly on the front panel of the Router shown in Figure  
Figure 4-2  
2. Double click the icon  
on the desktop to open the WPS Utility and then you can see  
the welcome screen shown as Figure 4-3. Click Next to continue. Then select Push  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
the button on my access point in the next screen shown in Figure 4-4 and click  
Next.  
Figure 4-3  
Figure 4-4  
3. Then wait a minute until Figure 4-5 appears. Click Finish to complete the WPS  
configuration.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Figure 4-5  
4.2 PIN method  
There are two ways to configure the WPS by PIN method:  
1) Enter a PIN into your AP device.  
2) Enter the PIN from your AP device.  
Following are the detailed configuration procedure of each way.  
4.2.1  
Enter a PIN into your AP device  
1. Double click the icon  
on the desktop to open the WPS Utility and then you can  
see the welcome screen shown as Figure 4-3. Click Next to continue. Figure 4-4 will  
appear. Select the second option and you will see the PIN value of the adapter which  
is randomly generated. Click Next.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Figure 4-6  
2. Open the Router’s Web-based Utility and click WPS link on the left of the main menu.  
Figure 4-7  
3. Click Add device, then you can see Figure 4-8. Select Enter the new device’s PIN  
and enter the PIN value of the adapter shown in Figure 4-6, click Connect.  
Figure 4-8  
4. When Figure 4-5 appears, the WPS configuration is complete.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
4.2.2  
Enter the PIN from your AP device  
1. Open the WPS Utility and you will see Figure 4-3. Click Next to continue. Then Figure  
4-4 will appear. Select the third option and enter the PIN value which is labeled on the  
bottom of the Router. Click Next.  
Figure 4-9  
2. When Figure 4-5 appears, the WPS configuration is complete.  
Note:  
)
If you generate a new PIN code for your Router, please enter the new one instead.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix A: Specifications  
Normal  
Interface  
32 bit PCI Interface  
Standards  
IEEE802.11n; IEEE802.11g; IEEE802.11b;  
Windows 2000/Windows XP/Windows Vista/Windows 7  
Operating System  
Up to 300Mbps  
13.5/27/40.5/54/81/108/121.5/135Mbps  
13/26/39/52/78/104/117/130Mbps  
6.5/13/19.5/26/39/52/58.5/65Mbps  
1/2/5.5/11Mbps  
Radio Data Rate  
(Auto Rate Sensing)  
11b:CCK,QPSK,BPSK;  
11g:OFDM;  
Modulation  
11n: QPSK,BPSK,16-QAM,64-QAM;  
Media Access Protocol  
Data Security  
CSMA/CA with ACK  
WPA/WPA2; 64/128/152-bit WEP; TKIP/AES  
2.412 ~ 2.462GHz  
(Only 2.412GHz~2.462GHz is allowed to be used in the USA,  
which means only channel 1~11 is available for American users  
to choose)  
Frequency  
Spread Spectrum  
Direct Sequence Spread Spectrum (DSSS)  
FCC, CE  
Safety & Emissions  
Environmental and Physical  
0~40(32~104)  
Operating Temp.  
Storage Temp.  
-40– 70(-40~158)  
Working Humidity  
Storage Humidity  
10% - 90% RH, Non-condensing  
5% - 90% RH, Non-condensing  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Appendix B: Glossary  
¾
¾
¾
802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps  
using direct-sequence spread-spectrum (DSSS) technology and operating in the  
unlicensed radio spectrum at 2.4GHz, and WEP encryption for security. 802.11b  
networks are also referred to as Wi-Fi networks.  
802.11g - specification for wireless networking at 54 Mbps using direct-sequence  
spread-spectrum (DSSS) technology, using OFDM modulation and operating in the  
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b  
devices, and WEP encryption for security.  
Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless  
Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless  
computers operate on a peer-to-peer basis, communicating directly with each other  
without the use of an access point. Ad-hoc mode is also referred to as an  
Independent Basic Service Set (IBSS) or as peer-to-peer mode, and is useful at a  
departmental scale or SOHO operation.  
¾
DSSS - (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit  
pattern for all data transmitted. This bit pattern is called a chip (or chipping code).  
Even if one or more bits in the chip are damaged during transmission, statistical  
techniques embedded in the receiver can recover the original data without the need  
of retransmission. To an unintended receiver, DSSS appears as low power wideband  
noise and is rejected (ignored) by most narrowband receivers. However, to an  
intended receiver (i.e. another wireless LAN endpoint), the DSSS signal is recognized  
as the only valid signal, and interference is inherently rejected (ignored).  
¾
¾
FHSS - (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops)  
the carrier frequency of a conventional carrier several times per second according to  
a pseudo-random set of channels. Because a fixed frequency is not used, and only  
the transmitter and receiver know the hop patterns, interception of FHSS is extremely  
difficult.  
Infrastructure Network - An infrastructure network is a group of computers or other  
devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN. In  
infrastructure mode, the wireless devices communicate with each other and to a  
wired network by first going through an access point. An infrastructure wireless  
network connected to a wired network is referred to as a Basic Service Set (BSS). A  
set of two or more BSS in a single network is referred to as an Extended Service Set  
(ESS). Infrastructure mode is useful at a corporation scale, or when it is necessary to  
connect the wired and wireless networks.  
¾
Spread Spectrum - Spread Spectrum technology is a wideband radio frequency  
technique developed by the military for use in reliable, secure, mission-critical  
communications systems. It is designed to trade off bandwidth efficiency for reliability,  
integrity, and security. In other words, more bandwidth is consumed than in the case  
of narrowband transmission, but the trade off produces a signal that is, in effect,  
louder and thus easier to detect, provided that the receiver knows the parameters of  
the spread-spectrum signal being broadcast. If a receiver is not tuned to the right  
frequency, a spread-spectrum signal looks like background noise. There are two  
main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency  
Hopping Spread Spectrum (FHSS).  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
¾
¾
SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric  
key identifying a wireless local area network. For the wireless devices in a network to  
communicate with each other, all devices must be configured with the same SSID.  
This is typically the configuration parameter for a wireless PC card. It corresponds to  
the ESSID in the wireless Access Point and to the wireless network name. See also  
Wireless Network Name and ESSID.  
WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or  
128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To  
gain access to a WEP network, you must know the key. The key is a string of  
characters that you create. When using WEP, you must determine the level of  
encryption. The type of encryption determines the key length. 128-bit encryption  
requires a longer key than 64-bit encryption. Keys are defined by entering in a string  
in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code  
for Information Interchange – alphanumeric characters) format. ASCII format is  
provided so you can enter a string that is easier to remember. The ASCII string is  
converted to HEX for use over the network. Four keys can be defined so that you can  
change keys easily.  
¾
¾
¾
Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the  
industry standards group promoting interoperability among 802.11b devices.  
WLAN - (Wireless Local Area Network) - A group of computers and associated  
devices communicate with each other wirelessly, which network serving users are  
limited in a local area.  
WPA - (Wi-Fi Protected Access) - A wireless security protocol uses TKIP (Temporal  
Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS  
server.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix C: FAQ  
This chapter provides solutions to problems that may occur during the installation and  
operation of the Wireless Adapter. Read the descriptions below to solve your problems.  
1. I cannot communicate with the other computers linked via Ethernet in the  
Infrastructure configuration.  
1. Make sure that the PC to which the Adapter is associated is powered on.  
2. Make sure that your Adapter is configured on the same channel and with the  
same security options as with the other computers in the Infrastructure  
configuration.  
2. What should I do when the computer with the Adapter installed is unable to  
connect to the wireless network and/or the Internet?  
1. Check that the LED indicators for the broadband modem are indicating normal  
activity. If not, there may be a problem with the broadband connection.  
2. Check that the LED indicators on the wireless router are functioning properly. If  
not, check that the AC power and Ethernet cables are firmly connected.  
3. Check that the IP address, subnet mask, gateway, and DNS settings are  
correctly entered for the network.  
4. In Infrastructure mode, make sure the same Service Set Identifier (SSID) is  
specified on the settings for the wireless clients and access points.  
5. In Ad-Hoc mode, both wireless clients will need to have the same SSID. Please  
note that it might be necessary to set up one client to establish a BSS (Basic Service  
Set) and wait briefly before setting up other clients. This prevents several clients from  
trying to establish a BSS at the same time, which can result in multiple singular BSSs  
being established, rather than a single BSS with multiple clients associated to it.  
6. Check that the Network Connection for the wireless client is configured properly.  
If Security is enabled, make sure that the correct encryption keys are entered on both  
the Adapter and the access point.  
3. I can’t find any wireless access point / wireless device in ‘Site Survey’ function.  
1. Click ‘Rescan’ for few more times and see if you can find any wireless access  
point or wireless device.  
2. Please move closer to any known wireless access point.  
3. ‘Ad hoc’ function must be enabled for the wireless device you wish to establish a  
direct wireless link.  
4. Please adjust the position of network card (you may have to move your computer  
if you’re using a notebook computer) and click ‘Rescan’ button for few more times.  
If you can find the wireless access point or wireless device you want to connect  
by doing this, try to move closer to the place where the wireless access point or  
wireless device is located.  
4. I cannot establish connection with a certain wireless access point  
1. Click ‘Add to Profile’ for few more times.  
2. If the SSID of access point you wish to connect is hidden (nothing displayed in  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
3. ‘SSID’ field in ‘Site Survey’ function), you have to input correct SSID of the access  
point you wish to connect. Please contact the owner of access point to ask for  
correct SSID.  
4. You have to input correct passphrase / security key to connect an access point  
with encryption. Please contact the owner of access point to ask for correct  
passphrase / security key.  
5. The access point you wish to connect only allows network cards with specific  
MAC address to establish connection. Please go to ‘Status’ menu and write the  
value of ‘MAC Address’ down, then present this value to the owner of access  
point so he / she can add the MAC address of your network card to his / her  
access point’s list.  
5. The network is slow / having problem when transferring large files  
1. Move closer to the place where access point is located.  
2. There could be too much people using the same radio channel. Ask the owner of  
the access point to change the channel number.  
Thank you for purchasing a quality Rosewill Product.  
future support for your product.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  

PYLE Audio Stereo System PLVWAN6 User Guide
Quantum Audio Network Card DLT VS160 User Guide
Radio Shack Cordless Telephone ET 521 User Guide
RCA Digital Camera LDK 4700 User Guide
Riccar Vacuum Cleaner RSQ1 User Guide
Royal Sovereign Laminator RSH 1650 User Guide
Ryobi Chainsaw P514 User Guide
Samsung Computer Monitor 150N User Guide
Samsung Flat Panel Television 320MP User Guide
Sears Cultivator C459627020 User Guide