AmbiCom WL250N-USB manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of AmbiCom WL250N-USB, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of AmbiCom WL250N-USB one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of AmbiCom WL250N-USB. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of AmbiCom WL250N-USB should contain:
- informations concerning technical data of AmbiCom WL250N-USB
- name of the manufacturer and a year of construction of the AmbiCom WL250N-USB item
- rules of operation, control and maintenance of the AmbiCom WL250N-USB item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of AmbiCom WL250N-USB alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of AmbiCom WL250N-USB, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the AmbiCom service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of AmbiCom WL250N-USB.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the AmbiCom WL250N-USB item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    AmbiCom WL250N-USB Wireless-N USB Adapter (This manual is useful for user installs w ith Ralink WIFI configuration option) User Manual Version 1.0 November 18, 2008 COPYRIGHT Copyright ©2008/2009 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system , or translat[...]

  • Page 2

    Federal Communication Commission Interference Statement FCC Part 15 This equipment has been tested and found to comply with t he limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses,[...]

  • Page 3

    CHAPTER I: PRODUCT INFORMATION 1-1 Introduction And Safety Information 1-2 Safety Information 1-3 System Requirements 1-4 Package Contents 1-5 Familiar With Your New Wireless Network Dongle CHAPTER II: DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Dongle Installation – With Ralink Configuration Tools 2-2 Connect To Wireless Access Point 2-2-1[...]

  • Page 4

    CHAPTER I: PRODUCT INFORMATION 1-1 Introduction And Safety Information Thank you for purchasing this high-speed 802.11b/g/n wireless network dongle! Except common wireless standards 802.11b/g, this wireless network dongle is also 802.11 Draft N v2.0 compatible - data receiving rate is up to 150Mbps, and that’s faster than 802.11g wi reless networ[...]

  • Page 5

    1-5 Familiar With Your New Wireless Network Dongle LED Name Light Status Description On/Flashing Linked to a wireless access point / Transferring data Link/ Activity Off No wireless activity / No Link CHAPTER II: DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Dongle Installation – With Ralink Configuration Tools Please follow the following ins[...]

  • Page 6

    3. You can choose the configuration tool used to configure the wireless network dongle here. ‘Ralink Configuration Tool’ provides fully access to all functions of this wireless network dongle, such as WPS configuration. Otherwise, please select ‘Microso ft Zero Configuration Tool’ then click ‘Next’. 4. Please wait while the install proc[...]

  • Page 7

    6. When you want to configure your wireless connection, please right click on this icon, and a popup menu will appear. You can click ‘Launch Config Utilit ies’ to start configuration program. Note: that if you stopped config utility by ‘Exit’ function, you’ll not be able to maintain the wireless link to the access point you wish to use. I[...]

  • Page 8

    2-2-1-1 Scan For Other Wireless Devices Configuration utility will scan for all wireless access poi nts automatically. Please c heck if the wireless access point with the SSID (the name of wireless a ccess point) you preferred is shown here. If the wireless access point you wish to connect does not show here, please click ‘R escan’ to try again[...]

  • Page 9

    If the wireless access point does not have SSID, you’ll be prompted to input it now. Please ask the owner of wireless access point for the exact SSID and input it here, then click ‘OK’ when ready. If the SSID you provided here is wrong, you’ll not be able to connect to this access point. If the wireless access point uses enc ryption, you wi[...]

  • Page 10

    2-2-1-3 Add An Access Point To Profile If you will connect to some specific wireless access point frequently, you can add their information to the profile. The profile saves all information of access points, and you can recall them anytime you wish to establish connection. You can add a found access point to profile, or input all information of an [...]

  • Page 11

    To set authentication / encryption in formation for the access point. Please click ‘Auth. Encry.’ tab: Here are descriptions of every setup item: Item Name Description Authentication Select the authenticat ion type of the wireless access point or wireless device you wish to connect. When you’re adding a profile from an existing access point[...]

  • Page 12

    To set 802.1x authentication for the access point. Please click ‘802.1X’ tab: Here are descriptions of every setup item: Item Name Description EAP Method Select 802.1x EAP method from dropdown menu. Please ask the administrator of the access point you wish to connect to select a correct EAP method. Tunnel Authentication Select 802.1x tunnel aut[...]

  • Page 13

    2-2-2 Using Windows Zero Configuration Windows XP and Vista has a built-in wireless network configuration utility, called as ‘Windows Zero Configuration’ (WZC). You can also use WZC to configure your wireless network parameter: Right-click Ralink configuration utility icon and select ‘Use Zero Configurat ion as Configuration utility’. Then [...]

  • Page 14

    2-3 Connection Profile Management If you need to connect to different wireless access points at different time, like of access point of your home, office, cybercafe, or public wireless service, y ou can store the connection parameters (encryption, passphrase, security etc, etc.) as a profile for every access point, so you don’t have to input thes[...]

  • Page 15

    2-3-1 Add A profile If you want to click new profile, click ‘Profile’ menu, then click ‘Add’ button. You’ll be prompted to input detailed information of access point, as described in Section 2-2-1-3. 2-3-2 Edit An Existing Profile If you have added a profile before, and you wish to c hange the content of the profile, you can use this func[...]

  • Page 16

    2-3-3 Delete An Existing Profile If you no longer need a profile, you can delete it. Select t he profile you wish to delete from the list, and click ‘Delete’ button to delete it. 2-3-4 Activate A Profile When you want to connect to a specific wireless device in the profile list, y ou can select it and click ‘Activate’ button, to establish c[...]

  • Page 17

    2-4 Advanced Settings This wireless network dongle provides several advanc ed settings for experienced wireless users. You can change these settings to increase data transfer performance, or change operation mode. Right-click the Ralink configuration utility icon located at lower-right co rner of computer desktop and then click ‘Launch Config Uti[...]

  • Page 18

    2-5 View Network Statistics The configuration utility provides in formation about network statistics and lin k status. If you want to know how your wireless network dongle works, you can use thes e functions to get detailed information about the wireless connection you’re using. Right-click the Ralink configuration utility icon located at lower-r[...]

  • Page 19

    WMM - Power Save Enable Check this box to enable WMM power sa ving mode to save energy, and let your computer’s battery live longer. You also have to select WMM power save modes here: AC_BE: Best Performance AC_BK: Worst Performance AC_VI: Video data has priority AC_VO: Voice data has priority Direct Link Setup Enable If you have another WMM-enab[...]

  • Page 20

    WPS-enabled wireless access point, then click ‘Connect’ to establish connection to selected access point, if there are more than one WPS-enabled access point found. You can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. If you want to delete a found access point from the list, select [...]

  • Page 21

    CHAPTER III: Soft-AP Function This wireless dongle can act as a wireless service provi der to others. You can switch this wireless dongle’s operating mode to ‘AP’ mode to simulate the function of a real wireless access point by software, and all other computers and wireless devices can connect to y our computer wirelessly, even share the inte[...]

  • Page 22

    Here are descriptions of every setup item: Item Name Description SSID Please input the SSID (the name used to ident ify this wireless access point) here. Up to 32 numerical characters can be a ccepted here, excepting space. Channel Please select the wireless channel you wi sh to use. The number of channels available here will vary depends on the se[...]

  • Page 23

    Item Name Description Authentication Type Please select a wireless authentication type y ou wish to use. Available options are ‘Open’, ‘Shared’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If you want to disable wireless data encrypti on, you must select ‘Open’. Encryption Type Please select an encryption mode. The availab[...]

  • Page 24

    Here are descriptions of every setup item: Item Name Description Access Policy Select the policy type of your access ru le. Disable: Allow any wireless client with proper authentication settings to connect to this a ccess point. Allow All: Only allow wireless clients with MAC address listed here to connect to this access point. Reject All: Reject w[...]

  • Page 25

    3-5 Event Log This software access point will log all wireless-related acti vities as a log. Click ‘E vent Log’ tab, and the event log will be displayed. You can click ‘Clear’ to remove all entries in the log.[...]

  • Page 26

    3-6 Statistics If you want to know detailed information about how your software access point works, click ‘Statistics’ tab, and the event log will be displayed. You can click ‘RESET COUNTERS’ button to reset all counters to zero. 3-7 About The ‘About’ tab provides you the information about version number of t he configuration utility, d[...]

  • Page 27

    4-2 Troubleshooting Scenario Solution I can’t find any wireless access point / wireless device in ‘Site Survey’ function. 1. Click ‘Rescan’ for few more times and see if you can find any wireless access point or wireless device. 2. Please move closer to any known wireless access point. 3. ‘Ad hoc’ function must be enabled fo r the wir[...]

  • Page 28

    What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. What is TKIP? TKIP is a quick-fix method to quickly overcome [...]

  • Page 29

    What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devices using the same or near channel , and they are close enough, radio interference will occur and reduce the radio resource usability. What is STBC? STBC stands for Space-Time Block Coding, which is a techni[...]