D-Link DWL-G520 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of D-Link DWL-G520, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of D-Link DWL-G520 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of D-Link DWL-G520. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of D-Link DWL-G520 should contain:
- informations concerning technical data of D-Link DWL-G520
- name of the manufacturer and a year of construction of the D-Link DWL-G520 item
- rules of operation, control and maintenance of the D-Link DWL-G520 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of D-Link DWL-G520 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of D-Link DWL-G520, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the D-Link service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of D-Link DWL-G520.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the D-Link DWL-G520 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Manual D-Link Air Plus Xtreme G DWL-G520 High-S peed 802.1 1g Building Networks for People TM Wireless PCI Adapter Rev . B1[...]

  • Page 2

    2 Content s Package Contents ................................................................................ 3 Introduction ............................................................................................ 4 Wireless Basics .................................................................................... 6 Getting S tarted ..........[...]

  • Page 3

    3 Package Content s System Requirement s: Windows XP/2000/Me/98SE ! A computer or laptop with an available 32-bit PCI slot ! At least 32 MB of memory and a 300 MHz processor ! An 802.1 1g or 802.1 1b Access Point (for Infrastructure mode), or another 802.1 1g or 802.1 1b wireless adapter (for Ad-Hoc, Peer-to- Peer networking mode). ! Content s of P[...]

  • Page 4

    4 Introduction The DWL-G520 has the newest, strongest, and most advanced security features available today . When used with other 802.1 1 WP A ( Wi-Fi Protected Access) and 802.1x compatible products in a network with a RADIUS server , the security features include: WP A: Wi-Fi Protected Access which authorizes and identifies users based on a secre[...]

  • Page 5

    5 Features & Benefit s ! Fully compliant with the 802.1 1b standard and interoperable with all existing 802.1 1b-compliant and 802.1 1g compliant devices ! Operates in the 2.4GHz frequency range ! Maximum reliability , throughput and connectivity with automatic dat a rate switching ! High Performance 32-bit PCI - The high capacity PCI interface[...]

  • Page 6

    6 W ireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. D-Link wireless products will allow you access to the data you want, when and where you want it. Y ou will be able to enjoy the freedom that[...]

  • Page 7

    7 Wireless Basics (continued) St andards-Based T echnology The DWL-G520 Wireless PCI Adapter utilizes the new 802.1 1g standard. The IEEE 802.1 1g standard is an extension of the 802.1 1b st andard. It increases the data rate up to 54 Mbp s within the 2.4GHz band, utilizing OFDM technology . This means that in most environments, within the specifie[...]

  • Page 8

    8 Installation Considerations The D-Link Air Plus Xtreme G DWL-G520 lets you access your network using a wireless connection from virtually anywhere within its operating range. Keep in mind, however , that the number , thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. T ypi[...]

  • Page 9

    9 LEDs LED stands for L ight - E mitting D iode. Getting Started With its default settings, the DWL-G520, when activated, will connect with other D-Link Air Plus Xtreme G products, right out of the box. Power: Solid green light indicates connection to the network Network: Blinking green light indicates activity on the network There are basically tw[...]

  • Page 10

    10 Please remember that D-Link AirPlus Xtreme G wireless devices are pre- configured to connect together , right out of the box, with their default settings. Getting Started (continued) For a typical wireless setup at home (as shown above), please do the following: Setting up a Wireless Infrastructure Network 4 2 1 3 6 5 7 Y ou will need broadband [...]

  • Page 11

    11 Getting Started (continued) Setting up a Wireless Ad Hoc Network Install the DWL-G520 into the desktop computer . (See the Quick Installation Guide included with the product for installation instructions .) Install the DWL-G650 Wireless PC Card Adapter into a laptop computer . (See the Quick Installation Guide included with the product .) Set th[...]

  • Page 12

    12 Select the Wireless Networks tab. Uncheck the box in the properties window that enables windows configuration. D-Link AirPlus Xtreme G DWL-G520 uses the Configuration Utility as the management software. The utility provides the user an easy interface to change any settings related to the wireless adapter . After you have completed the inst allat[...]

  • Page 13

    13 Link Info Using the Configuration Utility (continued) After clicking on the Configuration Utility icon, the Link Info screen will display the settings for the DWL-G520: SSID: The Service Set Identifier is the name assigned to the wireless network. The factory SSID setting is default . Tx Rate: Tx Rate settings are automatically determined for an[...]

  • Page 14

    14 Using the Configuration Utility (continued) Wireless Mode: Authentication: Data Encryption: Click on the pull-down menu; select from the following options: Choose one of the following modes: Select Enabled or Disabled. Open Authentication – the DWL-G520 is visible to all devices on the network Shared Authentication – allows communication onl[...]

  • Page 15

    15 Using the Configuration Utility (continued) *Not all servers can provide Authentication When you click IP Settings in the Configuration window , this pop-up screen will appear . Configure the IP Settings in this window . IP Settings Click Apply to save changes. Keys 1-4: Select the default key Hexadecimal digits consist of the numbers 0-9 and th[...]

  • Page 16

    16 Ad-Hoc Channel: All devices in the Ad-Hoc net- work must be set to the same channel. Click Apply if you have made any changes. Data Packet Parameter: Set the Fragmentation Threshold and the RTS Threshold . Please see below . Profile IP Settings: Y ou can Enable or Disable the IP Settings portion of your profile here. If you select Disable you wi[...]

  • Page 17

    17 Refresh: Click on Refresh to get the most updated list of available networks. A vailable Network: The top section of the window displays the Available Networks . Scroll up and down the list and highlight the network to which you wish to connect. Click on the Connect but- ton. Profile: In the lower half of the screen, you can manage the profiles [...]

  • Page 18

    18 Using the Configuration Utility (continued) Site Survey > Add If you clicked on Add, you can configure, in this window , all the properties of a profile that you wish to add to the network. In this window you can select the type of network connection. Click OK to save the changes. If you clicked on Configuration or Properties you can config- [...]

  • Page 19

    19 Using the Configuration Utility (continued) Site Survey > Configuration > 802.1x T o use 802.1x and to configure its settings, please do the following: IEEE 802.1x - Select Enabled . Click Authentication Config. Select the EAP T ype you want to use. Configure the information needed for authenticating. Click OK Trusted CA List. Inner Authen[...]

  • Page 20

    20 Using the Configuration Utility (continued) 802.1x > Advanced Security Settings > EAP T ypes EAP T ype Inner Authentication Protocol Information needed for Authenticating EAP-TLS EAP- MSCHAPv2 Certificate User Name User Name Password Domain Name LEAP User Name Password PA P TTLS Identity User Name Password CHAP TTLS Identity User Name Pass[...]

  • Page 21

    21 Using the Configuration Utility (continued) 802.1x > Advanced Security Settings > EAP T ypes (continued) 802.1x > Advanced Security Settings > Definitions of T erms V alidate Server Certificate: Check V alidate Server Certificate to verify the identity of the authentication server based on its certificate when using EAP-TTLS, PEAP , [...]

  • Page 22

    22 Using the Configuration Utility (continued) Domain Name: Each server has a domain name that uniquely identifies it. That domain name is normally contained in the Subject CN field of the server certificate. A server domain name ends with the name of a larger administrative domain, to which the server belongs. TTLS Identity: Tunneled Transport Lay[...]

  • Page 23

    23 Using the Configuration Utility (continued) Authentication > WP A Click Configure . Select the available network to which you want to connect. Select WP A in the Authentication field. Click Authentication Config After you click Authentication Config , the Advanced Security Settings screen will ap- pear . Complete the Advanced Security Setting[...]

  • Page 24

    24 Using the Configuration Utility (continued) Authentication > WP A-PSK WP A-PSK does not require a RADIUS Server in the network. Select WP A-PSK in the Authentication field. Click Authentication Config Click Configure . Select the available network to which you want to connect. D-Link AirPlus Xtreme G Utility[...]

  • Page 25

    25 Using the Configuration Utility (continued) Authentication > WP A-PSK (continued) Enter the WP A Passphrase. Click OK . The configuration is done. Advanced Security Settings[...]

  • Page 26

    26 Using the Network Setup Wizard in Windows XP In this section you will learn how to establish a network at home or work, using Microsof t Windows XP . Note: Please refer to websites such as http://www .homenethelp.com and http://www .microsof t.com/windows2000 for information about networking computers using Windows 2000, ME or 98SE. Go to Start&[...]

  • Page 27

    27 Please follow all the instructions in this window: Networking Basics (continued) Click Next In the following window , select the best description of your computer . If your computer connects to the Internet through a gateway/router , select the second option as shown. Click Next[...]

  • Page 28

    28 Enter a Computer description and a Computer name (optional.) Networking Basics (continued) Click Next Enter a Workgroup name. All computers on your network should have the same Workgroup name. Click Next[...]

  • Page 29

    29 Please wait while the Network Setup Wizard applies the changes. Networking Basics (continued) When the changes are complete, click Next . Please wait while the Network Setup Wizard configures the computer . This may take a few minutes.[...]

  • Page 30

    30 Networking Basics (continued) In the window below , select the option that fits your needs. In this example, Create a Network Setup Disk has been selected. Y ou will run this disk on each of the computers on your network. Click Next . Insert a disk into the Floppy Disk Drive, in this case drive A.[...]

  • Page 31

    31 Networking Basics (continued) Please read the information under Here’ s how in the screen below . After you complete the Network Setup Wizard you will use the Network Setup Disk to run the Network Setup Wizard once on each of the computers on your network. T o continue click Next.[...]

  • Page 32

    32 Networking Basics (continued) Please read the information on this screen, then click Finish to complete the Network Setup Wizard . The new settings will take effect when you rest art the computer . Click Ye s to restart the computer . Y ou have completed configuring this computer . Next, you will need to run the Network Setup Disk on all the oth[...]

  • Page 33

    33 ! Networking Basics (continued) Naming your Computer T o name your computer , please follow these directions:In Windows XP : Click Start (in the lower left corner of the screen) Right-click on My Computer Select Properties and click ! ! ! ! ! Select the Computer Name T ab in the System Properties window . Y ou may enter a Com- puter Description [...]

  • Page 34

    34 Networking Basics (continued) Naming your Computer ! In this window , enter the Computer name Select Workgroup and enter the name of the Workgroup All computers on your network must have the same Workgroup name. Click OK ! ! ! Checking the IP Address in W indows XP The wireless adapter-equipped computers in your network must be in the same IP Ad[...]

  • Page 35

    35 Networking Basics (continued) Checking the IP Address in W indows XP This window will appear . Click the Support tab Click Close ! ! Assigning a Static IP Address in W indows XP/2000 Note: Residential Gateways/Broadband Routers will automatically assign IP Ad- dresses to the computers on the network, using DHCP (Dynamic Host Configura- tion Prot[...]

  • Page 36

    36 Networking Basics (continued) Assigning a Static IP Address in W indows XP/2000 ! Double-click on Network Connections ! ! Double-click on Properties Right-click on Local Area Connections[...]

  • Page 37

    37 Select Use the following DNS server address . Enter the LAN IP Address of the wireless router . (D-Link wireless routers have a LAN IP Address of 192.168.0.1) Networking Basics (continued) Assigning a S tatic IP Address in Windows XP/2000 Y ou have completed the assignment of a Static IP Address. (Y ou do not need to assign a Static IP Address i[...]

  • Page 38

    38 Networking Basics (continued) Checking the Wireless Connection by Pinging in Windows XP and 2000* Checking the Wireless Connection by Pinging in Windows Me and 98* Go to Start > Run > type cmd . A window similar to this one will appear . T ype ping xxx.xxx.xxx.xxx , where xxx is the IP Address of the Wireless Router or Access Point. A good[...]

  • Page 39

    39 1. Check that the drivers for the DWL-G520 are inst alled properly . Click Device Manager ! Select the Hardware Ta b ! T roubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DWL-G520. Read the following descriptions if you are having problems. (The examples below are illustrated i[...]

  • Page 40

    40 T roubleshooting (continued) ! ! ! Double-click on Network Adapters Right-click on D-Link Air Plus Xtreme G DWL- G520 Wireless PCI Adapter Select Properties to check that the drivers are installed properly ! Look under Device Status to check that the device is working properly ! Click OK D-Link AirPlus Xtreme G DWL-G520 D-Link AirPlus Xtreme G D[...]

  • Page 41

    41 2. I cannot connect to the Access Point or the Wireless Router . Make sure that the SSID on the DWL-G520 Wireless PCI Adapter is exactly the same as the SSID on the Access Point or W ireless Router . Move the DWL-G520 and Access Point or Wireless Router into the same room and then test the wireless connection. Disable all security settings. (WEP[...]

  • Page 42

    42 T roubleshooting (continued) A . Under T ools > select Folder Options …> select View > under Hidden files and folders > select Show hidden files and folders B. Uncheck Hide extension for known file types > click on Apply C . Search for the files DWLG520.INF and DWLG520.SYS . Remove these files from the INF and SYSTEM32 (DRIVERS)[...]

  • Page 43

    43 Move the DWL-G520 and Access Point or Wireless Router into the same room and then test the wireless connection. Change the channel of the Access Point. Move devices within the line of sight Check that the Network Connection for the wireless client is configured properly . Select AP (Infrastructure) when connecting to an Access Point and select A[...]

  • Page 44

    44 S tandby mode = 4.66mA IEEE 802.1 1b IEEE 802.1 1g IEEE 802.1 1 T echnical S pecifications Standards PCI 2.2 Bus T ype: ! Security: 802.1x ! ! WP A (Wi-Fi Protected Access ), 64-,128-bit WEP with TKIP , MIC, IV Expansion, Shared Key Authentication Data Rates: With Automatic Fallback 54Mbps; 48Mbp s; 36Mbps; 24Mbps; 18Mbps; 12Mbps; 1 1Mbps; 9Mbps[...]

  • Page 45

    45 T echnical S pecifications Receiver Sensitivity: 54Mbps OFDM, 10% PER,-68dBm 48Mbps OFDM, 10% PER,-68dBm 1 1Mbp s CCK, 8% PER, -82dBm 9Mbps OFDM, 10% PER,-87dBm ! ! 36Mbps OFDM, 10% PER,-75dBm 24Mbps OFDM, 10% PER,-79dBm ! ! 18Mbps OFDM, 10% PER,-82dBm 12Mbps OFDM, 10% PER,-84dBm ! ! ! ! 6Mbps OFDM, 10% PER,-88dBm 5.5Mbps CCK, 8% PER,-85dBm ! 2M[...]

  • Page 46

    46 T echnical Support Y ou can find software updates and user documentation on the D-Link website. D-Link provides free technical support for customers within the United S tates and within Canada for the duration of the warranty period on this product. U.S. and Canadian customers can contact D-Link technical support through our website, or by phone[...]

  • Page 47

    47 Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited warranty for its product only to the person or entity that originally purchased the product from: • D-Link or its authorized reseller or distributor and • Products purchased and delivered within the fif ty states of the United St a[...]

  • Page 48

    48 • The customer must submit with the product as part of the claim a written description of the Hardware defect or Software nonconformance in sufficient detail to allow D-Link to confirm the same. • The original product owner must obtain a Return Material Authorization (“RMA”) number from the Authorized D-Link Service Office and, if reques[...]

  • Page 49

    49 The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment; such modifications could void the user’s authority to operate the equipment. Governing Law : This Limited W arranty shall be governed by the laws of the S tate of California. Some states do not allow exclusion or limitat[...]