Edimax Technology Adaptor manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Edimax Technology Adaptor, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Edimax Technology Adaptor one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Edimax Technology Adaptor. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Edimax Technology Adaptor should contain:
- informations concerning technical data of Edimax Technology Adaptor
- name of the manufacturer and a year of construction of the Edimax Technology Adaptor item
- rules of operation, control and maintenance of the Edimax Technology Adaptor item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Edimax Technology Adaptor alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Edimax Technology Adaptor, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Edimax Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Edimax Technology Adaptor.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Edimax Technology Adaptor item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    T T u u r r b b o o W W i i r r e e l l e e s s s s L L A A N N H H i i - - G G a a i i n n U U S S B B 2 2 . . 0 0 A A d d a a p p t t o o r r User Manual V ersion: 1.0 (November , 2005)[...]

  • Page 2

    COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No p art of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the pri[...]

  • Page 3

    Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limit s are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can r[...]

  • Page 4

    Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with PCMCIA slot on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electric[...]

  • Page 5

    CONTENTS 1 INTRODUCTION ............................................................................. 1 1.1 Features ......................................................................................................................... 2 1.2 Specifications ..........................................................................................[...]

  • Page 6

    1 Introduction Thank you for purchasing the 802.11g T urbo Wire less LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LA N standa rd and easy to carry with the Mini size. It is suitable for any Laptop or De skto p computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps).[...]

  • Page 7

    1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of s[...]

  • Page 8

    1.3 Package Contents Before you begin the inst a llation, please check the items of your p ackage. The package sh ould include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as pos sible. 3[...]

  • Page 9

    2 Installation Procedure Before you proceed with the install ation, please notice following descriptions. Note1: Please do not install the adaptor into your computer be fore ins talling the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server. ) N[...]

  • Page 10

    C. In Windows XP , there is a “Windows Zero Configur ation T ool” for you to setup the wireless adaptor . Y ou can choose to configure the adaptor through the Windows Ze ro Config uration T ool or the Ralink Configuration T ool for the adaptor . It is recommended to choose the Ralink Configurat ion T ool for the adaptor . Click “Next” to co[...]

  • Page 11

    E. The system start s to install the sof tware of the adaptor . Please follow the instructions of the program to plug in the adaptor into the USB port of your computer . And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation. 6[...]

  • Page 12

    3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adaptor and monitor the link status and the statis tics during the communi cation process. When the adaptor is installed, t he configuration utility will be displayed automatically. This adaptor will auto connect to wireless device w[...]

  • Page 13

    Second W ay A. Right-click the icon and select “V iew Available Wirele ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable the utility for the adaptor . Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link statu[...]

  • Page 14

    3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations withi n the acce ssible range of your adaptor and automati cally connect to the wireless device with the highest sign al strength. Fr om the “Site Survey”, a ll the networks nea rby will be listed. You ca[...]

  • Page 15

    3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles an d the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activat[...]

  • Page 16

    3.2.1 Con figure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Y ou may specify a SSID[...]

  • Page 17

    Parameter Description PSM (Power Saving Mode) The power saving func tion is only availab le whe n the network type is in Infrastructure. CAM (Const antly Awake Mode) – The adapto r will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network T ype Infrastructure – This operatio[...]

  • Page 18

    Parameter Description RTS Threshold Minimum packet size required for a n R TS (Request T o Send). For packet s smaller than this threshold, an R TS is not sent and the packet is transmitted direct ly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor chang e is recommended. Fragment Th reshold The value defines the m[...]

  • Page 19

    Parameter Description Authentication T ype LEAP – LEAP is a pre -EAP , Cisco-proprietary proto col, with many of the features of EAP protocol s. Cisco controls the ability of other vendors to implement this protocol, so it shoul d be selected for use only when limited vendor choice for client, access-point, and server products is not a co nce rn.[...]

  • Page 20

    Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p a cket is a kind of message transmitted over a networ[...]

  • Page 21

    The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are th ose prov ided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Poi [...]

  • Page 22

    3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a daptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are si milar and easier than TLS in that they[...]

  • Page 23

    Parameter Description T unneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected us er EAP Identity used for authentication. The identity specified may cont ai n up to 63 ASCII characters, is case sensitive and ta kes the form of a Networ[...]

  • Page 24

    Parameter Description Allow Intermediate Certificates A server desi gnates an issuer as a trusted root authority by placing the issuer's self-signed ce rtificate, which co ntains the issuer's public key, into the tr usted root certification authority certificate store of the host comp uter. Intermediate or sub ordi nate certification auth[...]

  • Page 25

    Parameter Description S tatus Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the networking. Link S peed (Mbps) Display the transmission and reception rate of the network. The maximum transmissi on rate is 54Mbp[...]

  • Page 26

    3.4 Statistics This option enables you to view the statistic informat ion of the con nection including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure mo re advan ced settings, for example: wireless mode, protection mode and etc. 21[...]

  • Page 27

    Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to s et the adaptor to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adaptor can be comp atible with both 802.1 1g and 802.1 1b wireless st ations. If there are only [...]

  • Page 28

    Parameter Description Enable TCP Window Size The TCP Window is the amount of dat a a sender can send on a particular connectio n before it get s an acknowledgment back from the receiver that it has gotten some of it. When the Ro uter or AP the adaptor is connecting to have s et up the TCP Window , you can enable the paramete r to meet the data size[...]

  • Page 29

    3.6 About By choosing this option, you can click the hyperlin k to connect the website for the information of the wireless chipset vendor an d review b asic informat ion about the Utility such as the Drive r, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.7 Turbo Mode This adaptor supports spe cific[...]

  • Page 30

    4 Troubleshooting This chapter provides solutions to pro bl ems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly beco[...]

  • Page 31

    6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi red Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix method [...]

  • Page 32

    13. What is Spread S pectrum ? S pread S pectrum technology is a wideb and ra dio frequency technique develop ed by the milit ary for use in reliable, secu re, missi on-critical communication systems. It is desig ned to trade off bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in[...]