MicroNet Technology SP907NL manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of MicroNet Technology SP907NL, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of MicroNet Technology SP907NL one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of MicroNet Technology SP907NL. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of MicroNet Technology SP907NL should contain:
- informations concerning technical data of MicroNet Technology SP907NL
- name of the manufacturer and a year of construction of the MicroNet Technology SP907NL item
- rules of operation, control and maintenance of the MicroNet Technology SP907NL item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of MicroNet Technology SP907NL alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of MicroNet Technology SP907NL, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the MicroNet Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of MicroNet Technology SP907NL.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the MicroNet Technology SP907NL item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    User ’ s Manual 1 1n W ireless LAN USB Adapter Model No.: SP907NL http://www.micronet.info[...]

  • Page 2

    Table of Contents Chapter 1 Introduction ................................................................................. 1 1.1 Package C ontents .......................................................................................... 1 1.2 Key Features .............................................................................................[...]

  • Page 3

    4.6 Statistic s ...................................................................................................... 40 4.7 About ........................................................................................................... 41 Chapter 5 Troubleshooting ....................................................................... 43 Chapte[...]

  • Page 4

    1 Chapter 1 Introduction Micronet SP907NL, 11N Wireless LAN USB Adapter, delivers next generation high speed at a more economical and affordable pr ice tag. It is easily implemented for medium-sized business to allow imm ediate access to high speed wireless experience. It is compliant with IEEE 802.11n and backward compatible with IEEE 802.11b/g. T[...]

  • Page 5

    2 y WPS configuration for easier c onnection between adapter and AP/router. Enable connection via pushing a butt on or entering an 8-digit code. y Support the commonly available interface USB 2.0 to allow convenient installation. 1.3 Safety Information In order to keep the safety of users, please read through the following safety instructions: y Th[...]

  • Page 6

    3 1.5 Specifications Standards IEEE802.11b/ 802.11g / 802.11n Interface USB 2.0/1.1 Frequency Band 2.4000 ~ 2.4835GHz Data Rate z 11b: 1/2/5.5/11Mbps z 11g: 6/9/12/24/36/48/54Mbps z 11n (20MHz): MCS0-7 (up to 72Mbps) z 11n (40MHz): MCS0-7 (up to 150Mbps) Output Power z 11n: 14dBm ± 1.5dBm z 11g: 14dBm ± 1.5dBm z 11b: 17dBm ± 1.5dBm Security z WE[...]

  • Page 7

    4 Chapter 2 Tour of Product 2.1 USB Adapter 1. USB Connector: insert this side of the device into an available USB slot. 2. Connector Cab: for protecting device when not in use. 3. WPS button: located on the bottom side of the device for activating WPS pairing mode. 4. Link/Activity LED: indicate device is in use or traffic activity is evident. 2.1[...]

  • Page 8

    5 Chapter 3 Configuration 3.1 Drivers Installation Step 1. Gently insert the USB adapter into an available USB slot. The following message will appear, please press <Cancel> . Step 2. Insert driver CD into the CD/DVD ROM drive of the computer, and execute ‘Setup.exe’ program in ‘Utility’ folder. Read through the License Agreement and [...]

  • Page 9

    6 Step 3. It is recommended to select ‘Install driver and Ralink WALN Utility’ for first-time installation. Otherwise select second option to update existing drivers. Step 4. The following windows will appear, pleas e press on ‘Install’ to start the process.[...]

  • Page 10

    7 Step 5. Click <Finish> to complete the driver installation process. 3.2 Operating Configuration Utility After installation is complete, wireless configuration utility will be shown as an icon at the lower-right corner of the windows desktop. Click on the icon using right mouse key and select <Launch Config Utilities>.[...]

  • Page 11

    8 Step 1. Configuration utility will scan for available wireless access points automatically. Please select an access point to connect, and click <Connect> . If the AP you wish to connect is not in the list, please press <Rescan> to renew the interface. Some function includes more information, and can not be fitted in setup area. In thi[...]

  • Page 12

    9 3.2.1 Scan for Other Wireless Devices There are two kinds of wireless connec tion mode: Infrastr ucture and Ad-Hoc. Infrastructure mode is used by wirel ess access points, which is able to establish wireless connection for you and other wireless/wired network clients. Ad-Hoc mode is also know as ‘point-to- point’ mode, and in this mode, wirel[...]

  • Page 13

    10 y If the wireless device uses encryption, the user must know its encryption key in order to connect. Please launch utility and it will scan for wireless access points near by: Parameter Description SSID The SSID of the wireless access point or wirele ss d e vice selected by user will be displa yed here. When the SSID of access point or wireless [...]

  • Page 14

    11 If users cannot see the access point, please click ‘Rescan’ button to scan for access point again, until t he one preferred is displayed on the interface. Users may have to click ‘Rescan’ for more than two times before the access point wish to connect appears. If user still cannot see the access point after clicking ‘Rescan’ for more[...]

  • Page 15

    12 Step 1. Click the wireless access point or network device to connect, it will be highlighted, then click on ‘Connect’. If the access point selected does not use encryption, it will connect to this device within one minute. If the access poi nt selected uses encryption, please proceed to step 3. Step 2. If the wireless access point does not h[...]

  • Page 16

    13 Step 4. Please ask the owner of the wirele ss access point for the security information, and input the correct key here and then click on ‘OK’. By checking ‘Show Password’ box, the encryption key inputted here will be display ed. Authentication type will be selected by t he access point automatically, pleas e do not change it. However, i[...]

  • Page 17

    14 3.2.3 Add Access Point to Profile If users connect to some specific wireless access point frequently, they can add their information to the profile. Just lik e the telephone direct ory, the profile saves all information of access points, and user can recall them anytime. User can add an access point in the ‘Network’ t ab to profile, or input[...]

  • Page 18

    15 Parameter Description Profile Name User can give this profile a name. Every profile need s a unique name. SSID Please input the SSID of this access point. If user selected a n access point from the list, and SSID is not hidden, it will be filled automatically. However, user can modify the SSID if necessary. Network Typ e Please select the networ[...]

  • Page 19

    16 Parameter Description Authentication Select the authentication type of the wireless access point or wireless device in this field. When use rs are ad ding a profile from an existing access point or wireless device, authentication type will be selected automatically. Encryption Select the encryption type of the wireless access poin t or wireless [...]

  • Page 20

    17 Parameter Description EAP Method Select ‘802.1x EAP method’ from dropdown menu. Please ask the administrator of the access point for the correc t EAP method. Tunnel Authentication Select 802.1x tunnel authentic ation type from dropdown menu. Please ask the administrator of the acce ss point for correct tunnel authentication met hod. Thi s pu[...]

  • Page 21

    18 3.2.4 Using Windows Zero Configuration Windows XP and Vista has a built-in wirel ess network configuration utility, called ‘Windows Zero Configuration’ (WZC). Users can also use WZC to configure the wireles s network parameter. Step 1. Right-click on configurati on utility icon and select <Use Zero Configuration as Conf iguration utility&[...]

  • Page 22

    19 Step 3. Click <Network Connections> . Step 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’. Step 5. All wireless access points within prox i[...]

  • Page 23

    20 to the access point. Otherwise, users c an press refresh butt on to rescan access points. Select the access point if it’s shown, then click <Connect> . Step 6. If the wireless access point uses encryption, users will have to input the correct WEP passphrase or WPA pre-shar ed key. Ensure both the AP and PC is set with the same WEP passph[...]

  • Page 24

    21 3.2.5 Profile Management If users need to connect to different wireless access points at different time, they can store the connection parameters (e ncryption, passphrase, security etc, etc.) as a profile for every access poin t. Click the ‘Profile’ menu and all profiles will be listed in ‘Profile Li st’. Users can select a pr ofile from[...]

  • Page 25

    22 Add a Profile If users want to create new profile, click ‘Profile’ menu, then press ‘Add’ button. The interface will prompt the user to input detailed information of access point. Edit a Profile[...]

  • Page 26

    23 If users have added a profile before, and th ey wish to change the content of the profile, they can use this function. Please select a profile from the list, and then click on ‘Edit’ button. The interface will provide contents of selected profile for editing. Click on ‘OK’ to save changes, or click ‘Cancel’ to discard changes. Delete[...]

  • Page 27

    24 Activate a Profile When users want to connect to a specific wireless device in the profile list, they can select it and click ‘Activate’ button to establish connection.[...]

  • Page 28

    25 When a profile is selected and cl ick on ‘Activate’ button, an icon will be displayed in front of the profile to show that the connection has failed. When the connection is successfully established, an icon will be displayed. 3.2.6 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users.[...]

  • Page 29

    26 Enable CCX Enable Cisco Compatible eXtensi o ns. CCX is a wireless feature developed by Cisco used to imp rove the wi reless performance with CCX compatible wirel ess devices. Check this box if the users need to conne ct to CCX -compatible wireless devices. When CCX is en able d, the following setup items will become available: ¾ Turn on CCKM: [...]

  • Page 30

    27 3.2.8 WMM Setting This wireless network card provides WM M (Wi-Fi Multimedia) function, which can improve the performance of certain network applications, like audio/video streaming, network telephony (VoIP), and others. When the users enable the WMM function of this network card, they ca n define the priority of different kinds of data to give [...]

  • Page 31

    28 3.2.9 WPS Configuration Wi-Fi Protected Setup (WPS) is the la test wireless network technology, which makes wireless network setup become very simple. The user doesn’t have to configure the wireless access point and setup data encryption when devices support WPS. This wireless network card is compatible with WPS. To use this function, the wire[...]

  • Page 32

    29 All access points with WPS function enabled will be displayed her e. Please make sure the access point users wish to connect is displayed. If not, please click ‘Rescan’ few more times. The user can also click ‘Information’ button to see the detailed information about selected access point. Step 3. Start PBC pairing procedure at access po[...]

  • Page 33

    30 Users can click ‘PBC’ button few more times to try again. When an access point is connected, users can click ‘Disconnect’ to disconnect your wireless network card from a connected access point. Users can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. WPS Setup – PIN The PIN c[...]

  • Page 34

    31 Parameter Description WPS associate IE Check this box to send the association reque st with WPS IE during WPS setup. WPS probe IE Check this box to send the WPS probe request with WPS IE during WPS setup. Auto When in PIN mode, wireless a c ce ss point to be connected will be selected automatically if this box is checked. 3.2.10 Radio On/Off Use[...]

  • Page 35

    32 3.2.11 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless network card.[...]

  • Page 36

    33 Chapter 4 Soft-AP Function Besides becoming a wireless client of other wireless access points, this wireless card can also act as a wireless service provider. Users can switch this wireless card’s operating mode to ‘AP’ to simulate the function of a real wireless access point by software and ev en sharing the internet connection. Please fo[...]

  • Page 37

    34 If the computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’. If your computer does not have another network card with In ternet connection, please click ‘Not enable ICS’. After clicking on ‘Enable ICS’ or ‘Not enable ICS’, the user will see the ba[...]

  • Page 38

    35 Parameter Description SSID Please input the SSID (the name used to identify this wireless access point) in this field. Up to 32 numeri cal characters can be accepted here excepting spa c e. Channel Please select the wireless cha nnel to use for the environment. The number of channels availabl e here will vary depending on the setting of ‘Count[...]

  • Page 39

    36 Country Region Code Please select the country code of the co untry or regio n. Available options are 0-7, wh ich will affect the available wireless chan nels: 0: FCC (US, Canada, and other countrie s uses FCC radio communication stand ards) 1: ETSI (Europe) 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISERAL (Channel 3 to 9) 7: ISERAL (Channel 5[...]

  • Page 40

    37 Parameter Description Authentication Type Please select a wireless authenticatio n type to use. Available options are ‘Open’, ‘Share d’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If users wa nt to disable wireless data encryption, please select ‘Ope n’. Encryption Ty pe Please select an encryption mode. The available [...]

  • Page 41

    38 WEP Key Please input the WEP encryption key in this field when ‘WEP’ is selected. There are 2 types of WEP key: Hex (number 0 to 9, and ASCII characters A to F) and ASCII (all alphanumerical characters plus symbol s). Please sel ect the type of WEP key first, and then input the WEP key according to the type of WEP key select ed. If users wan[...]

  • Page 42

    39 Parameter Description Access Policy Select the policy type of your access rule. ¾ Disable: Allow any wireless client with p rop er authentication settings to connect to this access poin t. ¾ Allow All: Only allow wire less client s with MAC address listed here to connect to this access point. ¾ Reject All: Reject wirele ss clients with MA C a[...]

  • Page 43

    40 Parameter Description MAC Address Displays the MAC address of this wireless client. AID The serial number of this wireless connection. Power Saving Mode Displays the capability of pow er-saving function of this wireless client. Status Displays additional information of this wireless Conn ection, like current wireless operating mod e and data tra[...]

  • Page 44

    41 4.7 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless access point.[...]

  • Page 45

    42[...]

  • Page 46

    43 Chapter 5 Troubleshooting If users encounter any problem when using th is wireless network card, consult this section for possible solutions. Before calli ng the dealer of purchase for help, please check this troubleshooting table, the solu tion towards the problem could be very simple. Scenario Solution I can’t find any wireless access point [...]

  • Page 47

    44 Chapter 6 Glossary 1. What is the I EEE 802.11g standard? 802.11g is the new IEEE standard for hi gh-speed wireless LAN communications that provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LA N technology for the home, office and public networks. 802.11g defines the use of the same OF[...]

  • Page 48

    45 z RTS/CTS Feature z Fragmentation z Power Management 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers with their own Wireless LAN Card connecting as an independent wire less LAN. Ad hoc wireless LAN is applicable at a departmental scale fo r a branch or SOHO operation. 5. What is Infrastructure? An integrated wireless[...]

  • Page 49

    46 9. What is AES? AES (Advanced Encryption Standard), a ch ip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, while making more efficient use of har dware and/or software than previous encryption standards. It is also included in IEEE 802.11i standar d. Compare with AES, TKIP is[...]

  • Page 50

    47 13. What is Spread Spectrum? Spread Spectrum technology is a wi deband radio frequency technique developed by the military for use in reliable, secu re, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more b andwidth is consumed than in the case of[...]

  • Page 51

    48 16. What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devic es using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability. 17. What is STBC? STBC stands for Space-Time Block Coding, which [...]