background image

 

17

 

by relaying evidence). On the contrary, the server evidence must 

be that the evidence chosen by user authorize the unit to issue.

 

 

 

Server name 

This field is made according to selecting (checkbox), its value can 

be the server name or the domain name of the server. 

 

z

 

The server name must be totally correct: If choose this 
to select, the server name which shows the server 
evidence must be self-same as "server name ".   

z

 

The server name only needs the last domain name to 
be the same: If choose this to select , show that the 
evidence which issues the server evidence authorizes 
the unit to be the network land or network land once 
input in "server name". 

 

 

 

3.3 Link 

Status 

From the “Link Status” option, you can view all the information of the network you are connecting to. 

 

 

 

Parameter Description 

Status 

Display the SSID and MAC ID of the network the card is 

connecting to. 

 

 

Current Channel 

Display the number of the radio channel and the frequency used 

for the networking. 

 

 

Current Tx Rate 

Display the transmission rate of the network. The maximum 

transmission rate is 54Mbps. 

 

 

Throughput (Kbits/sec) 

Display the speed of data transmitted and received. 

Summary of Contents for 500517

Page 1: ...8 80 02 2 1 11 1g g W Wi ir re el le es ss s L LA AN N P PC CI I C Ca ar rd d User Manual Version 1 0 March 2004 ...

Page 2: ...warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Furth...

Page 3: ...eparation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Ope...

Page 4: ...uipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be...

Page 5: ...ATION PROCEDURE 3 3 CONFIGURATION UTILITY 6 3 1 Site Survey 6 3 2 Profile 7 3 2 1 Configure the Profile 8 3 2 2 Enable WPA in Windows XP 11 3 2 3 802 1x Setting _ Evidence 11 3 2 4 802 1x Setting _ CA Server 11 3 3 Link Status 17 3 4 Statistics 18 3 5 Advance 18 3 6 About 20 4 TROUBLESHOOTING 21 ...

Page 6: ...rity in the wireless network The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowing user customizes the way of saving the power from his her portable or handheld devices This card is cost effective together with the versatile features it is the best solution for you to build your wireless network 1 1 Features Works with both ...

Page 7: ...nsitivity 54Mbps OFDM 10 PER 70dBm 11Mbps CCK 8 PER 86dBm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 127 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items One PCI Card One CD Driver Utility User s Manual One Quick Guide ...

Page 8: ...n was operated under Windows XP Procedures are similar for Windows 98SE Me 2000 Note3 If you have installed the Wireless PC Card driver utility before please uninstall the old version first A Insert the Installation CD to your CD ROM Drive Execute the setup program B Click Yes to continue C The system starts to install the software of the card Follow the instruction of the program to plug in the P...

Page 9: ...utomatically detect the card and display Hardware Installation screen Click Continue Anyway to continue E Click Finish to complete the installation F The RaConfig utility is displayed and you can start to configure the card ...

Page 10: ...5 ...

Page 11: ...the configuration utility z Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool z Exit Select Exit to close the Configuration Utility tool 3 1 Site Survey When you open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your card and automatically connect to the wireless devic...

Page 12: ...button to collect the information of all the wireless networks nearby Connect Button Click Connect to connect to the selected network Add to Profile Button Add the selected network to Profiles list 3 2 Profile The Profiles List is for you to manage the networks you connect to frequently You are able to Add Delete Edit Activate a profile Parameter Description Profiles List The profiles list display...

Page 13: ...to the card If you want to add one of the networks nearby to the profile list pull down the menu all the networks nearby will be listed and you can add one of them to the profile list Power Saving Mode The power saving function is only available when the network type is in Infrastructure CAM Constantly Awake Mode The card will always set in active mode Power Saving Mode Enable the card in the powe...

Page 14: ...ill auto switch the preamble mode depending on the wireless stations which the card is connecting to RTS Threshold Minimum packet size required for an RTS Request To Send For packets smaller than this threshold an RTS is not sent and the packet is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value...

Page 15: ... as in each wireless stations in the network WPA takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized devices The encryption methods are including TKIP and AES Note that this option is only available for Windows XP 802 1x Authentication 802 1x Setting It allows to ge...

Page 16: ...numbers This same key must be used on all of the wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default encryption key from Key 1 to Key 4 by selected the radio button Fill the text box by following the rules below 64 bit Input 10 digit Hex values in the A F...

Page 17: ...ly this mode will be used in a home environment To enable the WPA function in Windows XP the following software systems are required 1 Windows XP Service Pack 1 with Windows XP Support Patch for Wi Fi Protected Access program in addition 2 Configure the card by Wireless built in utility Wireless Zero Configuration z Note In that kind of system there are two utility selections when you open the con...

Page 18: ...ed all clients and access points on the network must be WPA enabled in order to access the network WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each PC on the wireless network WPA takes...

Page 19: ...h greater security than the standard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communication 3 2 3 802 1x Setting _ Evidence It will s...

Page 20: ...e suitable evidence to regard as Client evidence from it Tunneled Authentication Use authentication way for two stage PEAP and TTLS when user enable each authentication method Two stage authentication is divided into two steps the first step is to set up Tunnel utilized its evidence to set up one exit passageway by Server end Station need not establish any and select the second step is legitimacy ...

Page 21: ...same network Parameter Description Use Certification chain It shows that in the passing of authentication Client will go to confirm whether CA server is a dependable server to collude and select this to select Certification issuer Refer to CA of the server evidence Server Certificate can select to choose the suitable evidence to authorize the unit in the form from making the drawing type Allow int...

Page 22: ...be the same If choose this to select show that the evidence which issues the server evidence authorizes the unit to be the network land or network land once input in server name 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to Current Ch...

Page 23: ...adio signal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation 3 4 Statistics This option enables you to view the available statistic information with its Tx counts Tx success Tx error RTS Success and RTS Failed and its Rx counts Rx success Rx error You may reset the counters by clicking Reset Counter 3 5 Advance This opt...

Page 24: ... the data rate up to 54Mbps 11g select Adhoc wireless mode B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the card will be a little lower due to many ...

Page 25: ... Cisco s AP in environment and not as performance that link of now in lower than 70dbm at it will switch over it to another one AP automatically Select your country region code It allows to change the domain from CCS tool you can enable this feature from Program RaLink RT2500 CCS CCX 2 0 When you enable this feature and it allows to perform the relating functions with Cisco wireless device 3 6 Abo...

Page 26: ...cludes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireles...

Page 27: ... with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to en...

Page 28: ...n other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives...

Reviews: