background image

 

FCC STATEMENT 

 

This equipment has been tested and found to comply with the limits for a class B digital device, 

pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection 

against harmful interference in a residential installation. 

This equipment generates, uses and can radiate radio frequency energy and, if not installed and 

used in accordance with the instructions, may cause harmful interference to radio 

communications. However, there is no guarantee that interference will not occur in a particular 

installation. If this equipment does cause harmful interference to radio or television reception, 

which can be determined by turning the equipment off and on, the user is encouraged to try to 

correct the interference by one or more of the following measures: 

¾

  Reorient or relocate the receiving antenna. 

¾

  Increase the separation between the equipment and receiver. 

¾

  Connect the equipment into an outlet on a circuit different from that to which the receiver is 

connected. 

¾

  Consult the dealer or an experienced radio/TV technician for help. 

This device complies with Part 15 of the FCC Rules. Operation is subject to the following two 

conditions: 
(1) This device may not cause harmful interference. 
(2) This device must accept any interference received, including interference that may cause 

undesired operation. 

Changes or modifications to this unit not expressly approved by the party responsible for 

compliance could void the user's authority to operate the equipment. 

FCC RF Radiation Exposure Statement: 

This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled 

environment. This device and its antenna must not be co-located or operating in conjunction with 

any other antenna or transmitter.   

“To comply with FCC RF exposure compliance requirements, the antenna used for this 
transmitter must be installed to provide a separation distance of at least 20 cm from all persons 
and must not be co-located or operating in conjunction with any other antenna or transmitter”. 

CE Mark Warning 

 

This is a class B product. In a domestic environment, this product may cause radio interference, in 

which case the user may be required to take adequate measures. 

Summary of Contents for TL-WN353G

Page 1: ...TL WN353G 54M Wireless PCI Adapter Rev 1 0 1 1910010045...

Page 2: ...are trademarks or registered trademarks of their respective holders No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation tran...

Page 3: ...ed Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause...

Page 4: ...has been ongoing in recent years to allow current relaxed regulation Full implementation planned 2012 Italy If used outside of own premises general authorization is required Luxembourg None General au...

Page 5: ...llation for Windows Vista 5 Chapter 3 Configuration 9 3 1 Set Wizard 9 3 2 General Status 11 3 3 Profile Management 12 3 3 1 Add or Edit a Configuration Profile 13 3 3 2 Remove a configuration profile...

Page 6: ...LINK Wireless Utility and Drivers User Guide Other Helpful Information Note If any of the listed contents are damaged or missing please contact the retailer from whom you purchased the TL WN353G 54M W...

Page 7: ...EP and WPA encryption for high security 1 2 Features Complies with IEEE802 11g IEEE802 11b standards Supports WPA WPA2 data security IEEE802 1x authentication TKIP AES encryption 64 128 152 bit WEP en...

Page 8: ...esktop PC 2 2 Software Installation 2 2 1 Overview The Adapter s Setup Wizard will guide you through the Installation procedure for Windows XP and Vista The Setup Wizard will install the TP LINK Wirel...

Page 9: ...Adapter User Guide 3 Figure 2 1 Step 2 Click Next in the screen below shown in Figure 2 2 to continue you can click Cancel to end the installation Figure 2 2 Step 3 After that the next screen displays...

Page 10: ...the next screen the files will be copied as the next screen shown shown in Figure 2 4 To end the Installation click Cancel Figure 2 4 Note During the installation the system will warn about Windows Lo...

Page 11: ...dows Vista 1 Insert the Resource CD into your CD ROM drive and open the folder with the same name as your product Then double click Setup exe in the proper folder according to your operating system to...

Page 12: ...ure 2 7 2 Click Next in the screen below shown in Figure 2 12 to continue you can click Cancel to end the installation Figure 2 8 3 After that the files will be copied as the next screen shown shown i...

Page 13: ...User Guide 7 Figure 2 9 Note During the installation the system will warn about Windows Security testing please click Install this driver software anyway to continue the installation Figure 2 10 4 Cl...

Page 14: ...TL WN353G 54M Wireless PCI Adapter User Guide 8 Figure 2 11...

Page 15: ...llow there is poor signal strength and the RSSI is between 5dB and 10dB If the icon is green there is good signal strength and the RSSI is between 10dB and 20dB If the icon is green there is excellent...

Page 16: ...lick Refresh button to update the wireless network show in Figure 3 2 Then select the wireless network and click Next Figure 3 2 Step 3 After that select the network authentication and data encryption...

Page 17: ...rompts Unsecured network click OK to continue 3 2 General Status Choose the tab General as shown in Figure 3 4 the left filed displays the type of the adapter the right field displays the status about...

Page 18: ...ss from the AP Show Tray Icon Select the option to display the icon on the bottom of the desktop Otherwise you can see the two icons Disable Adapter If you select the option the adapter can t work Rad...

Page 19: ...5 3 3 1 Add or Edit a Configuration Profile Click the button Add or Edit you should select an existed profile first to edit it on the screen above and you can configure the profile as shown in Figure...

Page 20: ...n t select the option the system will search the available channel to connect Wireless network security This configure the security for the adapter Note You should configure the security for the adapt...

Page 21: ...a encryption as WPA 802 1X WPA2 802 1X or WEP 802 1X EAP TYPE Select the EAP type for the 802 1x configuration the options are GTC TLS LEAP TTLS PEAP Tunnel Select the tunnel MD5 GTC TLS and MSCHAP V2...

Page 22: ...the Key index 1 and click the OK to save the configuration 2 Shared Key authentication When you select the Shared Key as the authentication the only available data encryption is WEP Note The configur...

Page 23: ...elect the WPA2 PSK as the authentication the available data encryptions are TKIP and AES Please select the one according your need Note The configuration for WPA2 PSK and WPA PSK are similar you can r...

Page 24: ...he configuration for WPA2 802 1x and WPA 802 1x are similar you can refer to WPA 802 1x authentication to configure it 7 WEP 802 1x When you select the WEP 802 1x as the authentication the only availa...

Page 25: ...e and then enter the new name for the configuration profile 3 3 4 Set default configuration profile Follow the steps below to select a configuration profile as default Once the adapter wants to connec...

Page 26: ...t at any time Step 2 Highlight a network name and click Add to Profile to connect to an available network Fill in the Profile name and click OK to create the new configuration profile for that network...

Page 27: ...ects max mode to let the access point buffer incoming messages for the Wireless PCI Adapter The Adapter will detect the access point if any messages are waiting periodically Wireless Mode Select the w...

Page 28: ...54M Wireless PCI Adapter User Guide 22 Figure 3 13 3 7 Statistics Click the tab Statistics as shown in Figure 3 12 to view the traffic statistics about the connection Click the Reset to refresh the in...

Page 29: ...WN353G 54M Wireless PCI Adapter User Guide 23 Figure 3 14 3 8 Wi Fi Protect Setup Click the tab Wi Fi Protect Setup as shown in Figure 3 15 select different way to configure the adapter for Wi Fi netw...

Page 30: ...and the AP the adapter wants to connect must support the Wi Fi function first Or else the adapter can t connect the AP 3 8 1 PIN Step 1 Select the PIN shown in Figure 3 15 Step 2 Click the Refresh bu...

Page 31: ...PIN Code displays on the screen shown in Figure 3 17 Now you should enter the pin code into your AP Figure 3 17 Step 4 Finally the adapter will create the profile and connect to the AP automatically...

Page 32: ...ser Guide 26 Figure 3 18 3 8 2 Question Answer Method Step 1 Click PBC as shown in Figure 3 15 Figure 3 19 Step 2 Push the physical button on the AP Step 3 Finally the adapter will create the profile...

Page 33: ...5 5 2 1Mbps Auto Rate Sensing Modulation 1M DBPSK 2M DQPSK 5 5M 11M CCK 6M 9M 12M 18M 24M 36M 48M 54M OFDM Media Access Protocol CSMA CA with ACK Transmit Power 15dBm Typical Data Security WPA WPA2 64...

Page 34: ...TL WN353G 54M Wireless PCI Adapter User Guide 28...

Page 35: ...nt the DSSS signal is recognized as the only valid signal and interference is inherently rejected ignored FHSS Frequency Hopping Spread Spectrum FHSS continuously changes hops the carrier frequency of...

Page 36: ...ESSID WEP Wired Equivalent Privacy A data privacy mechanism based on a 64 bit or 128 bit or 152 bit shared key algorithm as described in the IEEE 802 11 standard Wi Fi A trade name for the 802 11b wir...

Reviews: