background image

 

29

Sequence Spread Spectrum technology, it has the inherent security feature of 

scrambling. On the software side, WLAN offers the encryption function (WEP) to 

enhance security and access control. 

 

6. What is WEP? 

WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 

128-bit shared key algorithm, as described in the IEEE 802.11 standard.   

 

7. What is infrastructure mode? 

When a wireless network is set to infrastructure mode, the wireless network is 

configured to communicate with a wired network through a wireless access point. 

 

8. What is roaming? 

Roaming is the ability of a portable computer user to communicate continuously 

while moving freely throughout an area greater than that covered by a single access 

point. Before using the roaming function, the workstation must make sure that it is the 

same channel number with the access point of dedicated coverage area. 

 

To achieve true seamless connectivity, the wireless LAN must incorporate a number 

of different functions. Each node and access point, for example, must always 

acknowledge receipt of each message. Each node must maintain contact with the 

wireless network even when not actually transmitting data. Achieving these functions 

simultaneously requires a dynamic RF networking technology that links access points 

and nodes. In such a system, the user’s end node undertakes a search for the best 

possible access to the system. First, it evaluates such factors as signal strength and 

quality, as well as the message load currently being carried by each access point and 

the distance of each access point to the wired backbone. Based on that information, 

the node next selects the right access point and registers its address. Communications 

between end node and host computer can then be transmitted up and down the 

backbone. As the user moves on, the end node’s RF transmitter regularly checks the 

system to determine whether it is in touch with the original access point or whether it 

should seek a new one. When a node no longer receives acknowledgment from its 

original access point, it undertakes a new search. Upon finding a new access point, it 

then re-registers, and the communication process continues.

 

 

 

Summary of Contents for DCMA-81J

Page 1: ...WNC WLAN 802 11ABG MINIPCI User Manual DCMA 81J Version 1 0 Nov 2005 ...

Page 2: ...a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Windows 98SE 2000 ME XP are trademarks of Microsoft Corp Pentium is trademark of Intel All copyright reserved ...

Page 3: ...t the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Ope...

Page 4: ...delines for an uncontrolled environment can be satisfied The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end product is smaller than 8x10cm then additional FCC part 15 19 statement is required to be available in the users manual This device complies with Pa...

Page 5: ...NAL SETUP PROCESSES 9 2 3 UNINSTALLATION 10 3 CONNECTING TO AN EXISTING NETWORK 11 4 CREATING AN AD HOC NEW NETWORK 16 5 MODIFYING A WIRELESS NETWORK 19 5 1 INFRASTRUCTURE MODE AND AD HOC MODE 19 5 2 MODIFYING A WIRELESS NETWORK 20 5 3 DEFAULT SETTINGS WINDOWS XP ZERO CONFIGURATION 27 5 4 SUPER A G SETTING 27 APPENDIX A FAQ ABOUT WLAN 28 SPECIFICATIONS 30 ...

Page 6: ...p this manual for future reference 1 1 System Requirements A laptop PC contains 32 MB memory or greater 300 MHz processor or higher Microsoft Win 2000 ME 98 Second Edition XP 1 2 Features Mini PCI adapter half size design IEEE 802 11a b g compatible allowing inter operation among multiple vendors Support Atheros Super A GTM Mode Provide seamless roaming within the IEEE 802 11 a b g WLAN infrastruc...

Page 7: ... installation for Windows To re install the driver please first uninstall the previously installed driver See Chapter 2 3 Uninstallation in this User Manual Follow the steps below to complete the driver utility installation 1 Insert the Installation Software CD into the CD Rom Drive 2 Click Next 3 Read the License Agreement and click Yes ...

Page 8: ...7 4 Click Next to continue or click Browse to choose a destination folder 5 Click Next 6 Click Yes to create a shortcut icon on your desktop ...

Page 9: ...8 7 Click Finish 8 You should now see a shortcut icon on your desktop ...

Page 10: ...ill request the original Windows CD during the installation process When the installation is finished you ll have to restart your computer 2 Windows Me Please restart your computer when the installation is finished 3 Windows 2000 XP Select Install the software automatically when the window with this option appears and then click Next to continue installation ...

Page 11: ... uninstallation please close all running programs 1 Click Start Programs WLAN a b g mini PCI Module UnInstall WLAN a b g mini PCI Module 2 Choose Remove Click Next 3 Click OK to start Uninstall 4 Click Finish Uninstall is now completed ...

Page 12: ...onnecting to an Existing Network 1 Double click the shortcut icon of WLAN a b g mini PCI Module on the desktop and the Configuration window appears 2 Click on the Refresh button to list all available networks ...

Page 13: ... 3 From the list of Available Networks choose one network by double clicking the Network Name One of the following dialog boxes appears Click Yes to continue 4 If the chosen network has security enabled the Security tab displays Select the security option used by the network Contact the network administrator for the correct settings ...

Page 14: ...13 5 If selecting WPA or 802 1X select the EAP type then click on the Configure button to select the certificate 6 If selecting WPA PSK click on the Configure button to enter the PassPhrase ...

Page 15: ... User must enter 5 characters ex ab3 c 13 chars User must enter 13 characters ex ab3 kf08 kdk d 16 chars User must enter 16 characters ex ab3 kf08 kdk456 For WEP key please contact with MIS administrator 8 Click on OK or Apply if using the other tabs when done to save the settings 9 Once connected the icon or in front of the name of the Connected Network you can check the signal strength from the ...

Page 16: ...click the shortcut icon to open the Utility 2 From the Windows System Tray you should see the signal icon Right click it and select Disable Zero Configuration Option 2 1 Go to Control Panel and double click Network Connections 2 Right click Wireless Network Connection of WLAN a b g mini PCI Module and select Properties 3 Select Wireless Networks tab and uncheck the check box of Use Windows to conf...

Page 17: ...16 4 Creating an Ad Hoc New Network 1 In the Configuration window click New 2 Select the Profile Editor tab ...

Page 18: ...have different regulations that affect which channels can be used You should always choose the country where you are physically located to avoid using an illegal channel 6 Click OK or Apply if using the other tabs to save the settings For details of each setting refer to Modifying a Wireless Network on page 20 7 Click the Security tab If not using security select None 8 If security is used select ...

Page 19: ...ttings The new Network Name is listed in the Profile List The driver does not allow channel selection in Ad Hoc mode Instead the driver starts with an initial channel then checks channel status If the channel is busy the driver automatically uses a different channel For details of each setting please see chapter 5 ...

Page 20: ...other by first going through an Access Point AP Wireless devices can communicate with each other or can communicate with a wired network When one AP is connected to wired network and a set of wireless stations it is referred to as a BSS Basic Service Set Ad Hoc Mode Ad hoc mode is also called peer to peer mode or Independent Basic Service Set IBSS In ad hoc mode devices communicate directly with e...

Page 21: ...licking the shortcut icon on the desktop Note If there s no network name listed in the Profile List click Refresh button and double click a Network Name from Available Networks The chosen Network Name is listed in the Profile List 2 From the Profile List select one Profile and click Modify button ...

Page 22: ...ith the best signal strength Network Connection Specifies the mode of the network Two options are Infrastructure and Ad Hoc Power Saving Minimizes power consumption while maintaining network connectivity and high data transfer performance In Ad Hoc mode Power Savings function cannot be enabled The power management options are Off PC Card is powered up at all times Normal PC Card sleeps less often ...

Page 23: ...ects the response frames from the responding In Passive Scan the driver scan each requested channel listening the beacons on each channel Transmit Power This setting allows you to change the output power of the PC Card to increase or decrease the coverage area QoS Disables or enables the PC Card to cooperate in a network using QoS Quality of Service Country Select the country where this PC Card wi...

Page 24: ... Click on the Configure button and complete the configuration information in the Define Certificate dialog WPA PSK Enables the WPA Pre Shared Key PSK Click on the Configure button and complete the configuration information in the WPA Passphrase dialog 802 1x Enables 802 1x security This option requires IT administration a Select 802 1x to open the 802 1x EAP drop down menu The options include TLS ...

Page 25: ... menu Use any Certificate Authority The Default Setting Select this radio button to use any Certificate Authority CA for authentication Choose a Certificate Authority Select this radio button to choose the desired Certificate Authority for authentication from the drop down menu Server Domain Name The the RADIUS server name or the domain name used for the network access Login Name The username used...

Page 26: ...exadecimal 0 9 A F or ASCII text all keyboard characters Default Encryption Key Allows you to choose one encryption key First Second Third or Fourth as the transmit key which encrypts transmissions from the PC Card Unique Key Defines the per session encryption key for the current network configuration Not used in Ad Hoc mode Shared Keys Use these fields to enter the wireless network s encryption k...

Page 27: ...n the key does not update to the previous value 8 Click OK to save the settings 9 Select TCP IP Property tab Enter the settings and click OK to save the settings If the network uses DHCP server choose Obtain an IP address automatically If the network does not use DHCP server choose Use the following IP address to set the relative settings For the IP configuration information please contact the net...

Page 28: ...ies 4 Select Wireless Networks tab and select Use Windows to configure my wireless network settings check box Note Clear the check box of Use Windows to configure my wireless network settings will disable automatic wireless network configuration 5 4 Super A G Setting The Super A G features do not require station configuration as the command are handled during auto negotiation 1 User can double cli...

Page 29: ... is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS 4 What is DSSS What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and ...

Page 30: ...s Each node and access point for example must always acknowledge receipt of each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the...

Page 31: ...35GHz 5 47 5 725GHz 3 Japan 12 non overlapping channels 5 15 5 35GHz Power consumption A Mode FTP Tx 340mA typical 470mA max FTP Rx 280mA typical 320mA max Stand by 270mA typical 290mA max G Mode FTP Tx 330mA typical 430mA max FTP Rx 300mA typical 340mA max Stand by 285mA typical 310mA max B Mode FTP Tx 360mA typical 400mA max FTP Rx 295mA typical 325mA max Stand by 260mA typical 280mA max Maximum...

Page 32: ... 802 11b g 11b 11 5 5 2 1 Mbps auto fallback 11g 54 48 36 24 18 12 9 6Mbps auto fallback 802 11g Super mode up to 108 Mbps 802 11a Normal mode 54 48 36 24 18 12 9 6Mbps auto fallback 802 11a Super mode 108 96 72 54 48 36 24 18 12 Mbps auto fallback Operation temperature 0o C 55o C Storage temperature 20o C 80o C Wi Fi Alliance WECA Compliant WHQL Microsoft 2K XP Complaint FAA S W radio On Off supp...

Reviews: