all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
user manual | Users Manual | 4.44 MiB | February 10 2012 | |||
1 | Cover Letter(s) | February 10 2012 | ||||||
1 | ID Label/Location Info | February 10 2012 | ||||||
1 | Cover Letter(s) | February 10 2012 | ||||||
1 | RF Exposure Info | February 10 2012 | ||||||
1 | Test Report | February 10 2012 | ||||||
1 | Cover Letter(s) | February 10 2012 | ||||||
1 | Cover Letter(s) | February 10 2012 | ||||||
1 | Cover Letter(s) | February 10 2012 | ||||||
1 | External Photos | February 10 2012 | ||||||
1 | Internal Photos | February 10 2012 | ||||||
1 | Test Setup Photos | February 10 2012 |
1 | user manual | Users Manual | 4.44 MiB | February 10 2012 |
802.11n/b/g WLAN Module WM5206 Users Manual FCC Certification Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Warning: Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. CAUTION This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible. This device and its antenna(s) must not be co-located or operation in conjunction with any other antenna or transmitter. IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator &
your body. IMPORTANT NOTE:
This module is intended for OEM integrator. The OEM integrator is still responsible for the FCC compliance requirement of the end product, which integrates this module. 20cm minimum distance has to be able to be maintained between the antenna and the users for the host this module is integrated into. Under such configuration, the FCC radiation exposure limits set forth for an population/uncontrolled environment can be satisfied. Any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. USERS MANUAL OF THE END PRODUCT:
In the users manual of the end product, the end user has to be informed to keep at least 20cm separation with the antenna while this end product is installed and operated. The end user has to be informed that the FCC radio-frequency exposure guidelines for an uncontrolled environment can be satisfied. The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. If the size of the end product is smaller than 8x10cm, then additional FCC part 15.19 statement is required to be available in the users manual: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation. LABEL OF THE END PRODUCT:
The final end product must be labeled in a visible area with the following " Contains TX FCC ID: MQ4WM5206 ". If the size of the end product is larger than 8x10cm, then the following FCC part 15.19 statement has to also be available on the label: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation. IC Certification This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe B conforme la norme NMB-003 du Canada. This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible. Pour les produits disponibles aux tats-Unis / Canada du march, seul le canal 1 11 peuvent tre exploits. Slection d'autres canaux n'est pas possible. This device and its antenna(s) must not be co-located or operation in conjunction with any other antenna or transmitter. Cet appareil et son antenne (s) ne doit pas tre co-localiss ou fonctionnement en association avec une autre antenne ou transmetteur. IMPORTANT NOTE:
IC Radiation Exposure Statement:
This equipment complies with IC RSS-102 radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Declaracin de exposicin a la radiacin de Canada:
Este equipo cumple con los lmites de exposicin a la radiacin de la IC establecidos para un ambiente no controlado. Este equipo se debe instalar y operar con una distancia mnima de 20 cm entre el radiador y su cuerpo. This module is intended for OEM integrator. The OEM integrator is still responsible for the IC compliance requirement of the end product, which integrates this module. 20cm minimum distance has to be able to be maintained between the antenna and the users for the host this module is integrated into. Under such configuration, the IC RSS-102 radiation exposure limits set forth for an population/uncontrolled environment can be satisfied. Any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. USERS MANUAL OF THE END PRODUCT:
In the users manual of the end product, the end user has to be informed to keep at least 20cm separation with the antenna while this end product is installed and operated. The end user has to be informed that the IC radio-frequency exposure guidelines for an uncontrolled environment can be satisfied. The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. IC statement is required to be available in the users manual: This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation. LABEL OF THE END PRODUCT:
The final end product must be labeled in a visible area with the following " Contains TX IC :
2826B-WM5206 ". Table of Contents CHAPTER 1: INTRODUCTION ..........................................................1 FEATURES ................................................................................................1 PHYSICAL DETAILS.....................................................................................1 CHAPTER 2: INSTALLATION.............................................................1 FOR WINDOWS 2000/XP...........................................................................1 Install Software.................................................................................................................1 Install Hardware................................................................................................................4 Verification.........................................................................................................................4 FOR WINDOWS VISTA ................................................................................5 Install Software.................................................................................................................5 Install Hardware................................................................................................................7 Verification.........................................................................................................................7 FOR WINDOWS 7 ......................................................................................8 Install Software.................................................................................................................8 Install Hardware..............................................................................................................10 Verification.......................................................................................................................10 CHAPTER 3: NETWORK CONNECTION .......................................11 HOW TO MAKE A CONNECTION ..................................................................11 HOW TO ADD A PROFILE...........................................................................13 CHAPTER 4: UTILITY CONFIGURATION....................................14 FOR WINDOWS 2000/XP.........................................................................14 Station Mode ...................................................................................................................14 Switch to AP Mode..........................................................................................................23 Soft AP mode...................................................................................................................24 FOR WINDOWS VISTA ..............................................................................29 Station Mode ...................................................................................................................29 Switch to AP Mode..........................................................................................................38 Soft AP mode...................................................................................................................39 FOR WINDOWS 7 ....................................................................................44 Station Mode ...................................................................................................................44 Switch to AP Mode..........................................................................................................53 Soft AP mode...................................................................................................................54 CHAPTER 5: UNINSTALL..................................................................59 FOR WINDOWS 2000/XP.........................................................................59 FOR WINDOWS VISTA ..............................................................................61 FOR WINDOWS 7 ....................................................................................63 Chapter 1:
Introduction WM5206 measures just around 15 mm long and 15mm wide that make it hold the distinction of being the smallest USB dongle in the world at present. WM5206 give mobile workers the freedom of staying connected to the network while roaming around a building or multiple buildings maintaining access to the Internet, e-mail, networked applications with the best convenience in narrow or crowded space for its ultra micro size.WM5206 is expected to be able to reach 150Mbps, which is relatively lower than normal, but still far more than sufficient to receive media streaming to the from access point. Features 1T1R Mode with 150Mbps PHY Rate Complies with IEEE 802.11n and IEEE 802.11 b/g standards Supports WEP 64/128, WPA, WPA2 Supports USB 2.0 interface Chapter 2: Installation For Windows 2000/XP Install Software Note:
Do not insert the WLAN Module into the computer until the InstallShield Wizard finished installing.
- 1 -
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM will run automatically. Please click Next to process the installation. 2. When prompt to the following message, please click Install to begin the installation.
- 2 -
3. When the following screen appears, click Finish to restart the computer to complete the software installation.
- 3 -
Install Hardware Note:
Insert the WLAN Module when finished software installation. Insert the WLAN Module into the USB Port of the computer. The system will automatically detect the new hardware. Verification To verify the device is active in the computer. Go to Start > Control Panel > System > Hardware>
Device Manager. Expand the Network adapters category. If the 802.11n/b/g 2cm Wireless LAN USB2.0 Adapter is listed here, it means that the device is properly installed and enabled.
- 4 -
For Windows Vista Install Software Note:
Do not insert the WLAN Module into the computer until the InstallShield Wizard finished installing. 1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM will run automatically. Please click Next to process the installation.
- 5 -
2. When prompt to the following message, please click Install to begin the installation. 3. When the following screen appears, click Finish to restart the computer to complete the software installation.
- 6 -
Install Hardware Note:
Insert the WLAN Module when finished software installation. Insert the WLAN Module into the USB Port of the computer. The system will automatically detect the new hardware. Verification To verify the device is active in the computer. Go to Start >Control Panel > Hardware and Sound > Device Manager. Expand the Network adapters category. If the 802.11n/b/g 2cm Wireless LAN USB2.0 Adapter is listed here, it means that the device is properly installed and enabled.
- 7 -
For Windows 7 Install Software Note:
Do not insert the WLAN Module into the computer until the InstallShield Wizard finished installing. 1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM will run automatically. Please click Next to process the installation.
- 8 -
2. When prompt to the following message, please click Install to begin the installation 3. When the following screen appears, click Finish to restart the computer to complete the software installation.
- 9 -
Install Hardware Note:
Insert the WLAN Module when finished software installation. Insert the WLAN Module into the USB Port of the computer. The system will automatically detect the new hardware. Verification To verify the device is active in the computer. Go to Start > Control Panel > Device Manager. Expand the Network adapters category. If the 802.11n/b/g 2cm Wireless LAN USB2.0 Adapter is listed here, it means that the device is properly installed and enabled.
- 10 -
Chapter 3:
Network Connection How to Make a Connection To make a connection with an access point, please follow below steps. Here takes Windows XP OS for example. Step 1: After set up the WLAN Module successfully, please launch the Configuration Utility. There are two ways to launch the utility by:
(1) Double clicking the Intelligent Wireless LAN Utility icon on the desktop.
(2) Or go to Start All Programs Intelligent Wireless Utility Intelligent Wireless LAN Utility.
- 11 -
Step 2: Please go to the Available Network tab, the system will automatically scan access points nearby, or click Refresh button to site survey again. Step 3: Then, double click preferred access point or click Add to Profile button to make a connection (if the access point has been set up security, please enter passwords and then click OK.)
- 12 -
How to Add a Profile After launched Wireless LAN Utility and selected preferred access point, please click Add to Profile button to enter Wireless Network Properties windows. If the access point has been set up security, please enter passwords, and then click OK to save profile settings. After finished above settings, please go to Profile tab to check the profile list (Available Profile(s)).
- 13 -
Chapter 4:
Utility Configuration For Windows 2000/XP Station Mode Show Tray Icon: Check to show the wireless adapter icon at the tray. Disable Adapter: Check this to disable the wireless adapter. Radio off: Check this to turn OFF radio function. Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 14 -
General The General page displays the detail information of current connection. General Tab Status Speed Type Encryption SSID Signal Strength Link Quality MAC Address IP Address Subnet Mask Gateway Renew IP Shows the current connected status. If there is no connection, it will show Not Associated. If been connected, the system will show Associated. When connecting, the system will show checking Status. Shows the current transmitting rate and receiving rate. Network type in use, Infrastructure or Ad-Hoc. Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use. Shows the connected access point network name. Shows the receiving signal strength. Shows the connection quality based on signal strength. The physical address of the WLAN Module. Shows the IP address information. Shows the Subnet Mask information. Shows the default gateway IP address. Click the Renew IP button to obtain IP address form the connected gateway.
- 15 -
Profile Profile can let users book keeping the favorite wireless setting among home, office, and other public hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles. Profile Tab Profile Name SSID Add Here shows a distinctive name of profile in this column. The SSID is the unique name shared among all wireless access points in the wireless network. Click Add button to add a profile from the drop-down screen.
- 16 -
Profile Name: Users can enter profile name at will. Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless network. The name must be identical for all devices and wireless access points attempting to connect to the same network. This is a computer-to-computer (ad hoc) network; wireless access points are not used: This function is selected to enable the ad hoc network type that computers should be setup at the same channel to communicate to each other directly without access point, users can share files and printers between each PC and laptop. User can select channels form the pull-down menu. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK, WPA2-PSK, WPA 802.1X, WPA2 802.1X and WEP 802.1X. Data encryption: For Open System, Shared Key and WEP 802.1X authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index. When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm.
- 17 -
When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP 802.1X When users use radius server to authenticate client certificate for WPA authentication mode (WPA authentication do not support EAP Method-
MD5-Challenge). EAP TYPE:
TLS: Transport Layer Security. Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication. TTLS: Tunnelled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. MD5: Message Digest Challenge. Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network. Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2. Username: Enter the username for server. Identity: Enter the identity for server. Domain: Enter the domain of the network. Password: Enter the password for server. Certificate: Choose server that issuer of certificates. Click Remove button to delete selected profile. Click Edit button to edit selected profile. Click Duplicate button to copy selected profile. Click Set Default button to set selected profile to be connected first. Remove Edit Duplicate Set Default
- 18 -
Available Network This page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID, Supported Rate (s), and Mode. Network Tab SSID Channel Encryption Network Authentication Signal Type BSSID Shows the network name of the access points. Shows the currently channel in use. Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, None and TKIP/AES. Show the device network authentication. Shows transmit power, the amount of power used by a radio transceiver to send the signal out. Network type in use, Infrastructure or Ad-Hoc mode. Shows Wireless MAC address. Supported Rate(s) Shows the transmitting data rate.
- 19 -
Mode Refresh Supported wireless mode. It may support 802.11b, 802.11g and 802.11n wireless mode. Click Refresh button to search and rescan the available network. Add to Profile Select an available network (SSID) on the list and then click Add to Profile button to add it into the profile list. Note Double click on item to join/create profile. Status This tab listed the information about the WLAN Module and connected access point.
- 20 -
Statistics The Statistics screen displays the statistics on the current network settings. Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 21 -
WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push Button Configuration) method through an internal or external Registrar. WPS Tab PIN Code 8-digit numbers. It is required to enter PIN Code into Registrar when using PIN method. When STA is Enrollee, users can use "Renew" button to re-generate new PIN Code. Pin Input Config
(PIN) Click the Pin Input Config (PIN) button to select specific AP to process PIN Config. Push Button Config
(PBC) Click this button to connect with AP that supported WPS function within two minutes. Meanwhile, the AP should also click the PBC button simultaneously.
- 22 -
About This page displays the information of the WLAN Module Version. Switch to AP Mode To access the soft AP mode, please select the Mode on the function list of the Utility to make the WLAN Module act as a wireless AP.
- 23 -
Soft AP mode General General SSID BSSID Shows the network name of the AP. Shows the MAC address of the AP. Association Table This table shows the connected client here. Config Click the Config button to set up the Wireless Network Properties.
- 24 -
Network Name (SSID): User can change the network name of this access point. Channel: User can select the channel form the pull-down list. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK and WPA2-PSK. Data encryption: For Open System and Shared Key authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index. When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm.
- 25 -
Advanced Advanced Beacon Interval DTIM Period Preamble The time between two beacons. (The system default is 100 ms.) The delivery traffic indication message (DTIM) is an element included in some beacon frames. User can specify a value from 1 to 255 beacons. Select from the pull-down menu to change the Preamble type into Short or Long. Set Defaults Click to use the system default value. Apply Click to apply the above settings.
- 26 -
Statistics Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 27 -
ICS This page displays setting Internet connection sharing (ICS). Select a sharing public network and click Apply button to make a connection.
- 28 -
For Windows Vista Station Mode Show Tray Icon: Check to show the wireless adapter icon at the tray. Disable Adapter: Check this to disable the wireless adapter. Radio off: Check this to turn OFF radio function. Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 29 -
General The General page displays the detail information of current connection. General Tab Status Speed Type Encryption SSID Signal Strength Link Quality MAC Address IP Address Subnet Mask Gateway Renew IP Shows the current connected status. If there is no connection, it will show Not Associated. If been connected, the system will show Associated. When connecting, the system will show checking Status. Shows the current transmitting rate and receiving rate. Network type in use, Infrastructure or Ad-Hoc. Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use. Shows the connected access point network name. Shows the receiving signal strength. Shows the connection quality based on signal strength. The physical address of the WLAN Module. Shows the IP address information. Shows the Subnet Mask information. Shows the default gateway IP address. Click the Renew IP button to obtain IP address form the connected
- 30 -
Profile gateway. Profile can let users book keeping the favorite wireless setting among home, office, and other public hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles. Profile Tab Profile Name SSID Add Here shows a distinctive name of profile in this column. The SSID is the unique name shared among all wireless access points in the wireless network. Click Add button to add a profile from the drop-down screen.
- 31 -
This is a computer-to-computer (ad hoc) network; wireless access points are not used: This function is selected to enable the ad hoc network type that computers should be setup at the same channel to communicate to each other directly without access point, users can share files and printers between each PC and laptop. Profile Name: Users can enter profile name at will. Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless network. The name must be identical for all devices and wireless access points attempting to connect to the same network. Channel: If set to ad hoc network type, user can select channels form the pull-down menu. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK, WPA2-PSK, WPA 802.1X, WPA2 802.1X and WEP 802.1X. Data encryption: For Open System, Shared Key and WEP 802.1X authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index.
- 32 -
When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm. When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP 802.1X When users use radius server to authenticate client certificate for WPA authentication mode (WPA authentication do not support EAP Method-
MD5-Challenge). EAP TYPE:
TLS: Transport Layer Security. Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication. TTLS: Tunnelled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. MD5: Message Digest Challenge. Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network. Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2. Username: Enter the username for server. Identity: Enter the identity for server. Domain: Enter the domain of the network. Password: Enter the password for server. Certificate: Choose server that issuer of certificates. Click Remove button to delete selected profile. Click Edit button to edit selected profile. Click Duplicate button to copy selected profile. Click Set Default button to set selected profile to be connected first. Remove Edit Duplicate Set Default
- 33 -
Available Network This page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID, Supported Rate(s), and Mode. Network Tab SSID Shows the network name of the access points. Channel Shows the currently channel in use. Encryption Network Authentication Signal Type Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, None and TKIP/AES. Show the device network authentication. Shows transmit power, the amount of power used by a radio transceiver to send the signal out. Network type in use, Infrastructure or Ad-Hoc mode.
- 34 -
BSSID Shows Wireless MAC address. Supported Rate(s) Shows the transmitting data rate. Mode Refresh Supported wireless mode. It may support 802.11b, 802.11g and 802.11n wireless mode. Click Refresh button to search and rescan the available network. Add to Profile Select an available network (SSID) on the list and then click Add to Profile button to add it into the profile list. Note Double click on item to join/create profile. Status This tab listed the information about the WLAN Module and connected access point.
- 35 -
Statistics The Statistics screen displays the statistics on the current network settings. Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 36 -
WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push Button Configuration) method through an internal or external Registrar. WPS Tab PIN Code 8-digit numbers. It is required to enter PIN Code into Registrar when using PIN method. When STA is Enrollee, users can use "Renew" button to re-generate new PIN Code. Pin Input Config
(PIN) Click the Pin Input Config (PIN) button to select specific AP to process PIN Config. Push Button Config
(PBC) Click this button to connect with AP that supported WPS function within two minutes. Meanwhile, the AP should also click the PBC button simultaneously.
- 37 -
About This page displays the information of the WLAN Module Version. Switch to AP Mode To access the soft AP mode, please select the Mode on the function list of the Utility to make the WLAN Module act as a wireless AP.
- 38 -
Soft AP mode General General SSID BSSID Shows the network name of the AP. Shows the MAC address of the AP. Association Table This table shows the connected client here. Config Click the Config button to set up the Wireless Network Properties.
- 39 -
Network Name (SSID): User can change the network name of this access point. Channel: User can select the channel form the pull-down list. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK and WPA2-PSK. Data encryption: For Open System and Shared Key authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index. When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm.
- 40 -
Advanced Advanced Beacon Interval DTIM Period Preamble The time between two beacons. (The system default is 100 ms.) The delivery traffic indication message (DTIM) is an element included in some beacon frames. User can specify a value from 1 to 255 beacons. Select from the pull-down menu to change the Preamble type into Short or Long. Set Defaults Click to use the system default value. Apply Click to apply the above settings.
- 41 -
Statistics Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 42 -
ICS This page displays setting Internet connection sharing (ICS). Select a sharing public network and click Apply button to make a connection.
- 43 -
For Windows 7 Station Mode Show Tray Icon: Check to show the wireless adapter icon at the tray. Disable Adapter: Check this to disable the wireless adapter. Radio off: Check this to turn OFF radio function. Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 44 -
General The General page displays the detail information of current connection. General Tab Status Speed Type Encryption SSID Signal Strength Link Quality MAC Address IP Address Subnet Mask Gateway Shows the current connected status. If there is no connection, it will show Not Associated. If been connected, the system will show Associated. When connecting, the system will show checking Status. Shows the current transmitting rate and receiving rate. Network type in use, Infrastructure or Ad-Hoc. Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use. Shows the connected access point network name. Shows the receiving signal strength. Shows the connection quality based on signal strength. The physical address of the WLAN Module. Shows the IP address information. Shows the Subnet Mask information. Shows the default gateway IP address.
- 45 -
Renew IP Profile Click the Renew IP button to obtain IP address form the connected gateway. Profile can let users book keeping the favorite wireless setting among home, office, and other public hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles. Profile Tab Profile Name SSID Add Here shows a distinctive name of profile in this column. The SSID is the unique name shared among all wireless access points in the wireless network. Click Add button to add a profile from the drop-down screen.
- 46 -
This is a computer-to-computer (ad hoc) network; wireless access points are not used: This function is selected to enable the ad hoc network type that computers should be setup at the same channel to communicate to each other directly without access point, users can share files and printers between each PC and laptop. Profile Name: Users can enter profile name at will. Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless network. The name must be identical for all devices and wireless access points attempting to connect to the same network. Channel: If set to ad hoc network type, user can select channels form the pull-down menu. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK, WPA2-PSK, WPA 802.1X, WPA2 802.1X and WEP 802.1X. Data encryption: For Open System, Shared Key and WEP 802.1X authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index.
- 47 -
When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm. When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP 802.1X When users use radius server to authenticate client certificate for WPA authentication mode (WPA authentication do not support EAP Method-
MD5-Challenge). EAP TYPE:
TLS: Transport Layer Security. Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication. TTLS: Tunnelled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. MD5: Message Digest Challenge. Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network. Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2. Username: Enter the username for server. Identity: Enter the identity for server. Domain: Enter the domain of the network. Password: Enter the password for server. Certificate: Choose server that issuer of certificates. Click Remove button to delete selected profile. Click Edit button to edit selected profile. Click Duplicate button to copy selected profile. Click Set Default button to set selected profile to be connected first. Remove Edit Duplicate Set Default
- 48 -
Available Network This page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID, Supported Rate(s), and Mode. Network Tab SSID Shows the network name of the access points. Channel Shows the currently channel in use. Encryption Network Authentication Signal Type Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, None and TKIP/AES. Show the device network authentication. Shows transmit power, the amount of power used by a radio transceiver to send the signal out. Network type in use, Infrastructure or Ad-Hoc mode.
- 49 -
BSSID Shows Wireless MAC address. Supported Rate(s) Shows the transmitting data rate. Mode Refresh Supported wireless mode. It may support 802.11b, 802.11g and 802.11n wireless mode. Click Refresh button to search and rescan the available network. Add to Profile Select an available network (SSID) on the list and then click Add to Profile button to add it into the profile list. Note Double click on item to join/create profile. Status This tab listed the information about the WLAN Module and connected access point.
- 50 -
Statistics The Statistics screen displays the statistics on the current network settings. Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 51 -
WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push Button Configuration) method through an internal or external Registrar. WPS Tab PIN Code 8-digit numbers. It is required to enter PIN Code into Registrar when using PIN method. When STA is Enrollee, users can use "Renew" button to re-generate new PIN Code. Pin Input Config
(PIN) Click the Pin Input Config (PIN) button to select specific AP to process PIN Config. Push Button Config
(PBC) Click this button to connect with AP that supported WPS function within two minutes. Meanwhile, the AP should also click the PBC button simultaneously.
- 52 -
About This page displays the information of the WLAN Module Version. Switch to AP Mode To access the soft AP mode, please select the Mode on the function list of the Utility to make the WLAN Module act as a wireless AP.
- 53 -
Soft AP mode General General SSID BSSID Shows the network name of the AP. Shows the MAC address of the AP. Association Table This table shows the connected client here. Config Click the Config button to set up the Wireless Network Properties.
- 54 -
Network Name (SSID): User can change the network name of this access point. Channel: User can select the channel form the pull-down list. Wireless network security Network Authentication: There are several types of authentication modes including Open System, Shared Key, WPA-PSK and WPA2-PSK. Data encryption: For Open System and Shared Key authentication mode, the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK, authentication mode, the encryption type supports both TKIP and AES. When encryption is set to WEP ASCII: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 5 ASCII characters (case sensitive), and 128 bits for 13 ASCII characters (case sensitive). PASS PHRASE: Only valid when using WEP encryption algorithm. When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f). Key index (advanced): Select 1~4 key index form the pull-down menu, must match with the connected APs key index. When encryption is set to WPA-PSK/ WPA2-PSK Network key: Enter network key at least 8 to 64 characters. Confirm network key: Enter network key again to confirm.
- 55 -
Advanced Advanced Beacon Interval DTIM Period Preamble The time between two beacons. (The system default is 100 ms.) The delivery traffic indication message (DTIM) is an element included in some beacon frames. User can specify a value from 1 to 255 beacons. Select from the pull-down menu to change the Preamble type into Short or Long. Set Defaults Click to use the system default value. Apply Click to apply the above settings.
- 56 -
Statistics Statistics Tx OK Tx Error Shows information of packets successfully sent. Shows information of packets failed transmit after hitting retry limit. Rx OK Shows information of packets received successfully. Rx Packet Count Shows information of packets received successfully. Rx Retry Shows information of packets failed transmit after hitting retry limit. Rx ICV Error Shows information of packets received with ICV error. Reset Click to reset counters to zero.
- 57 -
ICS This page displays setting Internet connection sharing (ICS). Select a sharing public network and click Apply button to make a connection.
- 58 -
Chapter 5: Uninstall For Windows 2000/XP To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will be removed as well.) 1. Go to Start All Programs Intelligent Wireless Utility Uninstall Intelligent.
- 59 -
2. Click Yes to completely remove the selected application and all of its features. 3. Then click Finish to complete uninstall.
- 60 -
For Windows Vista To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will be removed as well.) 1. Go to Start Programs Intelligent Wireless LAN Utility Uninstall Intelligent. 2. Click Yes to complete remove the selected application and all of its features.
- 61 -
3. Finally, click Finish to complete uninstall.
- 62 -
For Windows 7 To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will be removed as well.) 1. Go to Start Programs Intelligent Wireless Utility Uninstall Intelligent.
- 63 -
2. Click Yes to complete remove the selected application and all of its features. 3. Finally, click Finish to complete uninstall.
- 64 -
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2012-10-02 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2012-10-02
|
||||
1 | Applicant's complete, legal business name |
Abocom Systems Inc
|
||||
1 | FCC Registration Number (FRN) |
0009543745
|
||||
1 | Physical Address |
No.77, Yu-Yih Rd.
|
||||
1 |
Miao-Lih, N/A 35059
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@telefication.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
MQ4
|
||||
1 | Equipment Product Code |
WM5206
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
H**** H********
|
||||
1 | Title |
Manager
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
h******@abocom.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Sporton International Inc
|
||||
1 | Name |
S****** J******
|
||||
1 | Physical Address |
No.8, Lane 724, Bo-ai St. Jhubei City
|
||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3********
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
s******@Sporton.com.tw
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
Sporton International Inc
|
||||
1 | Name |
S****** J******
|
||||
1 | Physical Address |
Taiwan
|
||||
1 |
s******@Sporton.com.tw
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11n/b/g WLAN Module | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Single Modular Approval | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power output listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users may not be provided with the module installation instructions. OEM integrators and end-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This device has 20/40 MHz bandwidths. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
SPORTON International Inc.
|
||||
1 | Name |
L**** H****
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
l******@sporton.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.3800000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC