all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Manual | Users Manual | 2.22 MiB | ||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Setup Photos |
1 | Manual | Users Manual | 2.22 MiB |
Users Manual Wireless 802.11b/g/n USB Adapter COPYRIGHT Copyright 2007/2008 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. Further, this company reserves the right to revise this publication and to make changes from time to time in the contents thereof without obligation to notify any person of such revision or changes. Index Chapter I : Product Information ......................................................................................................................... 4 1-1 Introduction and safety information............................................................................................ 4 1-2 Safety Information ...................................................................................................................... 5 1-3 System Requirements................................................................................................................ 6 1-4 Package Contents...................................................................................................................... 6 1-5 Familiar with your new wireless network card ........................................................................... 7 CHAPTER II : DRIVER INSTALLATION AND CONFIGURATION .................................................................... 8 2-1 Network Card Installation ........................................................................................................... 8 2-2 Connect to Wireless Access Point ........................................................................................... 12 2-2-1 Using Ralink Utility ................................................................................................................ 12 2-2-2 Using Windows Zero Configuration ...................................................................................... 19 2-3 Connection Profile Management.............................................................................................. 23 2-3-1 Make a profile for an access point or wireless device .......................................................... 23 2-3-2 Using 802.1x Certification .................................................................................................. 30 2-3-3 Using 802.1x - CA Server ..................................................................................................... 32 2-4 View Network Statistics and Link Status .................................................................................. 33 2-4-1 Network Statistics.................................................................................................................. 33 2-4-2 Link Status ............................................................................................................................ 34 2-5 Advanced Settings ................................................................................................................... 36 2-6 QoS Setting.............................................................................................................................. 39 2-7 WPS Configuration................................................................................................................... 41 2-7-1 WPS Setup - PBC (Push-Button Configuration) ................................................................... 42 2-7-2 WPS Setup - PIN .................................................................................................................. 45 2-8 Radio On/Off ............................................................................................................................ 47 2-9 About ........................................................................................................................................ 48 CHAPTER III : AP mode management guide for Windows 2000/XP/Vista ..................................................... 50 3-1 Config ....................................................................................................................................... 51 3-2 Security Setting ........................................................................................................................ 53 3-3 Access Control ......................................................................................................................... 54 3-4 MAC Table................................................................................................................................ 55 3-5 Event Log ................................................................................................................................. 56 3-6 Statistics ................................................................................................................................... 57 CHAPTER IV : APPENDIX .............................................................................................................................. 59 4-1 Hardware Specification ............................................................................................................ 59 4-2 Troubleshooting........................................................................................................................ 60 4-3 Glossary ................................................................................................................................... 62 4-4 FCC and Other Compliance Statements.................................................................................. 66 Chapter I : Product Information 1-1 Introduction and safety information Thank you for purchasing this high-speed 802.11b/g/Draft-N wireless network card! Excepting common wireless standards 802.11b/g, this wireless network card is also 802.11 Draft-N compatible - data transfer rate is 300Mbps, and thats six times faster than 802.11g wireless network! 802.11 Draft-N also provides wider wireless coverage, so you dont have to worry if your computer is far from your wireless access point. This wireless network card also supports MIMO (Multi-In, Multi-Out) technology, which uses two different radio channels to enhance data transfer rate and wireless coverage. With easy-to-install USB 2.0 interface - a very common expansion port of computers - plug this wireless network card into any empty USB port of your computer, just that simple!
Other features of this adapter including:
QoS function: Control the bandwidth required for different applications. 802.11b/g/Draft-N 2.0 compatible. Supports major encryption methods like WPS, WEP, WPA, and WPA2 encryption. USB 2.0 interface - you can get it installed on your computer in just few seconds!
Support Cisco CCX. 1-2 Safety Information In order to keep the safety of users and your properties, please follow the following safety instructions:
1. This USB wireless network card is designed for indoor use only. DO NOT expose this network card to direct sun light, rain, or snow. 2. DO NOT put this network card at or near hot or humid places, like kitchen or bathroom. Also, do not left this wireless network card in the car in summer. 3. This network card is small enough to put in a childs mouth, and it could cause serious injury or could be fatal. If they throw the network card, the card will be damaged. PLEASE KEEP THIS NETWORK CARD OUT THE REACH OF CHILDREN!
4. This network card will become hot when being used for long time (This is normal and is not a malfunction). DO NOT put the network card on a paper, cloth, or other flammable objects after the network card has been used for a long time. 5. Theres no user-serviceable part inside the network card. If you found that the network card is not working properly, please contact your dealer of purchase and ask for help. DO NOT disassemble the network card by your self, warranty will be void. 6. If the network card falls into water, DO NOT USE IT AGAIN BEFORE YOU SEND THE CARD TO THE DEALER OF PURCHASE FOR INSPECTION. 7. If you smell something strange or even see some smoke coming out from the network card, switch the computer off immediately, and call dealer of purchase for help. An empty USB 2.0 port (May not work on USB 1.1 port, and performance will be greatly reduced) 1-3 System Requirements Windows 2000, 2003, XP, or Vista 32/64 operating system CD-ROM drive At least 100MB of available disk space 1-4 Package Contents USB wireless network card (1 pcs) Quick installation guide (1 pcs) User manual CD-ROM (1 pcs) Before you starting to use this wireless network card, please check if theres anything missing in the package, and contact your dealer of purchase to claim for missing items:
1-5 Familiar with your new wireless network card USB Connector Connector Cap (To protect USB connector when not in use) Act LED LED Name Light Status Description Act On Off Linked to a wireless access point / Transferring data No wireless activity CHAPTER II : DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Card Installation Please follow the following instructions to install your new wireless network card:
1. Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on. Never use force to insert the card, if you feel its stuck, flip the card over and try again. 2. The following message will appear on your computer, click Cancel. 3. Insert device driver CD-ROM into the CD/DVD ROM drive of your computer, and execute Setup.exe program in Driver folder. Please read the end user license agreement and click Yes to accept license agreement. 4. Choose the Install driver and Ralink WLAN Utility or Install driver only. When you choose Install driver and Ralink WLAN Utility, you can choose the configuration tool used to configure the wireless network card here. Its recommended to select Ralink Configuration Tool, which provides fully access to all function of this wireless network card. If you prefer to use the wireless configuration tool provided by Windows XP, please select Microsoft Zero Configuration Tool, and then click Next.( Note. In Vista no such selection appear.) 5. Please wait while the install procedure is running. When you see this message, please click Finish to complete the driver installation process. A new icon will appear at lower-right corner of your computer desktop, you can put the mouse cursor on the icon, and the status of wireless card will be displayed as a popup balloon. 6. When you want to configure your wireless connection, please right click on this icon, and a popup menu will appear. You can click Launch Config Utilities to start configuration program. If you want to close configuration utility, please click Exit. 2-2 Connect to Wireless Access Point There are two ways you can configure your wireless network card to connect to wireless access point: using the Ralink configuration utility which comes with wireless card driver, and using built-in windows zero configuration utility. 2-2-1 Using Ralink Utility Please follow the following instructions to use Ralink configuration utility to connect to wireless access point. 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, and then click Launch Config Utilities. 2. Configuration utility will scan for all wireless access points automatically. Scan results will be displayed here, please check if the wireless access point with the SSID (the name of wireless access point) you preferred is shown here. If the wireless access point you wish to connect does not show here, please click Rescan to try again, until the one you preferred is displayed. You may have to click Rescan for more than two times before you can see the access point you wish to use here sometimes. If you still can not see the access point you wish to use after clicking Rescan for more than five times, please move your computer closer to the location where the wireless access point is, or see instructions in chapter 3-2 Troubleshooting. Here are descriptions of every setup items:
SSID The Service Set Identifier of wireless access point or other network device. You can think it as the name of access point of wireless device. BSSID The MAC address of wireless access point or other network device. Unlike SSID, BSSID of every access point or network device is unique, and will not be the same with others. So you can identify a single access point or wireless device from others by BSSID, if they all have the same SSID. Signal Shows the signal strength of access point or wireless device. Larger number means better radio strength, which often means youre not too far from that access point or wireless device. Channel Shows the channel number that access point or wireless device uses. Encryption Shows the encryption method that access point or wireless device uses. If the wireless access point does not enable encryption, youll see None displayed here. Authentication Shows the authentication mode that access point or wireless device uses. If the wireless access point does not require authentication, youll see Unknown displayed here. Network Type Shows the type of wireless connection. If its a wireless access point, Infrastructure will be displayed here; if its a computer or network device, AdHoc will be displayed here. Tips:
Wireless access point (Infrastructure) is a network device which acts as a bridge, to let wired and wireless network devices communicate with each other. AdHoc is another connection type. A computer or network device can establish a direct wireless link with other computer or network device directly, without the help of wireless access point. 3. Click the wireless access point or network device you wish to connect, it will be highlighted, then click Connect. If the access point you selected does not enable encryption (The content of Encryption field of the access point you selected is None, youll be connected to this wireless access point within one minute. Please jump to step 6. If the access point you selected enables encryption, please proceed to next step. Status Extra Info Channel Shows the connecting status. Also shows the SSID while connecting to a valid network. Display link status in use. Display current channel in use. Authentication Authentication mode in use. Encryption Encryption type in use. Network Type Network type in use. IP Address Sub Mask IP address of current connection. Subnet mask of current connection. Default Gateway Default gateway of current connection. Link Speed Throughput Link Quality Show current transmit rate and receive rate. Display transmit and receive throughput in Mbps. Display connection quality based on signal strength and TX/RX packet error rate. Signal Strength 1 Receive signal strength 1, user can choose to display as percentage or dBm format. Signal Strength 2 Receive signal strength 2, user can choose to display as percentage or dBm format. Signal Strength 3 Receive signal strength 3, user can choose to display as percentage or dBm format. Noise Strength Display noise signal strength. HT Display current HT status in use, containing BW, GI, MCS, SNR0, and SNR1 value. 4. If the wireless access point does not have SSID, youll be prompted to input it here. Please ask the owner of wireless access point and input the exact SSID here, then click OK when ready. If the SSID you provided here is wrong, youll not be able to connect to this access point. If the wireless access point you selected have SSID, please skip this step. 5. If the wireless access point uses encryption, you have to input WEP passphrase or WPA preshared key. Please ask the owner of the wireless access point you want to connect, and input the correct passphrase
/ preshared key here, then click OK. If the value you inputted here is wrong, you will not be able to connect to this wireless access point. Authentication type is selected automatically, please dont change it. If the access point you selected does not enable encryption and does not require authentication, please skip this step. 6. Youll see Connected <-> SSID (SSID is the SSID of the wireless access point or wireless device you connected to) message displayed at lower-left corner of configuration utility, congratulations, youre successfully connected to the access point or wireless device you selected!
7. You can put the mouse cursor over the Ralink configuration utility icon, and the brief information about link status and signal strength of current wireless connection will be shown as a popup balloon. 2-2-2 Using Windows Zero Configuration Windows XP has a built-in wireless network configuration utility, called as Windows Zero Configuration
(WZC). You can also use WZC to configure your wireless network parameter:
1. Right-click Ralink configuration utility icon and select Use Zero Configuration as Configuration utility. 2. Click Start button (should be located at the bottom-left corner of windows desktop), click Control Panel, then click Network and Internet Connections in Control Panel. 3. Click Connect to a network under Network Connections. 4. Right-click Wireless Network Connection (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the Ralink 802.11n Wireless LAN Card), then select View Available Wireless Networks. 5. All wireless access points in proximity will be displayed here. If the access point you want to use is not displayed here, please try to move your computer closer to the access point, or you can click Refresh network list to rescan access points. Click the access point you want to use if its shown, then click Connect. 6. If the access point is protected by encryption, you have to input its security key or passphrase here. It must match the encryption setting on the access point. If the access point you selected does not use encryption, youll not be prompted for security key or passphrase. 7. If you can see Connected message, the connection between your computer and wireless access point is successfully established. 2-3 Connection Profile Management If you need to connect to different wireless access points at different time, like of access point of your home, office, cybercaf, or public wireless service, you can store the connection parameters (encryption, passphrase, security etc, etc.) as a profile for every access point, so you dont have in input these parameters every time you want to connect to a specific wireless access point. 2-3-1 Make a profile for an access point or wireless device 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, and then clicks Launch Config Utilities. 2. There are two ways to add a new connection profile:
Create a new profile, or Add a profile from an existing wireless access point or wireless device If you want to click new profile, click Profile tab, then click Add button:
Or, you can add a connected wireless access point or wireless device to a profile by clicking Network tab, then click Add to Profile button:
You can set the parameter for this connection here:
Here are descriptions of every setup items:
Profile Name Please give this profile a name, up to 32 alphanumerical characters and symbols are allowed, but space is not allowed. SSID The SSID of the wireless access point or wireless device you selected will be displayed here. But if the SSID of access point or wireless device is not available, you have to input it here manually. PSM Please select CAM (constantly awake mode, keep the wireless radio activity when
(Power Saving Mode) not transferring data), or PSM (Power saving mode, switches radio off when not transferring data). Its recommended to choose PSM if youre using this network card with notebook computer to help the battery live longer. Network Type Select network type (Ad Hoc or Infrastructure). If youre adding a profile from an existing access point or wireless device, its automatically selected and you dont have to change it. TX Power You can select the radio output power of wireless network card. You may not need full radio power if youre not far from wireless access point, and only use a high setting here if you found that radio reception is bad. If you dont know which one to use, select Auto. Preamble This option is only available when the network type is Ad hoc. You can select Auto or Long Preamble. Please select Auto if you dont know what it is. RTS Threshold Check the box and you can set RTS threshold manually here. Do not modify default setting unless you know what it is. Fragment Threshold Check the box and you can set fragment threshold manually here. Do not modify default setting unless you know what it is. Now click Auth. \ Encry. tab, and set the encryption and authentication settings. Here are descriptions of every setup item:
Authentication Type Select the authentication type of the wireless access point or wireless device you wish to connect. If youre adding a profile from an existing access point or wireless device, the value will be selected automatically, and please do not modify it. If you select LEAP, the following message will be displayed. Please input LEAP identity, password, domain name, and select encryption type. You can check Show Password box so the password you inputted will be displayed as you type, but not replace by asterisk. Encryption Select the encryption type of the wireless access point or wireless device you wish to connect. If youre adding a profile from an existing access point or wireless device, the value will be selected automatically, and please do not modify it. WPA Preshared Key Input WPA preshared key here. If encryption is not enabled, or you select WEP as encryption type, this field will be disabled and grayed out. WEP Key You can select key type (Hex or ASCII) and input WEP key here. If encryption is not enabled, or you select WPA as encryption type, this field will be disabled and grayed out. Show Password Check this box and all passphrases or security keys you inputted will be displayed as you type, but not replace your input with asterisk. Use 802.1x Enable 802.1x wireless authentication. Please click 802.1x Setting button to set 802.1x parameters. (See next section). After you finish all settings, click OK to save settings and exit. The profile you just created will be displayed:
Select the profile you wish to use, and click Activate to use the profile you selected. If you want to change the connection parameters of a specific profile, just select it and click Edit button, youll be prompted to input the connection parameters, just like youre creating a new profile. If you no longer need a profile, select the profile then click Delete. 2-3-2 Using 802.1x Certification After you click 802.1x Setting, a new window will appear:
Here are descriptions of every setup items:
Authentication Type Please select an 802.1x authentication type here. The type you select here must be identical to the type of the 802.1x authentication type youre using. Session Resumption You can enable or disable session resumption here. If you dont know if you should enable session resumption or not, please ask your 802.1x authentication administrator. Identity Please input 802.1x identity here. Password Please input the password of 802.1x identity here. Domain Name Please input the domain name of 802.1x authentication here. This field will be grayed out when authentication type is not EAP-FAST. Use Client If the authentication type you use is PEAP or TTLS, you can use the certificate stored on your computer. If the authentication type you use is TLS/Smart Card, this box is always checked. Allow This box is always checked and can not be modified. unauthenticated provision mode Use protected If the authentication type you use is EAP-FAST you can use protected authentication authentication credential by check this box. credential Remove Import Remove the credential you imported previously. Import the authentication credential file (PAC or al file format), youll be prompted to select a credential file from your computer. Protocol You can select the protocol of tunneled authentication here. This pull down menu is only available when authentication type you use is PEAP or TTLS. When you use EAP-FAST as authentication type, the protocol setting is always Generic Token Card and can not be changed. Identity (of tunneled Please input the identity of tunneled authentication here. authentication) Password (of tunneled Please input the password of tunneled authentication here. authentication) Password Mode Please select the password mode of EAP-FAST authentication mode. This setting is hidden when the authentication type is not EAP-FAST. After you finish all settings, click OK to save settings and exit. 2-3-3 Using 802.1x - CA Server If you want to use CA server, please click CA Server tab. And the following message will be displayed:
Here are descriptions of every setup items:
Use certificate chain Check this box to enable the use of certificate chain. Certificate Issuer Please select the issuer of certificate from this dropdown menu. Allow intermediate Check this box if you wish to allow intermediate certificates certificates Server name Input the server name of CA server here. Server name must Check this box and the wireless configuration utility will check if the server name match exactly of CA server you set here is exactly matched with the CA server connected to. If they dont match, connection will be dropped. Domain name must Check this box and the wireless configuration utility will check the end of domain end in specified name name. If theres anything wrong, connection will be dropped. After you finish all settings, click OK to save settings and exit. 2-4 View Network Statistics and Link Status The configuration utility provides information about network statistics and link status. If you want to know how your wireless network card works, you can use these functions to get detailed information about the wireless connection youre using. 2-4-1 Network Statistics Please follow the following instructions to check network statistics:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click Statistics tab, and the statistics of wireless connection will be displayed:
All connection-related statistics is displayed here. You can click Reset Counter to reset the statistics of all items back to 0. Click OK to close the window. 2-4-2 Link Status Please follow the following instructions to check network statistics:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click Network tab, and information about current wireless connection will be displayed:
This information displayed here is updated every second, and here are descriptions of every item:
Status Display the SSID and BSSID of connected wireless access point or wireless device (displayed as SSID <-> BSSID as shown in above picture. If theres no active connection currently, Disconnected will be displayed here.. Extra Inf Displays the link status (Link is up or Link is down, and the radio transmitting power of your network card. Channel Displays the radio channel being used now. Link Speed Displays the link speed of data transmitting (Tx, in Mbps) and receiving (Rx, in Mbps). Link speed is the maximum available data transfer speed of the wireless connection, and depends on the radio signal quality of wireless connection. Throughput Displays the rate of data transmitting (Tx, in Kbps) and receiving (Rx, in Kbps). Link Quality Displays link quality (radio signal quality). When the link quality is better, the wireless link speed will be better, too. Link quality is displayed by percentage and a descriptive word (Good, normal, weak, and low). Signal Strength 1 Displays the radio signal strength of built-in antenna 1. Signal Strength 2 Displays the radio signal strength of built-in antenna 2. Noise Level Displays the percentage or level of noise (unusable) signal. If the value of this item is high, data transfer rate will drop. dBm Enable the show dbm check box will show the value of signal strength and noise level will be displayed in dBm level instead of percentage. There are several wireless statuses available at the bottom of this window. For their explanations, please see chapter 3-3 Glossary. 2-5 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users. You can change these settings to increase data transfer performance, or change operation mode. Please follow the following instructions to set advanced wireless settings:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click Advanced tab, and the following settings will appear:
Here are descriptions of every setup items:
Wireless mode Select wireless operation mode, available options are 802.11b/g mix, 802.11b only, and 802.11b/g/n mix. You can select 802.11b/g/n mix to maximize wireless compatibility with wireless access points and other wireless devices. Anyway, you can set this setting to 802.11b only when youre going to communicate with old 802.11b wireless devices and you got problem using other two modes. Wireless Protection This setting helps your network card to avoid interference with other wireless devices when there are both 802.11b and 802.11g wireless devices in the same place. Its recommended to set this setting to Auto, since enabling this setting will slightly reduce the data transfer performance. TX Rate Normally, the wireless network card will adjust transfer rate automatically according to wireless signal quality. However, you can fix the data transfer rate to a lower fixed rate if you think theres some problem about data transfer, or youre too far from wireless access point. Its recommended to set this setting to Auto, unless you really know the meaning of this setting. Tx BURST Check this box to accelerate the data transmit rate. It may not work with all wireless access point and wireless devices. Enable TCP Window Check this box and the configuration utility will adjust TCP window size Size automatically, to get better performance. It should be safe for most of wireless environments, but if you found some problem on data transfer, uncheck this box. Fast Roaming at Check this box and you can adjust the threshold of when this wireless network card should switch to another wireless access point with better signal quality. Only adjust value when you understand what it means. Turn off RF Click this button to switch wireless radio off, click it again switch wireless radio on. Select Your Country Select the country / region code of the place youre living. Different country /
Region Code region have different regulations on wireless devices, and its forbidden to use certain channel (radio frequency) in some countries or regions. Please select the country and region code according to the place you live. Show Authentication When your computer is being authenticated by wireless authentication server, a Status Dialog dialog window with the process of authentication will appear. This function is helpful to find out the problem when you can not be authenticated, and you can provide this information to authentication servers administrator for debugging purpose. Enable CCX Enable Cisco Compatible eXtensions. CCX is a wireless feature developed by Cisco used to improve the wireless performance with CCX compatible wireless devices. Check this box if you need to connect to CCX-compatible wireless devices. Turn on CCKM Check this box to enable CCKM (Cisco Centralized Key Management), which enables wireless clients to roam between CCKM-enabled accesses points in very short time. Enable Radio Measurement When youre connecting to CCX-compatible access point, check this box to enable radio measurement function to improve wireless connectivity. Non-Serving Channel When youre connecting to CCX-compatible access point, check this box to Measurements enable measurement on unused radio channels to improve wireless connectivity. Limit --- milliseconds Limit the time used for said measurement to a certain time. Default value is 250. After you finish the settings, click Apply to apply new settings, and click OK to close configuration utility. 2-6 QoS Setting This wireless network card provides QoS (Quality of Service) function, which can improve the performance of certain network applications, like audio / video streaming, network telephony (VoIP), and others. When you enable WMM (Wi-Fi MultiMedia) function of this network card, you can define the priority of different kinds of data, to give higher priority to applications which require instant responding. Therefore you can improve the performance of such network applications. Please follow the following instructions to set advanced wireless settings:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click WMM tab, and the following settings will appear:
Here are descriptions of every setup items:
WMM Enable Check this box to enable WMM function. Please click Apply button on the right of this check box after you check or uncheck this box, so corresponding settings in this window will be activated or deactivated respectively. WMM Power Save Enable WMM power saving mode to save energy and lets your battery live Enable Setting... longer. Click this button to select the WMM data type which will suppress the function of power saving. When this kind of data is transferring, power saving function will be disabled. Available data types are AC_BK (Background / Low Priority), AC_BE (Best Effort), AC_VI (Video First), and AC_VO (Voice First). Direct Link Enable or disable direct link setup (DLS) function. Setup Enable This function will greatly improve the data transfer rate between WMM-enabled wireless devices. Please click Apply button on the right of this check box after you check or uncheck this box, so corresponding settings in this window will be activated or deactivated respectively. MAC Address Input the MAC address of another WMM-enabled wireless device you wish to establish a direct link here, then click Apply to add this MAC address to DLS address table. Timeout Value Input the timeout value of this WMM-enabled direct link wireless device. If the wireless device is not responding after this time, it will be removed from DLS table. Tear Down If you want to remove a specific wireless device from DLS table, select the device and click this button to remove it. After you finish the settings, click OK to close configuration utility. 2-7 WPS Configuration Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you dont have to configure the wireless access point and setup data encryption. All you have to do is go to the WPS setup page of this wireless card, click a button (if your wireless card has a hardware WPS button, you can also simply push the hardware WPS button on the wireless card), and then press a specific button on the wireless access point you wish to establish a secure connection - just three simple steps!
For older wireless access points, its possible to perform a firmware upgrade to become a WPS-enabled access point. Since they may not have a hardware button to press for WPS setup, you can use an alternative WPS setup method input the pin code. Every WPS-compatible wireless network card comes with a unique WPS pin code; you can just input the code to wireless access point, and the wireless access point and wireless network card will do the rest for you. This wireless network card is compatible with WPS. To use this function, the wireless access point you wish to connect to must support WPS function too. Now, please follow the following instructions to establish secure connection between WPS-enabled wireless access point and your wireless network card:
2-7-1 WPS Setup - PBC (Push-Button Configuration) 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click WPS Configuration tab, and the following settings will appear:
3. Push the WPS button on your wireless access point (the button used to activate WPS standby mode may have another name), or use other way to start WPS standby mode as the instruction given by your wireless access points user manual. 4. Before you start to establish the wireless connection by using WPS, you can click Rescan button to search for WPS-enabled access points near you, to make sure the WPS function of your access point is activated. All access points found will be displayed. Please make sure the access point you wish to connect is displayed. If not, please click Rescan few more times. You can also click Information button to see the detailed information about selected access point. 5. Click PBC button now to start to establish wireless connection by WPS, and please be patient (This may require several seconds to one minute to complete). When you see WPS status is connected successfully message, means the connection between your wireless network card and access point is successfully connected by WPS, and the information about access point you connected to will be displayed. Tips:
If your wireless network card has a hardware WPS button, you can also push the hardware WPS button, its the same as the PBC button in configuration utility. Sometime WPS may fail, and you can click PBC button few more times to try again. When an access point is connected, you can click Disconnect to disconnect your wireless network card from a connected access point, or select another WPS-enabled wireless access point, then click Connect to establish connection to selected access point, if there are more than one WPS-enabled access point found. You can also click Rotate button, and next access point on the list will be selected to establish connection. If you want to delete a found access point from the list, select it and click Delete button. 2-7-2 WPS Setup - PIN If the wireless access point you wish to connect supports PIN, please follow the following instructions to establish connection to it:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click WPS Configuration tab, and the following settings will appear:
The PIN number of your wireless network card is an eight-digit number located at the upper-right position of configuration utility. Remember it, and input the number to your wireless access point as the WPS PIN code
(Please refer to the user manual of your wireless access point for instructions about how to do this). Note:
The PIN code of every wireless network card is DIFFERENT. Please dont use the sample code shown here. 3. Click PIN button now, and wait for few seconds to one minute. If a wireless access point with correct PIN code is found, youll be connected to that access point:
You may have to click PIN for few more times to try again. If you still can not connect to access point by this way, please make sure the PIN code you provided to access point is correct. Note: When you click PIN or PBC, please don't do any rescan within two minutes connection. If you want to abort this setup within the interval, restart PIN/PBC or click Disconnect to stop WPS action. 2-8 Radio On/Off The Radio On/Off tap can on/off the radio function directly. If set Radio off, all the wireless connection will disconnect and the wireless function will off too. 2-9 About The About tab provides you the information about version numbers of configuration utility, firmware, and other important information about your wireless network card. Please follow the following instructions to see this information:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click Launch Config Utilities. 2. Click About tab, and the following settings will appear:
If you need assistance about network problem, youll need these values. You can also click WWW.RALINKTECH.COM button to go to the web site of network card driver manufacturer and get more information about your wireless network card. Please click OK to close configuration utility. CHAPTER III : AP mode management guide for Windows 2000/XP/Vista This adapter can be configured as AP mode. To use this adapter as an AP, please right click the icon on system tray and select Switch to AP mode. Please refer to the following introduction and information about this AP-mode utility. Note: In windows XP, it provides WPA support at hotfix Q815485. However; you have to make sure that hotfix Q815485 (require XP SP1 installed) has been installed in your system before you can start using WPA features. You can check the installation of hotfix in add/remove software page under control panel. 3-1 Config This page provides overall configuration to this adapter. Please find the following items for identification to each field. 1 2 3 4 5 6 8 9 13 14 7 10 11 12 1. SSID: AP name of user type. User also can select [Use Mac Address] to display it. 2. Wireless Mode: Select wireless mode. 802.11 B/G mix, 802.11B only, 802.11G only and 802.11 B/G/N mix mode are supported. When wireless card is 802.11N, system default is 802.11 B/G/N mix; Otherwise system default is 802.11 B/G mix (802.11 B/G/N mix selection item only exists for B/G/N adapter). Note: Wireless mode is not support for Vista. 3. Country Region Code: eight countries to choose. Country channel list:
0 1 Classification Range FCC (Canada) CH1 ~ CH11 ETSI CH1 ~ CH13 2 3 4 5 6 7 SPAIN CH10 ~ CH11 FRANCE CH10 ~ CH13 MKK CH14 ~ CH14 MKKI (TELEC) CH1 ~ CH14 ISRAEL ISRAEL CH3 ~ CH9 CH5 ~ CH13 Note: Country Region code is not support for Vista. 4. Beacon (ms): The time between two beacons. System default is 100 ms. 5. TX Power: Manually force the AP transmits power. System default is 100%. 6. Idle Time: Manually force the Idle Time using selected value. Default is 300. 7. Channel: Manually force the AP using the channel. System default is channel 1. 8. Use Mac Address: Use MAC address of used wireless card to be AP name. System default is APX (X is last number of Mac Address). 9. Security Setting: Authentication mode and encryption algorithm used within the AP. System default is no authentication and encryption. 10. No forwarding among wireless clients: No beacon among wireless client, clients can share information each other. System default is no forwarding. 11. Hide SSID: Prevent this AP from recognized in wireless network. This is disabled as default. 12. Allow BW40 MHz: Allow BW40 MHz capability. 13. Default: Use system default value. 14. Apply: Apply the above changes. 3-2 Security Setting This page pops up after clicking the Security Setting button. Please follow the instructions below:
1 3 4 5 2 1. Authentication Type: Select to be open or WPA-PSK system. 2. Encryption Type: Select an encryption type from the drop list. 3. WPA Pre-shared Key: A shared string between AP and STA. For WPA-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 lengths. 4. Group Rekey Interval: Only valid when using WPA-PSK encryption algorithm. The key will change compliance with seconds or beacon that user set. 5. WEP Key: Only valid when using WEP encryption algorithm. The key must match the key on AP. There are several formats to enter the keys. a. Hexadecimal (40bits): 10 Hex characters. b. Hexadecimal (128bits): 32Hex characters. c. ASCII (40bits): 5 ASCII characters. d. ASCII (128bits): 13 ASCII characters. 3-3 Access Control This function filters users to use this device by designating MAC address. Please refer to the following chart for introduction. 1 2 4 5 3 6 1. Access Policy: Choose a method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not. 2. MAC Address: Add allowed (or denied) MAC addresses to the MAC address list. 3. Access List: Display all Mac Addresses that you designated. 4. Delete: Delete Mac addresses that you selected. 5. Remove All: Remove all Mac address in [Access List]. 6. Apply: Apply changes. 3-4 MAC Table This page displays the station detail information of current connection. Items Information MAC Address The station MAC address of current connection. AID Raise value by current connection. Power Saving Mode Check if the connected station supports power saving. Status The connection status. 3-5 Event Log Record Soft AP all event time and message. Items Information Event Time (yy/mm/dd-hh:mm:ss) Record event time. Message All event messages. 3-6 Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. 1 2 3 1. Transmit Statistics Items Information Frames Transmitted Successfully Frames that successfully sent. Frames Fail To Receive ACK After All Frames that failed to transmit after hitting Retries retry limit. RTS Frames Successfully Receive CTS Counts of CTS that successfully received after sending RTS frame. RTS Frames Fail To Receive CTS Counts of CTS that fail to be received after sending RTS frame. Frames Retransmitted Successfully Successfully retransmitted frames numbers. 2. Receive Statistics Items Information Frames Received Successfully Frames received successfully. Frames Received With CRC Error Frames received with CRC error. Frames Dropped Due To Frames dropped due to resource issue. Out-of-Resource Duplicate Frames Received Duplicate received frames. 3. Reset Counters: Reset counters to zero. CHAPTER IV : APPENDIX 4-1 Hardware Specification Standards:
IEEE 802.11b/g/Draft-N Interface:
USB 2.0 (USB 1.1 Compatible) Frequency Band:
2.4000 ~ 2.4835GHz (Industrial Scientific Medical Band) Data Rate:
11b: 1/2/5.5/11Mbps 11g: 6/9/12/24/36/48/54Mbps 11n (20MHz): MCS0-15, 32 with Half Guard Interval Support (up to 144Mbps) 11n (40MHz): MCS0-15, 32 with Half Guard Interval Support (up to 300Mbps) Securities:
WEP 64/128, WPA, WPA2 Cisco CCX V1.0, V2.0 & V3.0 Compliance Antenna:
Internal 2 Antennas with Two TX and Two RX Drivers:
LEDs:
Windows 2000/XP/2003/Vista Server Link/Activity Transmit Power:
16dBm 2dBm Temperature:
32~131F (0 ~ 55C) Humidity:
10-95% (NonCondensing) Certification:
FCC, CE 4-2 Troubleshooting If you encounter any problem when youre using this wireless network card, dont panic! Before you call your dealer of purchase for help, please check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself!
Scenario Solution I cant find any wireless access Click Rescan for few more times and see if you can find point / wireless device in Site any wireless access point or wireless device. Survey function. Please move closer to any known wireless access point. Ad hoc function must be enabled for the wireless device you wish to establish a direct wireless link. Please adjust the position of network card (you may have to move your computer if youre using a notebook computer) and click Rescan button for few more times. If you can find the wireless access point or wireless device you want to connect by doing this, try to move closer to the place where the wireless access point or wireless device is located. Nothing happens when I click Please make sure the wireless network card is inserted Launch config utilities into your computers USB port. If the Ralink configuration utilitys icon is black, the network card is not detected by your computer. Reboot the computer and try again. Remove the card and insert it into another USB port. Remove the driver and re-install. Contact the dealer of purchase for help. I can not establish connection 1. Click Connect for few more times. with a certain wireless access point 2. If the SSID of access point you wish to connect is hidden (nothing displayed in SSID field in Site Survey function), you have to input correct SSID of the access point you wish to connect. Please contact the owner of access point to ask for correct SSID. 3. You have to input correct passphrase / security key to connect an access point with encryption. Please contact the owner of access point to ask for correct passphrase /
security key. 4. The access point you wish to connect only allows network cards with specific MAC address to establish connection. Please go to About tab and write the value of Phy_Addess down, then present this value to the owner of access point so he / she can add the MAC address of your network card to his / her access points list. The network is slow / having Move closer to the place where access point is located. problem when transferring large Enable Wireless Protection in Advanced tab. files Try a lower TX Rate in Advanced tab. Disable Tx Burst in Advanced tab. Enable WMM in QoS tab if you need to use multimedia
/ telephony related applications. Disable WMM Power Save Enable in QoS tab. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number. Please try one or more solutions listed above. 4-3 Glossary 1. What is the IEEE 802.11g standard?
802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.11a for the 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as IEEE 802.11b. The 802.11g standard requires backward compatibility with 802.11b. The standard specifically calls for:
A new physical layer for the 802.11 Medium Access Control (MAC) in the 2.4 GHz frequency band, known as the extended rate PHY (ERP). The ERP adds OFDM as a mandatory new coding scheme for 6, 12 and 24 Mbps (mandatory speeds), and 18, 36, 48 and 54 Mbps (optional speeds). The ERP includes the modulation schemes found in 802.11b including CCK for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps. A protection mechanism called RTS/CTS that governs how 802.11g devices and 802.11b devices interoperate. 2. What is the IEEE 802.11b standard?
The IEEE 802.11b Wireless LAN standard subcommittee, which formulates the standard for the industry. The objective is to enable wireless LAN hardware from different manufactures to communicate. 3. What does IEEE 802.11 feature support?
The product supports the following IEEE 802.11 functions:
CSMA/CA plus Acknowledge Protocol Multi-Channel Roaming Automatic Rate Selection RTS/CTS Feature Fragmentation Power Management 4. What is Ad-hoc?
An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN card, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation. 5. What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID?
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. 8. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard, and the specification might be officially released by early 2003. 9. What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level. 10. Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products. Therefore, Wireless products can work with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing. 11. Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. Users can set it up depending upon their needs. 12. What is DSSS? What is FHSS? And what are their differences?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip is, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected
(ignored) by most narrowband receivers. 13. What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). 14. What is WMM?
Wi-Fi Multimedia (WMM), a group of features for wireless networks that improve the user experience for audio, video and voice applications. WMM is based on a subset of the IEEE 802.11e WLAN QoS draft standard. WMM adds prioritized capabilities to Wi-Fi networks and optimizes their performance when multiple concurring applications, each with different latency and throughput requirements, compete for network resources. By using WMM, end-user satisfaction is maintained in a wider variety of environments and traffic conditions. WMM makes it possible for home network users and enterprise network managers to decide which data streams are most important and assign them a higher traffic priority. 15. What is WMM Power Save?
WMM Power Save is a set of features for Wi-Fi networks that increase the efficiency and flexibility of data transmission in order to conserve power. WMM Power Save has been optimized for mobile devices running latency-sensitive applications such as voice, audio, or video, but can benefit any Wi-Fi device. WMM Power Save uses mechanisms included in the IEEE 802.11e standard and is an enhancement of IEEE 802.11 legacy power save. With WMM Power Save, the same amount of data can be transmitted in a shorter time while allowing the Wi-Fi device to remain longer in a low-power dozing state. 16. What is GI?
GI stands for Guard Interval. Its a measure to protect wireless devices from cross- interference. If there are two wireless devices using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability. 17. What is STBC?
STBC stands for Space-Time Block Coding, which is a technique used to transfer multiple copies of data by multiple antenna, to improve data transfer performance. By using multiple antennas, not only data transfer rate is improved, but also the wireless stability. 18. What is WPS?
WPS stands for Wi-Fi Protected Setup. It provides a simple way to establish unencrypted or encrypted connections between wireless clients and access point automatically. User can press a software or hardware button to activate WPS function, and WPS-compatible wireless clients and access point will establish connection by themselves. There are two types of WPS: PBC (Push-Button Configuration) and PIN code. 4-4 FCC and Other Compliance Statements Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment. Federal Communication Commission (FCC) Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment complies with the requirements for SAR compliance as stipulated in FCC regulations. Max. reported SAR values: 2.4GHz: 0.485 W/kg Body SAR(laptop host with and without extention cable). Channel This equipment marketed in USA is restriced by firmware to only operate on 2.4G channel 1-11. R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000. Safety This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment. EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, the Netherlands, Portugal, Spain, Sweden, and the United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and Switzerland. EU Countries Not intended for use None.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2009-01-19 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2009-01-19
|
||||
1 | Applicant's complete, legal business name |
Aceex Corporation
|
||||
1 | FCC Registration Number (FRN) |
0018400903
|
||||
1 | Physical Address |
2F, No. 2, Alley 1, Sze-Wei Lane, (ABC Fareast Industrial Park)Chung-Cheng Road
|
||||
1 |
2F, No. 2, Alley 1, Sze-Wei Lane
|
|||||
1 |
Hsintien, Taipei Hsien, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@telefication.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
IFA
|
||||
1 | Equipment Product Code |
NU22
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
J******** M******
|
||||
1 | Title |
Manager
|
||||
1 | Telephone Number |
886 2********
|
||||
1 | Fax Number |
886 2********
|
||||
1 |
j******@aceex.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Neutron Engineering, Inc.
|
||||
1 | Name |
A**** C****
|
||||
1 | Physical Address |
B1, No. 37, Lane 365, YangGang St.
|
||||
1 |
Taipei, 114
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
+886-********
|
||||
1 | Fax Number |
+886-********
|
||||
1 |
a******@neutron.com.tw
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Wireless 11n USB Adapter | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power output listed is conducted. This is a portable device. The SAR data in this filing is applicable to demonstrate compliance for body-worn operating conditions and is limited to the specific configuration tested for this filing. End-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. The Maximum measured SAR value: 0.485 W/kg (body). | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
BTL Inc.
|
||||
1 | Name |
I******** C****
|
||||
1 | Telephone Number |
+886-******** Extension:
|
||||
1 | Fax Number |
+886-********
|
||||
1 |
i******@newbtl.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412 | 2462 | 0.789 | ||||||||||||||||||||||||||||||||||||
1 | 2 | 15C | 2422 | 2452 | 0.566 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC