all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manual | photos | labels |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 |
|
03 User manual | Users Manual | 1.96 MiB | July 19 2020 | |||
1 2 3 |
|
11 Internal Photo | Internal Photos | 1.87 MiB | July 19 2020 | |||
1 2 3 |
|
10 External photos | External Photos | 1.34 MiB | July 19 2020 | |||
1 2 3 |
|
02 Label and location | ID Label/Location Info | 60.70 KiB | July 19 2020 | |||
1 2 3 |
|
02 Label and location 20200716 | ID Label/Location Info | 309.50 KiB | July 19 2020 | |||
1 2 3 |
|
01 Authorization Letter | Cover Letter(s) | 671.58 KiB | July 19 2020 | |||
1 2 3 | 04 Block Diagram 20200716 | Block Diagram | July 19 2020 | confidential | ||||
1 2 3 | 05 Schematics | Schematics | July 19 2020 | confidential | ||||
1 2 3 | 06 Operation Description 20200716 | Operational Description | July 19 2020 | confidential | ||||
1 2 3 |
|
07 FCC Request for confidentiality letter ( long term ) | Cover Letter(s) | 284.04 KiB | July 19 2020 | |||
1 2 3 |
|
08 Setup Photos | Test Setup Photos | 901.44 KiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15C BLE 20200716 | Test Report | 2.04 MiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15E & 15C Co-Location 20200716 | Test Report | 1.13 MiB | July 19 2020 | |||
1 2 3 |
|
09 Test report MPE 20200716 | RF Exposure Info | 441.36 KiB | July 19 2020 | |||
1 2 3 | 12 5G Software Security | Operational Description | July 19 2020 | confidential | ||||
1 2 3 |
|
13 Modular Approval Checklist | Cover Letter(s) | 788.87 KiB | July 19 2020 | |||
1 2 3 |
|
14 DTS UNII Declaration | Cover Letter(s) | 533.81 KiB | July 19 2020 | |||
1 2 3 |
|
Test Report 20200707 v1 - 09 Test report 15C WiFi 001 | Test Report | 2.02 MiB | July 19 2020 | |||
1 2 3 |
|
Test Report 20200707 v1 - 09 Test report 15C WiFi 002 | Test Report | 3.54 MiB | July 19 2020 | |||
1 2 3 |
|
Test Report 20200707 v1 - 09 Test report 15C WiFi 003 | Test Report | 3.06 MiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15C BT EDR | Test Report | 2.76 MiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15E DFS | Test Report | 736.91 KiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15E WiFi 01 20200717 | Test Report | 1.97 MiB | July 19 2020 | |||
1 2 3 |
|
09 Test report 15E WiFi 02 20200717 | Test Report | 5.23 MiB | July 19 2020 |
1 2 3 | 03 User manual | Users Manual | 1.96 MiB | July 19 2020 |
WNFQ-258ACN(BT) Product name802.11ac/b/g/n WiFi + Bluetooth M.2 Card Document Conventions Text Conventions bold Bold type within paragraph text indicates commands, file names, directory names, paths, output, or returned values. Example: The DK_Client package will not function unless you use the wdreg_install batch file. italic Within commands, italics indicate a variable that the user must specify. Example: mem_alloc size_in_bytes Titles of manuals or other published documents are also set in italics. Courier The Courier font indicates output or display. Example:
Menu Error:Unable to allocate memory for transfer!
The Menu character tag is used for menu items. Example: Choose Edit > Copy. Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit. Within commands, items enclosed in braces are options from which the user must choose. Within commands, the vertical bar separates options. An ellipsis indicates a repetition of the preceding parameter. The right angle bracket separates successive menu selections. Example: Start > Programs > DK > wdreg_install.
Notices NOTE: This message denotes neutral or positive information that calls out important points to the text. A note provides information that may apply only in special cases. Contents Introduction ............................................................................................................... 5 System Requirements ........................................................................................ 5 Profile Management ................................................................................................. 5 Create or Modify a Configuration Profile ....................................................... 5 Remove a Configuration Profile ....................................................................... 6 Auto Profile Selection Management ....................................................................... 6 Switching to a Different Configuration Profile ..................................................... 7 Import and Export Profiles ....................................................................................... 7 Importing a Profile ..................................................................................................... 7 Exporting a Profile ..................................................................................................... 7 TCP/IP Configuration .............................................................................................. 7 Configuring the TCP/IP Address for the network device: .................................... 7 General Tab ................................................................................................................ 8 Advanced Tab ............................................................................................................ 8 Security Tab ............................................................................................................... 9 Using EAP-TLS Security ................................................................................. 10 Using EAP-TTLS Security ............................................................................... 10 Using PEAP (EAP-GTC) Security .................................................................. 11 Using PEAP-MSCHAP V2 Security ............................................................... 12 Using LEAP Security ....................................................................................... 13 Configuring LEAP .................................................................................................... 13 Pre-Shared Encryption Keys .................................................................................. 14 Defining pre-shared encryption keys: ................................................................... 14 Overwriting an Existing Static WEP Key.............................................................. 14 Disabling Static WEP .............................................................................................. 14 Using WPA Passphrase Security .......................................................................... 15 Zero Configuration ................................................................................................. 15 Wireless Network Configuration ............................................................................ 15 Check the Status Information or Diagnostics ...................................................... 16 Current Status ................................................................................................... 16 Adapter Information Button .................................................................................. 17 Diagnostics Tab ....................................................................................................... 17 Transmitted Frames ................................................................................................ 18 Received Frames .................................................................................................... 18 Scan Available Networks ....................................................................................... 18 Connecting to a different network ......................................................................... 18 Display Settings ....................................................................................................... 20 ACU Tools ................................................................................................................ 20 Tray Icon .................................................................................................................. 21 Color .......................................................................................................................... 22 Quality ....................................................................................................................... 22 RSSI* ........................................................................................................................ 22 Ad Hoc Mode .......................................................................................................... 22 Ad Hoc Mode Profile Configuration ............................................................. 22 Infrastructure (Access Point) Mode ...................................................................... 23 Infrastructure (Access Point) Mode Profile Configuration ........................ 23 Uninstall an Old Driver ......................................................................................... 24 Additional Security Features ................................................................................. 24 Message Integrity Check (MIC) ............................................................................ 24 Bluetooth Adapter Installation and Operation ................................................... 25 Getting Started .................................................................................................. 25 Installing the Bluetooth Suite ................................................................................. 25 Downloading the Bluetooth Suite .................................................................. 25 Copying Bluetooth Suite from the CD .......................................................... 26 Launching the Bluetooth Suite .............................................................................. 29 Introduction to the Bluetooth Suite ...................................................................... 30 Menu Bar ........................................................................................................... 31 Search For Device ...................................................................................... 31 Bluetooth Configuration .......................................................................... 31 Bluetooth Help Topics .............................................................................. 31 Bluetooth Exchange Folder ...................................................................... 32 Bluetooth Places Panel..................................................................................... 32 Uninstalling the Bluetooth Suite ........................................................................... 33 Connecting to an HID Device ............................................................................... 34 Setup Requirements ................................................................................................ 34 Launching the Bluetooth Suite .............................................................................. 34 Connecting to a Sync Device ................................................................................. 37 Setup Requirements ................................................................................................ 37 Launching the Synchronization Process .............................................................. 38 Advanced Status Information ............................................................................... 41 Regulatory Compliance Notices ............................................................................... USA-Federal Communications Commission (FCC) ............................................... European Community CE Notice: ....................................................................... Taiwan NCC Radio Compliance: .............................................................................. 2.4GHz Operation ................................................................................................ Introduction The Atheros 802.11n + Bluetooth Adapter supports 802.11n and Bluetooth EDR2.0 operation. The card uses the Atheros Client Utility (ACU) which is a user-mode utility designed to edit and add profiles for selected Atheros network interface adapters. System Requirements Laptop/ PC containing:
32-bit PCI Express Bus 32 MB memory or greater 300 MHz processor or higher Profile Management Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6) Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility. Add a profile Edit a profile Import a Profile Export a Profile Order profiles Switch to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode (which uses an access point) or ad hoc mode (a group of stations participating in the wireless LAN). Create or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab. To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab. Note that the ACU only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the New button displays an error message. Remove an old profile or modify an existing profile for a new use. Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button. 2. The Auto Profile Selection Management window appears, with a list of all created profiles in the Available Profiles box. 3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto Selected Profiles box. Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box. 2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority. 3. Click OK. 4. Check the Auto Select Profiles box. 5. Save the modified configuration file. When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the adapter tries the next highest priority profile that matches the SSID, and so on. With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the adapter tries with the next highest priority profile. Switching to a Different Configuration Profile 1. To switch to a different profile, go to the Profile Management tab. 2. Click on the profile name in the Profile List. 3. Click the Activate button. The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength for that profile. Import and Export Profiles Importing a Profile 1. From the Profile Management tab, click the Import button. The Import Profile window appears. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open. The imported profile appears in the profiles list. Exporting a Profile 1. From the Profile Management tab, highlight the profile to export. 2. Click the Export button. The Export Profile window appears. 3. Browse to the directory to export the profile to. 4. Click Save. The profile is exported to the specified location. TCP/IP Configuration Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections. 2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties. 3. Select Internet Protocol (TCP/IP) and click Properties. 4. Click the radio button Use the following IP address, then enter an IP address and Subnet mask. Assigning an IP address and Subnet mask allows stations to operate in access point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click OK to finish. General Tab In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile. This name must be unique. Profile names are not case sensitive. Client Name Identifies the client machine. Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Configure up to three SSIDs (SSID1, SSID2, and SSID3). Advanced Tab In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. Edit the fields in the Advanced tab of Profile Management to configure the profile. Transmit Power Level Selects the transmit power level in mW. Actual transmit power may be limited by hardware. Power Save Mode Specify:
Maximum mode causes the access point to buffer incoming messages for the wireless adapter. The adapter periodically polls the access point to see if any messages are waiting. Normal uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. Off turns power saving off, thus powering up the wireless adapter continuously for a short message response time. Network Type Specifies the network as either infrastructure or ad hoc. 802.11b Preamble Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in the 802.11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Authentication Mode Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. Open enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. Shared only allows the adapter to associate with access points that have the same WEP key. For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the adapter should attempt to associate. Security Tab In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window. Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the General and Advanced tabs. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. The options include:
WPA/WPA2 Passphrase Enables WPA/WPA2 Passphrase security. Click on the Configure button and fill in the WPA/WPA2 Passphrase. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Note: If the Lock checkbox is checked, you cannot change any values in this profile. See your system administrator. Pre-Shared Key
(Static WEP) Enables the use of pre-shared keys that are defined on both the access point and the station. To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-
Shared Keys window. If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. None No security (not recommended). Using EAP-TLS Security To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list. The server/domain name and the login name are filled in automatically from the certificate information. Click OK. 3. Click OK. 4. Activate the profile. Using EAP-TTLS Security To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA/WPA2 radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TTLS from the drop-down menu. Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user name. 4. Click Advanced and:
OR: Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. Change the login name if needed. 5. Click OK. 6. Enable the profile. Using PEAP (EAP-GTC) Security To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-GTC) from the drop-down menu. To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. To avoid the need to log on again after resuming operation (for example, after your computer goes into standby or hibernate mode), check Always Resume the Secure Session. 3. Select the appropriate network certificate authority from the drop-down list. 4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 5. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication. 6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu. To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 5. Click OK. 6. Enable the profile. Using LEAP Security Configuring LEAP To use security In the Atheros Client Utility, access the Security tab in the Profile Management window. LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager. On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. drop-down menu. 1. Click the Configure button. 2. Specify a user name and password. Select to Use Temporary User Name and Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP user name. OR: Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process. Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use. 3. Enter the user name and password. 4. Confirm the password. 5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server. (default) OR: Enter a specific domain name. 6. If desired, check No Network Connection Unless User Is Logged In to force the wireless adapter to disassociate after logging off. 7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Pre-Shared Encryption Keys Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces). Encryption Keys Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. WEP Keys
(1-4) Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the key as the default encryption key. WEP Key Size Defines the size for each encryption key. The options include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII) 4. Click OK for the changes to take effect. Overwriting an Existing Static WEP Key 1. Click the Pre-Shared Key radio button on the Security tab. 2. Click on Configure. 3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click in the field of the existing static WEP key to overwrite. 4. Delete the asterisks in that field. 5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP To disable static WEP for a particular profile, Select any other security option on the Profile Management tab to automatically disable static WEP OR: choose None on the Security tab to disable security, and click OK (not recommended). Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. Zero Configuration This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS). Wireless Network Configuration The Windows WZCS is a service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured. To set Zero Configuration on Windows XP, take the following steps:
In Windows XP, open the Wireless Network Configuration Properties dialog box. 1. 2. Select the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles, thus users can not ( create new profiles with different settings while using Windows Zero Configuration. The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Profile Management tab of the ACU. To turn Zero Configuration off on Windows XP, take the following steps:
In Windows XP, open the Wireless Network Configuration Properties dialog box. 1. 2. Clear the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the ACU Profile Management tab. Check the Status Information or Diagnostics The Atheros client utility includes a number of tools to display current diagnostics and status information. Check current status Check driver information Check receive and transmit diagnostics Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Current Status screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the General tab. Link Status Shows whether the station is associated to the wireless network. Wireless Mode Displays the wireless mode. Configure the wireless mode on the Advanced tab. IP Address Displays the computer's IP address. Network Type The type of network the station is connected to. Options include:
Infrastructure (access point) Ad Hoc Configure the network type on the Advanced tab. Current Channel Shows the currently connected channel. Server Based Authentication Shows whether server based authentication is used. Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Signal Strength Shows the strength of the signal. Click the Advanced button to see the advanced status diagnostics. Adapter Information Button The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name Name of the wireless network adapter. MAC Address MAC address of the wireless network adapter. Driver Driver name and path of the wireless network adapter driver. Driver Version Version of the wireless network adapter driver. Driver Date Creation date of the wireless network adapter driver. Client Name Name of the client computer. Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The Diagnostics tab does not require any configuration. It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received Broadcast packets transmitted and received Unicast packets transmitted and received Total bytes transmitted and received The Adapter Information button has general information about the wireless network adapter and NDIS driver. The Advanced Statistics button to shows statistics for diagnostics for frames received by or transmitted to the wireless network adapter:
Transmitted Frames Received Frames Frames transmitted OK Frames retried Frames dropped No ACK frames ACK frames RTS frames Clear-to-send (CTS) frames No CTS frames Retried RTS frames Retried data frames Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile for that network. Infrastructure
(AP) Network Connected Infrastructure
(AP) Network Ad Hoc Network Connected Ad Hoc Network Encryption Active Display Settings To change the display settings, choose Options > Display Settings from the menu. The display settings dialog box contains tools to set the:
Signal Strength Display Units Sets the units used when displaying signal strength: percentage (%) or dBm. Refresh Interval Use the up/down arrows to set the display refresh interval in seconds. Data Display Sets the display to cumulative or relative:
Relative displays the change in statistical data since the last update. Cumulative displays statistical data collected since opening the profile. ACU Tools Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio Enable or disable the RF Signal on all Atheros station reference designs. Enable/Disable Tray Icon Enable or disable the tray icon. Troubleshooting Run the optional Troubleshooting Utility. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Atheros Client Utility application. Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address. Right-click on the tray icon to:
Help Open the online help. Open Atheros Client Utility Launch the Atheros Client Utility (ACU). Use the ACU to configure a profile or view status and statistics information. Troubleshooting Run the Troubleshooting Utility. Preferences Set the ACU startup and menu options. Check to start the program automatically when Windows starts, and check menu items that should appear on the popup menu. Enable/Disable Radio Enable or disable the RF signal. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to the access point. Select Profile Click a configuration profile name to switch to. If no configuration profile exists for a connection, add a profile. Show Connection Status This window displays connection information:
Active Profile Displays the active configuration profile name. Auto Profile Selection Shows whether auto profile selection is enabled. Connection Status Displays whether the adapter is connected to a wireless network. Link Quality Lists the quality of the link connection. SSID Displays the SSID of the associated network. Access Point Name Shows the name of the AP the wireless adapter is connected to. Access Point IP Address Shows the IP address of the access point the wireless adapter is connected to. Link Speed Lists the speed of the link connection. Adapter IP Address Displays the IP address of the wireless adapter. Exit Exit the Atheros Client Utility application. The colors are defined as follows:
Color Green Green Yellow Red Gray Quality Excellent Good Poor Poor RSSI*
20 dB +
10-20 dB +
5-10 dB
< 5 dB No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage. Enable or disable the tray icon in the Action menu. Ad Hoc Mode In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP). To connect to an ad hoc network, configure the profile for ad hoc mode. Ad Hoc operation may be limited by Hardware to meet regulatory requirements. Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab) Transmit Power Level 802.11b Preamble (if using 802.11b) Wireless Mode When Starting an Ad Hoc Network Make sure to also edit the General and Security tabs. Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here. To connect to an access point network, configure the profile for access point mode. Infrastructure (Access Point) Mode Profile Configuration To configure a profile in infrastructure (access point) mode, change the Network Type in the Advanced tab. For access point mode, modify the settings:
Power Save Mode 802.11b Preamble (if using 802.11b) Wireless Mode 802.11 Authentication Mode Make sure to also edit the General and Security tabs. Uninstall an Old Driver Uninstall an old driver before upgrading to a new NDIS driver release. To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4. 1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros AR500x Wireless Network Adapter, and choose Uninstall. 2. Click OK to uninstall the device. 3. When the device is uninstalled from Device Manager, search for and delete the driver files that reside in the system. a. Go to the Start menu and choose Search > For Files or Folders. b. Enter oem*.inf in the Search for files or folders named: field, and enter Atheros in the Containing text: field. c. Click Search Now. A few files matching these criteria are possible, if previous drivers have not been removed properly. d. Choose the files that have been found and delete them from the system. 4. To complete the uninstallation, remove the file ar5211.sys from the folder
\WINNT\system32\drivers. Additional Security Features These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point. Message Integrity Check (MIC) MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering. Temporal Key Integrity Protocol (TKIP) This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys. Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. Getting Started Bluetooth Adapter Installation and Operation This chapter describes how to install, uninstall, launch, and use the Bluetooth Suite. The following major topics are covered in this chapter:
Installing the Bluetooth Suite Launching the Bluetooth Suite Introduction to the Bluetooth Suite Uninstalling the Bluetooth Suite Installing the Bluetooth Suite You either received a password from Atheros to download the Bluetooth Suite software from the Atheros web site or received the Bluetooth Suite on a CD. NOTE: If you are installing Bluetooth Suite on a machine that already has an existing Bluetooth Suite, you need not uninstall it because Bluetooth Suite supports the upgrade feature. If you need to uninstall Bluetooth Suite, refer to Uninstalling the Bluetooth Suite on page 2-10 on how to uninstall Bluetooth Suite. Software installation is a three-step process and it is important to perform these steps before you can use the Bluetooth Suite:
Installing the Bluetooth Suite Installing the radio (profile) drivers 1. 2. 3. Updating the drivers All these steps are explained in the installation process. Downloading the Bluetooth Suite Go to the Atheros Support web site: https://support.atheros.com/
Login to the web site using your user name and password provided by Atheros Support. Go to the AR3011 Software Package & Documentation tab of the Atheros web site. Download the appropriate Bluetooth Suite release, extract the files, and save them on your system. 6. Install the Bluetooth Suite by double-clicking on the Bluetooth Suite setup.exe file. 1. 2. 3. 4. 7. Follow the rest of the installation procedure described in Copying Bluetooth Suite from the CD on page 2-2. Copying Bluetooth Suite from the CD 1. Insert the CD containing the Bluetooth Suite into the CD drive. 2. Double Click on the Bluetooth Suite setup.exe file. The InstallShield Wizard starts to prepare the package for installation. The Welcome to InstallShield Wizard for Bluetooth Suite screen (see Figure 2-1) is displayed. Figure 2-1. Bluetooth Suite - Welcome Screen 3. Click Next. You will see the Customer Information screen. See Figure 2-2. Figure 2-2. Bluetooth Suite Customer Information Screen 4. Enter the user name and company name and choose the intended user of this application
- Anyone who uses this computer (all users) or Only for me and click Next. You will see Choose Destination Location screen. See Figure 2-3. Figure 2-3. Bluetooth Suite Choose Destination Location 5. The default destination location is already selected. Click Change to browse to a different destination. 6. Click Next. You will see Start Copying Files screen that displays the current settings including user information, setup type, and destination directory. This allows you to review and modify the setup information. See Figure 2-4. Figure 2-4. Bluetooth Suite - Start Copying Screen 7. Click Next. The Bluetooth Suite begins to configure and copy the new software. It also removes any backup files. When the Bluetooth Suite installation is complete, you will see the Finish screen. See Figure 2-5. Figure 2-5. Bluetooth Suite - Installation Setup Status 8. When prompted to restart your computer, select Yes, I want to restart my computer now option and click Finish. Figure 2-6. Bluetooth Suite - Finishing the Installation The installation is complete. This process creates a Launch Bluetooth Suite shortcut on your desktop. Now you are ready to run Bluetooth Suite. Launching the Bluetooth Suite 1. Insert the Bluetooth Suite USB device into the USB port of your system. NOTE: You can insert the Bluetooth Suite USB device in any USB port. You might see Found New Hardware message. 2. Double click on the Bluetooth Suite icon on your desktop or choose start > All Programs > Bluetooth Suite > Launch Bluetooth Suite. It displays the blank Atheros Bluetooth Suite screen. NOTE: If no Bluetooth devices are found within range, it is normal for new installation. Bluetooth Suite screen does not display such devices when launched for the first time. You need to click on the Discovery button the top left panel of the window to see all the Bluetooth devices in range. See Figure 2-7. Figure 2-7. Bluetooth Suite Startup Screen During Discovery When the Bluetooth Suite finds devices in range, it displays them. See Figure 2-8. Figure 2-8. Discovered Bluetooth Devices NOTE: Trusted remote devices will show Paired status in Device list, and Connected remote devices will show Connected status in Device list. Other devices will display Inrange status. Introduction to the Bluetooth Suite Now that you have successfully launched the Bluetooth Suite, spend few minutes in getting to know your Bluetooth Suite. The following few pages explain various features and components associated with the Bluetooth Suite GUI. The My Bluetooth Suite is the main screen that consists of three major parts:
Menu bar Bluetooth Tasks area Bluetooth devices along with their IP addresses and types are displayed on the right panel. In addition, there is a Bluetooth Suite Tray which allows you to launch the Bluetooth Suite. Menu Bar Bluetooth menu is the primary menu on the Bluetooth Suite screen. The options associated with this menu are:
Search for Device Bluetooth Configuration Bluetooth Help Topics Bluetooth Exchange Folder About Bluetooth NOTE: Some of these functions are available from the Bluetooth Suite Tray. These options are described below in detail. Clicking this button begins to search for remote Bluetooth devices in range. Found devices will display in right panel. Search For Device Bluetooth Configuration Clicking on the Configuration menu option displays the Bluetooth Suite Configuration screen which allows you to specify Bluetooth Suite tasks and settings associated with Bluetooth device recovery and device filters. This function is also available through the toolbar. Nine configuration screens are associated with Bluetooth Suite. Those screens are:
Bluetooth Suite Settings Local Device Bluetooth Security Profile Manager Shared Folders Object Push Audio Basic Imaging Personal Area Networking Fax Server Configuration Sync These options are described in detail in Chapter 3. Bluetooth Help Topics Click this button to display any help topics. Bluetooth Exchange Folder Clicking this button to display the content of Bluetooth exchange folder. From Bluetooth Suite window, choose Bluetooth->Bluetooth Exchange Folder to access Exchange share folder for Object Push feature. Bluetooth Places Panel When you launch the Bluetooth Suite, various Bluetooth devices in the Bluetooth neighborhood are listed on the right panel. These typically consist of audio devices, computers (both laptop and desktop), phones, peripheral devices such as Fax, printer, mouse, headset, and imaging devices. If any of these devices are discovered, they are listed on the right window panel. For example, if a Bluetooth mouse is discovered in the Bluetooth neighborhood, it is shown as peripheral pointing device, its brand name, address, and service status (in range, paired, connected or disconnected). You can select a device and right mouse click button to select the following:
Name discovery Delete Pair Service Discovery Properties See Figure 2-9 for details. Figure 2-9. Bluetooth Places Device Options Uninstalling the Bluetooth Suite Anytime you install a new version of Bluetooth Suite, you need to uninstall any existing version of the Bluetooth Suite. Follow this procedure to uninstall the Bluetooth Suite. 1. Make sure the Bluetooth dongle is removed from any system USB port. 2. Choose start > All Programs > Bluetooth Suite > Uninstall Bluetooth Suite. The system prepares for uninstallation. A screen is briefly displayed that shows that it is ready to uninstall the program. You will see another screen that prompts you to completely remove the application and all of its features. See Figure 2-10. Figure 2-10. Bluetooth Suite Uninstallation Prompt 3. Click Yes. You will see a Setup Status screen showing that application is being removed followed by another screen showing Uninstall Complete. See Figure 2-11. Figure 2-11. Finishing Bluetooth Suite Uninstallation 4. Click Yes, I want to restart my computer now. 5. Click Finish. The uninstall is complete. You are ready to reinstall the Bluetooth Suite. Connecting to an HID Device This chapter describes how to connect the Bluetooth laptop to a Bluetooth HID (Human Interface Device) such as a mouse. Setup Requirements You need the following devices and equipment in order to accomplish this task:
A PC system running Windows with Bluetooth Suite Atheros Bluetooth USB Adapter (dongle) Bluetooth mouse with batteries or keyboard Launching the Bluetooth Suite 1. Double click on the Launch Bluetooth Suite icon on your desktop or launch it from start > All Programs > Bluetooth Suite > Launch Bluetooth Suite. It displays theBluetooth Suite start-up screen. See Figure 4-1. 2. Put your mouse in searchable (pairing mode) by doing the following:
a. Turn On the mouse by pressing down its power On/Off button. Refer to the mouse documentation on how to do it. b. Press the connect button on the mouse to put it in pairing
(discoverable) mode. Refer to the mouse documentation for additional information. 3. Right mouse click on the Bluetooth Suite Tray, and choose My Bluetooth Place option. It displays all the peripheral devices in the right panel of the screen indicating that these devices are in range and available to be connected. It also shows the device name, address, type and status (in range, paired, or connected). Figure 4-1. Bluetooth Places Screen 4. Make sure the device that you wish to pair or connect is powered up and in discoverable mode. If it is in range and has previously been paired, turning on the device will automatically pair it. 5. Right click on the mouse and choose Pair. It displays the Bluetooth Pairing Passcode screen. See Figure 4-2. Figure 4-2. Entering Bluetooth Pairing Passcode 6. Enter a passcode to pair with the remote device and click OK. NOTE: The default code shown is 0000. Refer to the documentation of your mouse to find out the passcode of your device and how to change it. 7. Highlight the mouse device under Peripheral Devices in the left panel and choose Service Discovery. Highlight the device. Using your laptop pointing device, right click on the Human Interface Device service and choose the Connect option to connect to the mouse. Figure 4-3. Connecting the Mouse 8. Right click the Connect button. 9. You will be prompted to make sure the device is in discoverable mode. Make sure the device in ON and in connectable mode. See Figure 4-4. Figure 4-4. Putting Device in Connectable Mode 10. Click OK. You will notice that the Wizard begins to install software for the HID device. As soon as the installation is complete, the screen disappears. Its service status of the HID changes from Disconnected to Connected. Your mouse is now connected and ready to use. You can perform normal mouse functions using this mouse. Connecting to a Sync Device This chapter describes how to connect a Bluetooth laptop to a Bluetooth device that supports Synchronization profile. The following topics are covered in this chapter:
Setup Requirements Launching the Synchronization Process Setup Requirements You need the following devices and equipment in order to accomplish this task:
A laptop system running Windows XP with Bluetooth Suite Bluetooth USB Adapter A Bluetooth device such as an e-mail tool and calendar that supports sync profile Launching the Synchronization Process 1. Launch the Bluetooth Suite. 2. Choose My Bluetooth Place from the Bluetooth tray on your desktop. It displays the My Bluetooth Place start-up screen. 3. Right mouse click the blank panel and choose Device Discovery option. See Figure 10-1. Figure 10-1. Bluetooth Suite Discovery Screen 4. Highlight the device that you wish to sync with and pair it. See Figure 10-2. Figure 10-2. Pairing the Device for Syncing 5. Right mouse click on the desired bluetooth device and select the Pair option. 6. Enter the pairing code (0000) to pair it and click OK. See Figure 10-3. Figure 10-3. Bluetooth Devices Pairing 7. You will see the passcode prompt. Enter the passcode (default is 0000) for the selected device and click OK. NOTE: The default code shown is 0000. Refer to the documentation of your device to find out the passcode of your device and how to change it. 8. Right click the SYNC icon on My Bluetooth Place under the specified device screen and choose Synchronization option. See Figure 10-4. Figure 10-4. Bluetooth Synchronization It displays the Sync screen which allows you to specify sync parameters for both client and server. See Figure 10-5. Figure 10-5. Selecting Items to Synchronize 9. Select the Sync items under the server and client that you wish to synchronize and click OK. The selected items will be synchronized. Advanced Status Information Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen. Network Name (SSID) Displays the wireless network name. Configure the network name on the General tab. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Authentication Type Displays the authentication mode. Configure the authentication mode on the General tab. Message Integrity Check Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets. Associated AP Name Displays the name of the access point the wireless adapter is associated to. Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to. Associated AP MAC Address Displays the MAC address of the access point the wireless adapter is associated to. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. Configure the power save mode on the Advanced tab. Current Power Level Displays the transmit power level rate in mW. Current Signal Strength Shows the current signal strength in dBm. Current Noise Level Displays the current noise level in dBm. Up Time Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds. 802.11b Preamble Displays the 802.11b preamble format. Configure the preamble format on the Advanced tab. Current Receive Rate Shows the current receive rate in Mbps. Current Transmit Rate Displays the current transmit rate in Mbps. Channel Shows the currently connected channel. Frequency Displays frequency the station is using. Channel Set Shows the current channel set. Federal Communication Commission Interference Statement:
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Any changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. RF exposure statements This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body or nearby persons. CFR 47 FCC PART 15 SUBPART C (15.247) and SUBPART E (15.407) has been investigated. It is applicable to the modular transmitter. The devices must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. We will retain control over the final installation of the modular such that compliance of the end product is assured. In such cases, an operating condition on the limit modular approval for the module must be only approved for use when installed in devices produced by a specific manufacturer. If any hardware modify or RF control software modify will be made by host manufacturer,C2PC or new certificate should be apply to get approval,if those change and modification made by host manufacturer not expressly approved by the party responsible for compliance ,then it is illegal. This radio transmitter 2AVP7-K3V1 has been approved by Federal Communications Commission to operate with the antenna types listed below, with the maximum permissible gain indicated. Antenna types not included in this list that have a gain greater than the maximum gain indicated for any type listed are strictly prohibited for use with this device. Unique antenna connector (IPEX) must be used on the Part 15 authorized transmitters used in the host product. Gain (dBi) Remark Antenna Type PIFA PIFA Antenna Model 1000423 1000423 2.4 GHz 0.6 dBi 0.6 dBi 5GHz 4.5 dBi 4.5 dBi With 130 mm cable With 60mm cable If the FCC identification number is not visible when the module is installed inside another device, then the outside of the device into which the module is installed must also display a label referring to the enclosed module. This exterior label can use wording such as the following: Contains Transmitter Module FCC ID: 2AVP7-K3V1 Or Contains FCC ID: 2AVP7-K3V1 Any company of the host device which install this modular with limit modular approval should perform the test of radiated & conducted emission and spurious emission,etc. according to FCC part 15C : 15.247 and15.209 & 15.207 ,15B Class B and 15.407 Subpart E requirement, Only if the test result comply with FCC part 15C :
15.247 and 15.209 &15.207 ,15B Class B requirementthen the host can be sold legally. USA Local Representative:
Company Name Company Addr Website Bizerba USA Inc. 1804 Fashion Court, Joppa, MD 21085, USA http://www.bizerba.com Industry Canada statement:
This device complies with Industry Canada license-exempt RSSs. Operation is subject to the following two conditions:
1) This device may not cause interference, and 2) This device must accept any interference, including interference that may cause undesired operation of the device. Le prsent appareil est conforme aux CNR dIndustrie Canada applicables aux appareils radio exempts de licence. Lexploitation est autorise aux deux conditions suivantes :
1) lappareil ne doit pas produire de brouillage;
2) lutilisateur de lappareil doit accepter tout brouillage radiolectrique subi, meme si le brouillage est susceptible den compromettre le fonctionnement. Caution:
1) The device for operation in the band 51505250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems;
2) For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the bands 5250-5350 MHz and 5470-5725 MHz shall be such that the equipment still complies with the e.i.r.p. limit;
3) For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the band 5725-5850 MHz shall be such that the equipment still complies with the e.i.r.p. limits specified for point-to-point and non-point-to-point operation as appropriate; and Avertissement:
1) Le dispositif fonctionnant dans la bande 5150-5250 MHz est rserv uniquement pour une utilisation lintrieur afin de rduire les risques de brouillage prjudiciable aux systmes de satellites mobiles utilisant les mmes canaux;
2) Le gain maximal dantenne permis pour les dispositifs avec antenne(s) amovible(s) utilisant les bandes 5250-5350 MHz et 5470-5725 MHz doit se conformer la imitation P.I.R.E.;
3) Le gain maximal dantenne permis pour les dispositifs avec antenne(s) amovible(s) utilisant la bande 5725-5850 MHz doit se conformer la limitation P.I.R.E spcifie pour lexploitation point point et non point point, selon le cas. Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Dclaration dexposition aux radiations:
Cet quipement est conforme aux limites dexposition aux rayonnements IC tablies pour un environnement non contrl. Cet quipement doit tre install et utilis avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. This radio transmitter (IC: 26042-K3V1 has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device. Le prsent metteur radio (IC: 26042-K3V1 a t approuv par Industrie Canada pour fonctionner avec les types d'antenne numrs cidessous et ayant un gain admissible maximal. Les types d'antenne non inclus dans cette liste, et dont le gain est suprieur au gain maximal indiqu, sont strictement interdits pour l'exploitation de l'metteur. Antenna Type PIFA PIFA Antenna Model 1000423 1000423 2.4 GHz 0.6 dBi 0.6 dBi 5GHz 4.5 dBi 4.5 dBi Gain (dBi) Remark With 130 mm cable With 60mm cable If the ISED certification number is not visible when the module is installed inside another device, then the outside of the device into which the module is installed must also display a label referring to the enclosed module. This exterior label can use wording such as the following: Contains IC: 26042-K3V1. Si le numro de certification ISDE n'est pas visible lorsque le module est install l'intrieur d'un autre appareil, alors l'extrieur de l'appareil dans lequel le module est install doit galement afficher une tiquette faisant rfrence au module inclus. Cette tiquette extrieure peut utiliser un libell comme celui-ci: Contient IC:
26042-K3V1. Le produit final doit tre tiquet dans un endroit visible avec l'inscription suivante:
Plaque signaltique du produit final:
"Contient des IC: 26042-K3V1". Manual Information To the End User:
The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the users manual of the end product which integrates this module. The end user manual shall include all required regulatory information/warning as show in this manual. Manuel d'information l'utilisateur final L'intgrateur OEM doit tre conscient de ne pas fournir des informations l'utilisateur final quant la faon d'installer ou de supprimer ce module RF dans le manuel de l'utilisateur du produit final qui intgre ce module. Le manuel de l'utilisateur final doit inclure toutes les informations rglementaires requises et avertissements comme indiqu dans ce manue Must use the device only in host devices that meet the FCC/ISED RF exposure category of mobile, which means the device is installed and used at distances of at least 20cm from persons. The end user manual shall include FCC Part 15 /ISED RSS GEN compliance statements related to the transmitter as show in this manual. Host manufacturer is responsible for compliance of the host system with module installed with all other applicable requirements for the system such as Part 15 B, ICES Host manufacturer is strongly recommended to confirm compliance with FCC/ISED requirements for the transmitter when the module is installed in the host. Must have on the host device a label showing Contains FCC ID: 2AVP7-K3V1, Contains The use condition limitations extend to professional users, then instructions must state that this information also extends to the host manufacturers instruction 003. IC: 26042-K3V1 manual. If the end product will involve the Multiple simultaneously transmitting condition or different operational conditions for a stand-alone modular transmitter in a host, host manufacturer have to consult with module manufacturer for the installation method in end system. l'hte doit utiliser l'instrument uniquement dans des dispositifs qui rpondent la fcc / (catgorie d'exposition rf mobile, ce qui signifie le dispositif est install et utilis une distance d'au moins 20 cm de personnes. le manuel de l'utilisateur final doit inclure la partie 15 / (fac rss gen dclarations de conformit relatives l'metteur que de montrer dans ce manuel. le fabricant est responsable de la conformit de l'hte, le systme d'accueil avec le module install avec toutes les autres exigences applicables du systme comme la partie 15 b, ices - 003. accueillir le fabricant est fortement recommand de confirmer la conformit avec les exigences de la fcc / (metteur lorsque le module est install dans l'hte. K3V1 contient IC : 26042-K3V1 le dispositif d'accueil doivent avoir une tiquette indiquant contient FCC ID: 2AVP7-
1 2 3 | 01 Authorization Letter | Cover Letter(s) | 671.58 KiB | July 19 2020 |
Bizerba SE & Co. KG Wilhelm-Kraut-Strafe 65, 72336 Balingen, Germany Date: 2020/06/01 Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 To whom it may concern:
I, the undersigned, hereby authorize Underwriters Laboratories Taiwan Co., Ltd. to act on our behalf in all manners relating to application for equipment authorization, including signing of all documents relating to these matters. Any and all acts carried out by Underwriters Laboratories Taiwan Co., Ltd. on our behalf shall have the same effect as acts of our own. I, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). In authorizing Underwriters Laboratories Taiwan Co., Ltd. as our representative, we still recognize that we are responsible to:
a) b) comply with the relevant provisions of the certification program;
make all necessary arrangements for the conduct of the evaluation, including provision for examining documentation and access to all areas, records (including internal audit reports) and personnel for the purposes of evaluation (e.g. testing, inspection, assessment, surveillance, reassessment) and resolution of complaints;
Make claims regarding certification only in respect of the scope for which certification has been granted;
Do not use our product certification in such a manner as to bring the Certification Division into disrepute and not make any statement regarding our product certification which the Certification Division may consider misleading or unauthorized;
Upon suspension or cancellation of certification, discontinue use of all advertising matter that contains any reference thereto and return any certification documents as required by the Certification Division;
Use certification only to indicate the products are certified as being in conformity with specified standards;
g) h) a) k) Endeavor to ensure that no certificate or report nor any part thereof is used in a misleading manner;
ensure that any reference to our product certification in communication media such as documents, brochures or advertising, complies with the requirements of the Certification Division;
keep a record of all complaints made known to us relating to the products compliance with requirements of the relevant standard and to make these records available to the when requested;
take appropriate action with respect to such complaints and any deficiencies found in products or services that affect compliance with the requirements for certification;
Document the actions taken. This authorization is valid until further written notice from the applicant. Sincerely Yours, Signed by:
i, i/ D he, Sven n'y Company Name: Bizerba SE & Co. KG Contact Name: Peter Straubinger Tel: +49 7433 12 2811 Fax: +49 7433 12 52811 Email: peter.straubinger@bizerba.com Address: Wilhelm-Kraut-Strabe 65, 72336 Balingen. Germany
1 2 3 | 07 FCC Request for confidentiality letter ( long term ) | Cover Letter(s) | 284.04 KiB | July 19 2020 |
Bizerba SE & Co. KG Wilhelm-Kraut-StraBe 65, 72336 Balingen, Germany Date: 2020/06/01 Federal Communications Commission Office of Engineering and Technology Laboratory Division 7435 Oakland Mills Rd. Columbia MD 21046 Subject: Request for Confidentiality FCC ID: 2AVP7-K3VI To whom it may concern:
Pursuant to the provisions of Sections 0.457 and 0.459 of the Commissions rules (47 CFR 0.457, 0.459), Apple Inc. hereby requests confidential treatment for documents filed with the Commission in connection with the application for equipment authorization referenced above. Permanent Confidentiality e Schematics Diagrams e Block Diagram e Operation Description Above mentioned document contains detailed system and equipment description are considered as proprietary information in operation of the equipment. The public disclosure of above documents might be harmful to our company and would give competitor an unfair advantage in the market. Sincerely, fix UV f hes Cen ie Company Name: Bizerba SE & Co. KG Contact Name: Peter Straubinger Title of Person:
Tel: +49 7433 12 2811 Fax: +49 7433 12 52811 Email: peter.straubinger@bizerba.com v1.0
1 2 3 | 13 Modular Approval Checklist | Cover Letter(s) | 788.87 KiB | July 19 2020 |
Bizerba SE & Co. KG Date: 2020/06/01 FCC ID: 2AVP7-K3V1 To the certification reviewer:
We are hereby applying for full modular approval of the above-referenced FCC ID, based on compliance with all of the criteria as detailed below The requirements of Section 15.212 have been met and shown on the following statements EUT Conditions Requirements The radio elements of the modular transmitter must have their own shielding. The physical crystal and tuning capacitors may be located external to the shielded radio elements. The modular transmitter must have buffered modulation/data inputs (if such inputs are provided) to ensure that the module will comply with Part 15 requirements under conditions of excessive data rates or over-modulation. No. the holes in the Metal shielding is larger than the wavelength of the radiation. Refer to the external photos. Yes, all inputs to the modules has buffered data inputs. it is integrated in chip QCAGI74A. Yes, power supply regulation built into module, it is integrated in chip QCAGI74A. Refer to the circuit diagram. The modular transmitter must have its own power supply regulation.. The modular transmitter must comply with the antenna and transmission system requirements of Sections 15.203, 15.204(b) and 15.204(c). The antenna must either be permanently attached or employ a unique antenna coupler (at all connections between the module and the antenna, including the cable). The professional installation provision of Section 15.203 is not applicable to modules but can apply to limited modular approvals under paragraph
(b) of this section. Yes. connector is unique. Refer to test report and operation description. Requirements EUT Conditions The modular transmitter must be tested in a stand-
alone configuration, i.e., the module must not be inside another device during testing for compliance with Part 15 requirements. Unless the transmitter module will be battery powered, it must comply with the AC line conducted requirements found in Section 15.207. AC or DC power lines and data input/output lines connected to the module must not contain ferrites,
: : No. the module has been tested with unless they will be marketed with the module (see . : . Section 15.27(a)). The length of these lines shall be a eee ve See bee hncy the length typical of actual use or, if that length is nie me of Oh Ra). REIET TO INE 188
. report and setup photo. unknown, at least 10 centimeters to insure that there is no coupling between the case of the module and supporting equipment. Any accessories, peripherals, or support equipment connected to the module during testing shall be unmodified and commercially available
(see Section 15.31@)). The modular transmitter must be equipped with either a | Yes. label is to be placed on front of the 6 permanently affixed label or must be capable of module, and also in the Users Manual, electronically displaying its FCC identification number. | there are instructions give to the OEM If the FCC ID is not visible when the module is installed | on how to label the end product. inside another debice, then the outside of the device into | Refer to the FCC ID label format which the module is installed must also display alabel | and Users Manual. referring to the enclosed module. 7 The modular transmitter must comply with any specific rules or operating requirements that ordinarily apply to a complete transmitter and the manufacturer must provide adequate instructions along with the module to explain any such requirements. A copy of Yes. Refer to the User manual. these instructions must be included in the application for _{ equipment authorization. The modular transmitter must comply with any 8 applicable RF exposure requirements in its final configuration. Yes. it complies with RF exposure requirement. Refer to the test report. Signed by:
iV. Pelee Company name: Bizerba SE & Co. KG Name : Peter Straubinger Tel: +49 7433 12 2811 Fax: +49 7433 12 52811 E-mail: peter.straubinger(@bizerba.com Address: Wilhelm-Kraut-StraBe 65, 72336 Balingen, Germany
1 2 3 | 14 DTS UNII Declaration | Cover Letter(s) | 533.81 KiB | July 19 2020 |
Bizerba SE & Co. KG Wilhelm-Kraut-StraBe 65, 72336 Balingen, Germany Date: 2020/06/01 DTS-UNII Device Declaration Letter To whom it may concern :
We have declared below featured for FCC equipment authorization, Device FCC ID : 2AVP7-K3V1 IC: 26042-K3V1
(1) DFSDevice-- [J Master , [J Client with Radar detection capability , X] Client without radar detection capability, [] N/A
(2) Active / Passive Scanning , adhoc mode access point capability Frequency Band Active Scanning passive scanning Ad Hoc Mode or Access point
(MHz) (the device can transmit | (where the device is can WIFI Direct capability a probe (beacon)) listen only with no capability 5150-5250 XI Yes, L] No 5250-5350 5470-5725 5725-5850
(3) Country code selection ability- [] Yes, DX] No If yes, pls explain how it was implemented : (pls also help to provide detail of options for each country selection)
(4) Meet 15.202 requirement - [KX] Yes, L] No, pls check below :
JA master device is defined as a device operating in a mode in which it has the capability to transmit without receiving an enabling signal. In this mode it is able to select a channel and initiate a network by sending enabling signals to other devices EXIA client device is defined as a device operating in a mode in which the transmissions of the device are under control of the master. A device in client mode is not able to initiate a network.
(5) For client devices that have software configuration control to operate in different modes (active scanning in some and passive scanning in others) in different bands (devices with multiple equipment classes or those that operate on non-DFS frequencies) or modular devices which configure the modes of operations through software, the application must provide software and operations description on how the software and
/ or hardware is implemented to ensure that proper operations modes can not be modified by end user or an installer.
&X] Apply, [] NoApply, (If apply , pls help to provide explanation on it was implement , and how software was controlled) Factory set only. Signed by:
Company Name: Bizerba SE & Co. KG Contact Name: Peter Straubinger Tel: +49 7433 12 2811 Fax: +49 7433 12 52811 Email: peter.straubinger@bizerba.com Address: Wilhelm-Kraut-Strabe 65, 72336 Balingen, Germany
1 2 3 | Test Report 20200707 v1 - 09 Test report 15C WiFi 001 | Test Report | 2.02 MiB | July 19 2020 |
1 2 3 | Test Report 20200707 v1 - 09 Test report 15C WiFi 002 | Test Report | 3.54 MiB | July 19 2020 |
1 2 3 | Test Report 20200707 v1 - 09 Test report 15C WiFi 003 | Test Report | 3.06 MiB | July 19 2020 |
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2020-07-19 | 2412 ~ 2472 | DTS - Digital Transmission System | Original Equipment |
2 | 2402 ~ 2480 | DSS - Part 15 Spread Spectrum Transmitter | ||
3 | 5745 ~ 5825 | NII - Unlicensed National Information Infrastructure TX |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 | Effective |
2020-07-19
|
||||
1 2 3 | Applicant's complete, legal business name |
Bizerba SE & Co. KG
|
||||
1 2 3 | FCC Registration Number (FRN) |
0029220084
|
||||
1 2 3 | Physical Address |
Wilhelm-Kraut Str. 65
|
||||
1 2 3 |
Balingen, N/A
|
|||||
1 2 3 |
Germany
|
|||||
app s | TCB Information | |||||
1 2 3 | TCB Application Email Address |
L******@ul.com
|
||||
1 2 3 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 3 | Grantee Code |
2AVP7
|
||||
1 2 3 | Equipment Product Code |
K3V1
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 | Name |
P**** S******
|
||||
1 2 3 | Title |
Head of Testlab
|
||||
1 2 3 | Telephone Number |
+4974******** Extension:
|
||||
1 2 3 | Fax Number |
+4974********
|
||||
1 2 3 |
p******@bizerba.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 3 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 | DSS - Part 15 Spread Spectrum Transmitter | |||||
1 2 3 | NII - Unlicensed National Information Infrastructure TX | |||||
1 2 3 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11ac/b/g/n WiFi + Bluetooth M.2 Card | ||||
1 2 3 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 | Modular Equipment Type | Limited Single Modular Approval | ||||
1 2 3 | Purpose / Application is for | Original Equipment | ||||
1 2 3 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 | Grant Comments | Limited modular approval, installation of this module is limited to the host system described in this filing. Other host systems may be added through permissive change procedures through coordination with the module grantee. Power is conducted. This device has 20 MHz and 40 MHz bandwidth modes. The antenna(s) used for this transmitter must provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 2 3 | Limited modular approval, installation of this module is limited to the host system described in this filing. Other host systems may be added through permissive change procedures through coordination with the module grantee. Power is conducted. The antenna(s) used for this transmitter must provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. | |||||
1 2 3 | Limited modular approval, installation of this module is limited to the host system described in this filing. Other host systems may be added through permissive change procedures through coordination with the module grantee. Power is conducted. This device has 20 MHz, 40 MHz and 80 MHz bandwidth modes. The antenna(s) used for this transmitter must provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. | |||||
1 2 3 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 | Firm Name |
Underwriters Laboratories Taiwan Co., Ltd.
|
||||
1 2 3 | Name |
R****** C********
|
||||
1 2 3 | Telephone Number |
+886-******** Extension:
|
||||
1 2 3 | Fax Number |
+886-********
|
||||
1 2 3 |
R******@ul.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2402 | 2480 | 0.0015 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC MO | 2412 | 2472 | 0.498 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 2402.00000000 | 2480.00000000 | 0.0052000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15E | CC MO | 5180 | 5240 | 0.048 | |||||||||||||||||||||||||||||||||||
3 | 2 | 15E | CC MO | 5260 | 5320 | 0.072 | |||||||||||||||||||||||||||||||||||
3 | 3 | 15E | CC MO | 5500 | 5720 | 0.076 | |||||||||||||||||||||||||||||||||||
3 | 4 | 15E | CC MO | 5745 | 5825 | 0.072 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC