802.11n compliant 2.4GHz Mini-PCI Module Users Manual REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established certain rules governing the use of electronic equipment. Part15, Class B This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that Increase the separation between the equipment and receiver. to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Warning: Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. CAUTION 1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 2. For product available in the USA market, only channel 1~11 can be operated. Selection of other channels is not possible. Agency in the United States of America:
Company Name: Xterasys Corporation Tel: 909-590-0600 Fax: 909-590-0388 Address: 4711 CHINO AVE. CHINO, CA91710 IMPORTANT NOTE:
This module is intended for OEM integrator. The OEM integrator is still responsible for the FCC compliance requirement of the end product, which integrates this module. 20cm minimum distance has to be able to be maintained between the antenna and the users for the host this module is integrated into. Under such configuration, for an population/uncontrolled environment can be satisfied. Any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. radiation exposure limits set the FCC forth USERS MANUAL OF THE END PRODUCT:
In the users manual of the end product, the end user has to be informed to keep at least 20cm separation with the antenna while this end product is installed and operated. The end user has to be informed that the FCC radio-frequency exposure guidelines for an uncontrolled environment can be satisfied. The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. If the size of the end product is smaller than 8x10cm, then additional FCC part 15.19 statement is required to be available in the users manual: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation. LABEL OF THE END PRODUCT:
The final end product must be labeled in a visible area with the following "
Contains TX FCC ID: VQF-RT2700E ". If the size of the end product is larger than 8x10cm, then the following FCC part 15.19 statement has to also be available on the label: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation. Hereby, Ralink, declares that this device is in compliance with the essential requirement and other relevant provisions of the R&TTE Driective 1999/5/EC. Table of Contents INTRODUCTION ...................................................................................................1 WIRELESS NETWORK OPTIONS ...............................................................................1 The Peer-to-Peer Network .........................................................................1 The Access Point Network ........................................................................2 SOFTWARE INSTALLATION.............................................................................3 INSTALL THE DEVICE ..............................................................................................3 INSTALL THE DRIVER & UTILITY ............................................................................3 HARDWARE INSTALLATION............................................................................8 VERIFICATION ........................................................................................................8 NETWORK CONNECTION .................................................................................9 IN WINDOWS 2000/ XP ..........................................................................................9 IP ADDRESS .........................................................................................................11 CONFIGURATION UTILITY.............................................................................12 INTELLIGENT WIRELESS UTILITY..........................................................................13 Profile ......................................................................................................13 Network ...................................................................................................22 Advanced.................................................................................................27 Statistics...................................................................................................29 WMM / QoS ............................................................................................32 WPS.........................................................................................................33 Radio On/Off ...........................................................................................36 About.......................................................................................................36 UNINSTALLATION.............................................................................................38 INTRODUCTION The 11b/g/n 1T2R WLAN Mini Card is a device that allows you connect your computer to a wireless local area network (LAN). A wireless LAN allows your system to use wireless Radio Frequency (RF) technology to transmit and receive data without physically attaching to the network. The Wireless protocols that come with this product ensure data security and isolation from interference generated by other radio frequencies. This card also allows you to take full advantage of your computers mobility with access to real-time information and online services anytime and anywhere. In addition, this device eliminates the bother of pulling cable through walls and under furniture. It even allows you to place your system in locations where cabling is impossible. Modifying and augmenting networks has never been so easy. Wireless Network Options The Peer-to-Peer Network This network installation lets you set a small wireless workgroup easily and quickly. Equipped with wireless PC Cards or wireless PCI, you can share files and printers between each PC and laptop.
- 1 -
You can also use one computer as an Internet Server to connect to a wired global network and share files and information with other computers via a wireless LAN. The Access Point Network The network installation allows you to share files, printers, and Internet access much more conveniently. With Wireless LAN Cards, you can connect wireless LAN to a wired global network via an Access Point.
- 2 -
SOFTWARE INSTALLATION Install the device 1. Make sure the computer is turned off. Remove the expansion slot cover from the computer. 2. Carefully slide the 11b/g/n 1T2R WLAN Mini Card into the mini PCI slot. Push evenly and slowly and ensure it is properly seated. 3. After the device has been connected to your computer, turn on your computer. Windows will detect the new hardware and then automatically copy all of the files needed for networking. Install the Driver & Utility 1. Exit all Windows programs. Insert the included CD-ROM into your computer. The CD-ROM will run automatically. 2. When the License Agreement screen appears, please read the contents and select I accept the terms of the license agreement then click Next to continue.
- 3 -
3. Select the check box to choose a Configuration Tool from the listed two choices.
Configuration Tool: Choose to use our configuration utility.
Microsoft Zero Configuration Tool: Choose to use Windows XPs built-in Zero Configuration Utility (ZCU). Click Next to continue.
- 4 -
4. There are two modes for you to choose in this screen, either choose WiFi mode or performance mode (TxBurst mode). This mode selection screen is set for the default mode shown in the utility screen, you can still change its mode later in the utility screen. Click Next to continue.
- 5 -
5. When you are prompted the following message, please click Install to begin the installation.
- 6 -
6. When the following screen appears, click Finish to complete the software installation.
- 7 -
HARDWARE INSTALLATION Verification To verify if the device exists in your computer and is enabled, go to Start >
Control Panel > System (> Hardware) > Device Manager. Expand the Network Adapters category. If the 11b/g/n 1T2R WLAN Mini Card is listed here, it means that your device is properly installed and enabled.
- 8 -
NETWORK CONNECTION Once the device driver is well installed, a network setting described in the following should be also established. In Windows 2000/ XP 1. (In Windows 2000) Go to Start Settings Control Panel Network and Dial-up Connections Local Area Connection Properties.
(In Windows XP) Go to Start Control Panel Network and Internet Connections Network Connections Wireless Network Connection Properties.
- 9 -
2. Make sure that all the required components are installed. 3. If any components are missing, click on the Install button to select the Client/Service/Protocol required. After selecting the component you need, click Add to add it in. 4. For making your computer visible on the network, make sure you have installed File and Printer Sharing for Microsoft Networks.
- 10 -
IP Address Note: When assigning IP Addresses to the computers on the network, remember to have the IP address for each computer set on the same subnet mask. If your Broadband Router use DHCP technology, however, it wont be necessary for you to assign Static IP Address for your computer. 1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP technology), check the Obtain an IP Address Automatically option. 2. To configure a fixed IP address (if you broadband Router is not DHCP supported, or when you need to assign a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for example, enter 192.168.1.254 in the IP address field, and 255.255.255.0 for the Subnet Mask.
- 11 -
CONFIGURATION UTILITY After the Wireless adapter has been successfully installed, users can use the included Configuration Utility to set their preference. Go to Start (All) Programs Ralink Wireless Ralink Wireless Utility. You can also open the Configuration Utility by double clicking the icon or right clicking to select Launch Config Utilities.
- 12 -
Intelligent Wireless Utility Profile Profile can book keeping your favorite wireless setting among your home, office, and other public hot-spot. You may save multiple profiles, and activate the correct one at your preference. The Profile manager enables you to Add, Edit, Delete and Activate profiles.
- 13 -
Profile Tab Profile Name SSID Network Type Authentication Encryption Use 802.1x Channel Power Save Mode Tx Power RTS Threshold Fragment Threshold Add You may enter a distinctive name of profile in this column. The default is PROF# (# 1, #2, #3....) The SSID is the unique name shared among all points in your wireless network. Shows the network type of the device, including infrastructure. Shows the authentication mode. Shows the encryption type. Whether or not use 802.1x feature. Shows the selected channel that is currently in use. (There are 13 channels available, depending on the country.) Choose from CAM (Constantly Awake Mode) or Power Saving Mode. Transmit power, the amount of power used by a radio transceiver to send the signal out. Shows the RTS Threshold of the device. Shows the Fragment Threshold of the device. Click to add a profile from the drop-down screen. System Configuration tab:
- 14 -
Profile Name: User can enter profile name, or use default name defined by system. The default is PROF# (# 1, #2,
#3....). SSID: The SSID is the unique name shared among all points in your wireless network. The name must be identical for all devices and points attempting to connect to the same network. User can use pull-down menu to select from available APs. Power Save Mode:
CAM (Constantly Awake Mode): When this mode is selected, the power supply will be normally provided even when there is no throughput. PSM (Power Saving Mode): When this mode is selected, this device will stay in power saving mode even when there is high volume of throughput. Network Type: There are two types, infrastructure modes.
- 15 -
The infrastructure is intended for the connection between wireless network cards and an Access Point. With the wireless adapter, you can connect wireless LAN to a wired global network via an Access Point. the transmitting to synchronize is 2347. RTS/CTS Threshold Tx Power: Select the Tx power percentage from the pull-down list including Auto, 100%, 75%, 50%, 25%, 10% and Lowest. Preamble: A preamble is a signal used in wireless environment timing including Synchronization and Start frame delimiter. Select from the pull-down menu to change the Preamble type into Auto or Long. RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly. The default value is a mechanism implemented to prevent the Hidden Node problem. If the Hidden Node problem is an issue, users have to specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the value you set. This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor modifications of this value are recommended. Fragment Threshold: User can adjust the Fragment threshold number by sliding the bar or key in the value directly. The default value is 2346. The mechanism of Fragmentation Threshold the efficiency when high traffic flows along in the wireless network. If your Wireless LAN Adapter often transmits large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346. is used improve to
- 16 -
Authentication and Encryption tab:
Authentication Type: There are type of authentication modes including Open, Shared, Leap, WPA, WPA-PSK, WPA2, WPA2-PSK, and WPA-None. seven Open: If your access point/wireless router is using
"Open authentication, then the wireless adapter will need to be set to the same authentication type. Shared: Shared Key is when both the sender and the recipient share a secret key. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication (only with CCX mode enabled.) WPA-PSK: WPA-PSK offers encryption methods, TKIP and AES. Select the type of algorithm, two
- 17 -
TKIP or AES and then enter a WPA Shared Key of 8-63 characters in the WPA Pre-shared Key field. Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP. and WPA2-PSK For WPA, WPA2, WPA-PSK authentication mode, the encryption type supports both TKIP and AES. WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 length. WEP Key: Only valid when using WEP encryption algorithm. The key must match with the APs key. There are several formats to enter the keys. Hexadecimal (40bits): 10 Hex characters. Hexadecimal (128bits): 32Hex characters. ASCII (40bits): 5 ASCII characters. ASCII (128bits): 13 ASCII characters. Show Password: Check this box to show the password you entered. 802.1x Setting: When user use radius server to authenticate client certificate for WPA authentication mode. 802.1x tab:
- 18 -
EAP Method:
PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. for certificate-based TLS / Smart Card: Transport Layer Security. Provides and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point. TTLS: Tunneled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an
- 19 -
encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. EAP-FAST: Flexible Authentication via Secure Tunneling. It was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned
(distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning is an in-band, over the air, distribution. For tunnel authentication, only support "Generic Token Card" authentication now. MD5-Challenge: Message Digest Challenge. Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network. Tunnel Authentication:
Protocol: Tunnel protocol, List information including EAP-MSCHAP v2, EAP-TLS/Smart card, and Generic Token Card. Tunnel Identity: Identity for tunnel. Tunnel Password: Password for tunnel. Session Resumption: User can click the box to enable or disable this function. ID\PASSWORD tab:
- 20 -
ID/ PASSWORD: Identity and password for server. Authentication ID / Password: Identity, password and domain name for server. Only "EAP-FAST" and
"LEAP" authentication can key in domain name. Domain name can be keyed in blank space. Tunnel ID / Password: Identity and Password for server. OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit. Client Certification tab:
server for to enable server Client Certification: Client Certicate authentication. Use Client certification: Choose authentication. OK: Click to save settings and exit this page. Cancel: Click call off the settings and exit. Server Certification tab:
- 21 -
Delete Edit Activate Use Certificate chain: Choose use server that issuer of certificates. Allow intimidate certificates: It must be in the server certificate chain between the server certificate and the server specified in the certificate issuer must be field. Server name: Enter an authentication sever root. Server name must match exactly: Click to enable or disable this function. Domain name must end in specified name: Click to enable or disable this function. OK: Click to save settings and exit this page. Cancel: Click call off the settings and exit. Click to delete an existing profile. Click to edit a profile. Click to make a connection between devices. Network The Network page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Network type, Channel, Wireless mode, Security-Enabled and Signal.
- 22 -
Network Tab Sorted by Show dBm SSID Network Type Channel Wireless mode Indicate that AP list are sorted by SSID, Channel or Signal. Check the box to show the dBm of the AP list. Shows the name of BSS network. Network type in use, Infrastructure for BSS. Shows the currently used channel. AP support wireless mode. It may support 802.11a, 802.11b, 802.11g or 802.11n wireless mode.
- 23 -
Encryption Signal Rescan Connect Add to Profile Link status Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use. Shows the receiving signal strength of specified network. Click to refresh the AP list. Select an item on the list and then click to make a connection. Select an item on the list and then click to add it into the profile list. Status Shows the current connection status. If there is no connection existing, it will show Disconnected. Extra Info Shows the link status. Channel Shows the current channel in use. Authentication Authentication mode used within the network, including Encryption Unknown, WPA-PSK, WPA2-PSK, WPA and WPA2. Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use. Network Type Network type in use, Infrastructure for BSS. IP Address Shows the IP address information. Sub Mask Shows the Sub Mask information. Default Gateway Link Quality Shows the default gateway information. Shows the connection quality based on signal strength and
- 24 -
Signal Strength 1, 2 and 3 Noise Strength Transmit Receive Link Speed Throughput TX/RX packet error rate. Shows the Receiving signal strength, you can choose to display as percentage or dBm format. Shows the noise signal strength. Shows the current Link Speed and Throughput of the transmit rate. Shows the current Link Speed and Throughput of receive rate. Shows the current transmitting rate and receiving rate. Shows the transmitting and receiving throughput in the unit of K bits/sec. AP information When you double click on the intended AP, you can see AP's detail information that divides into three parts. They are General, WPS, CCX information. The introduction is as following:
General General information contain AP's SSID, MAC address, Authentication Type, Encryption Type, Channel, Network Type, Beacon Interval, Signal Strength and Supported Rates. OK: Click this button to exit the information screen.
- 25 -
WPS WPS information contains Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands. Authentication Type: There are four types of authentication modes supported by RaConfig. They are open, Shared, WPA-PSK and WPA system. Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES. Config Methods: Correspond to the methods the AP supports as an Enrollee for adding external Registrars. Device Password ID: Indicate the method or identifies the specific password that the selected Registrar intends to use. Selected Registrar: Indicate if the user has recently activated a Registrar to add an Enrollee. The values are "TRUE" and
"FALSE". State: The current configuration state on AP. The values are
"Unconfigured" and "Configured". Version: WPS specified version. AP Setup Locked: Indicate if AP has entered a setup locked state. UUID-E: The universally unique identifier (UUID) element generated by the Enrollee. There is a value. It is 16 bytes. RF Bands: Indicate all RF bands available on the AP. A dual-band AP must provide it. The values are "2.4GHz" and
"5GHz". OK: Click this button to exit the information screen.
- 26 -
CXX CCX information contains CCKM, Cmic and Ckip information. OK: Click this button to exit the information screen. Advanced This Advanced page provides advanced and detailed settings for your wireless network.
- 27 -
Advanced Tab Wireless mode Enable Tx Burst Enable TCP Window Size Fast Roaming at Show Select wireless mode. There are 802.11b/g/n mixed, 802.11b only and 802.11b/g mixed modes are supported. Default mode is 802.11b/g/n mixed. Check to enable the burst mode. Check to increase the transmission quality. Check to set the roaming interval, fast to roaming, setup by transmits power. When you connect AP with authentication, choose
- 28 -
Authentication Status Dialog Select Your Country Region Code Enable CCX
(Cisco Compatible extensions) whether show "Authentication Status Dialog" or not. Authentication Status Dialog displays the process about 802.1x authentications. Select your country region code from the pull-down menu. Check to enable the CCX function. Turn on CCKM Enable Radio Measurements: Check to enable the Radio measurement function. Non-Serving Measurements limit: User can set channel measurement every 0~2000 milliseconds. Default is set to 250 milliseconds. Apply Click to apply above settings. Statistics The Statistics screen displays the statistics on your current network settings.
- 29 -
Transmit Frames Transmitted Successfully Shows information of frames successfully sent. Frames Retransmitted Successfully Shows information of frames successfully sent with one or more reties. Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS Shows transmit after hitting retry limit. information of frames failed Shows information of successfully receive CTS after sending RTS frame
- 30 -
RTS Frames Fail To Receive CTS Shows information of failed to receive CTS after sending RTS. Reset Counter Click this button to reset counters to zero. Receive Statistics Frames Received Successfully Frames Received With CRC Error Shows information of frames Received Successfully. Shows information of frames received with
- 31 -
CRC error. Frames Dropped Due To Out-of-Resource Shows information of frames dropped due to resource issue. Duplicate Frames Received Shows information of duplicate received frames. Reset Counter Click this button to reset counters to zero. WMM / QoS The WMM page shows the Wi-Fi Multi-Media power save function and Direct Link Setup that ensure your wireless network quality.
- 32 -
WMM Enable Check the box to enable Wi-Fi Multi-Media function. WMM- Power Save Enable Select which ACs you want to enable. Direct Link Setup Enable Check the box to enable Direct Link Setup. MAC Address The setting of DLS indicates as follow :
Fill in the blanks of Direct Link with MAC Address of STA, and the STA must conform to two conditions:
Connecting with the same AP that supports DLS feature. DSL enabled. Timeout Value represents it disconnect automatically after few seconds. The value is integer that must be between 0~65535. It represents that it always connects if the value is zero. Default value of Timeout Value is 60 seconds. Click this button to apply the settings. Select a direct link STA, then click "Tear Down"
button to disconnect the STA. that Timeout Value Apply Tear Down WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the configuration setup using PIN
(Personal Identification Number) configuration method or PBC (Push Button Configuration) method through an internal or external Registrar.
- 33 -
WPS AP List Rescan Information Display the information of surrounding APs with WPS IE from last scan result. List information included SSID, BSSID, Channel, ID), Security-Enabled. Password
(Device ID Issue a rescan command to wireless NIC to update information on surrounding wireless network. Display the information about WPS IE on the selected network. List information included Authentication Type,
- 34 -
PIN Code Config Mode Detail Connect Rotate Disconnect PIN PBC Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands. 8-digit numbers. It is required to enter PIN Code into Registrar using PIN method. Our station role-playing as an Enrollee or an external Registrar. Information about Security and Key in the credential. Command to connect to the selected network inside credentials. The active selected credential is as like as the active selected Profile. Command to rotate to connect to the next network inside credentials. Stop WPS action and disconnect this active link. And then select the last profile at the Profile Page. If there is an empty profile page, the driver will select any non-security AP. to add to Registrar using PIN Start
(Personal Identification Number) configuration method. If STA Registrar, remember that enter PIN Code read from your Enrollee before starting PIN. to add Start Configuration) method. to AP using PBC
(Push Button WPS associate IE Send the association request with WPS IE during WPS setup. It is optional for STA. WPS probe IE Send the probe request with WPS IE during WPS setup.
- 35 -
It is optional for STA. Progress Bar Status Bar Display rate of progress from Start to Connected status. Display currently WPS Status. Radio On/Off Click this icon to turn on radio function. Click this icon to turn off radio function. About Click this button to show the information of the wireless card including, RaConfig Version/ Date, Driver Version/ Date, EEPROM Version, Firmware Version and Phy_Address.
- 36 -
- 37 -
UNINSTALLATION In case you need to uninstall the utility and driver, please refer to below steps. (As you uninstall the utility, the driver will be uninstalled as well.) 1. Go to Start Programs Ralink Wireless Uninstall.
- 38 -
2. 3. Select Remove all button and click Next to start uninstalling. Click Yes to complete remove the selected application and all of its features.
- 39 -
4. Select Yes, I want to restart my computer now and then click Finish to complete the uninstallation.
- 40 -