all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User manual | Users Manual | 2.01 MiB | ||||
1 | RF Exposure Info | |||||||
1 | Cover Letter(s) | |||||||
1 | Test Setup Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | Test Setup Photos | |||||||
1 | Test Report | |||||||
1 | ID Label/Location Info |
1 | User manual | Users Manual | 2.01 MiB |
880022..1111bb//gg//nn WWiirreelleessss LLAANN UUSSBB AAddaapptteerr Model: XN-721AI / XN-721 Users Manual Version: 1.0 Date of issue: March 31, 2008 1 Federal Communications Commission (FCC) Interference Statement This device, IEEE 802.11n Wireless LAN USB Adapter, complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received; including interference that may cause undesired operation. This Equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna. 2. Increase the separation between the equipment and receiver. 3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio/TV technician for help. Warning: Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. Trade name Model number Caution:
1. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph (d)(2). 2. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 2 The 802.11b/g/n Wireless LAN USB Adapter has been tested to the FCC exposure requirements
(Specific Absorption Rate) CE Statement:
Hereby, Z-COM, Inc., declares that this device is in compliance with the essential requirements and other relevant provisions of the R&TTE Directive 1999/5/EC. This device will be sold in the following EEA countries: Austria, Italy, Belgium, Liechtenstein, Denmark, Luxembourg, Finland, Netherlands, France, Norway, Germany, Portugal, Greece, Spain, Iceland, Sweden, Ireland, United Kingdom, Cyprus, Czech Republic, Estonia, Hungary, Latvia, Lithuania, Malta, Slovakia, Poland, Slovenia, Bulgaria, Romania. Technical Support The software version of the IEEE 802.11n Wireless LAN USB Adapter is displayed on the utility About window. Users could download the most recent software version from the suppliers web site or refer to the selling contact for the latest software information. If you have difficulty solving the problem while installing or using the IEEE 802.11n Wireless LAN USB Adapter, please contact the supplier for support. About This Manual IEEE 802.11n Wireless LAN USB Adapter Users Manual is first published on March 2008. This manual is intended for people who want to configure the IEEE 802.11n Wireless LAN USB Adapter under Windows Vista, Windows XP, and Windows 2000. You should have at least a basic knowledge of TCP/IP networking concepts and topology. 4 Table of Contents Technical Support ......................................................................................................................4 About This Manual .....................................................................................................................4 Table of Contents........................................................................................................................5 Chapter 1 Preface ....................................................................................................................6 1.1 About your IEEE 802.11n Wireless LAN USB Adapter .....................................................6 1.2 Features and Benefits .......................................................................................................6 1.3 Applications.......................................................................................................................7 1.4 Product Kit.........................................................................................................................8 1.5 IEEE 802.11n Wireless LAN USB Adapter LED Indicators ...............................................8 Chapter 2 Getting Started........................................................................................................9 2.1 Installation Requirements..................................................................................................9 2.2 Installation.........................................................................................................................9 2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista ....................10 2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows XP/2000 ..............15 Chapter 3 Wireless LAN Network .........................................................................................23 3.1 Wireless LAN Overview...................................................................................................23 3.1.1 SSID......................................................................................................................23 3.1.2 Channel.................................................................................................................23 3.1.3 Transmit Rate (Tx Rate)........................................................................................23 3.2 Wireless LAN Security Overview.....................................................................................24 3.2.1 Data Encryption with WEP ....................................................................................25 3.2.2 IEEE 802.1x..........................................................................................................26 3.2.3 WPA (2).................................................................................................................26 3.3 Authentication Type ........................................................................................................33 3.3 Wi-Fi Protected Setup (WPS)..........................................................................................34 Chapter 4 Configure by Wireless Utility...............................................................................35 4.1 Use the Wireless LAN Utility ...........................................................................................35 4.2 Establish WPS Connection .............................................................................................43 Chapter 5 Management with Wireless Zero Configuration.................................................51 5.1 Windows XP Wireless Zero Configuration.......................................................................51 5.2 Windows Vista WLAN AutoConfig...................................................................................53 Limited Warranty ......................................................................................................................55 Distributor Information ............................................................................................................58 5 Chapter 1 Preface This chapter introduces the IEEE 802.11n Wireless LAN USB Adapter and prepares you to use your wireless adapter. 1.1 About your IEEE 802.11n Wireless LAN USB Adapter The IEEE 802.11n Wireless LAN USB Adapter is a standard USB adapter that fits into any standard USB 2.0 and 1.1 slots in a notebook computer. Its IEEE 802.11n draft 2.0 compliant device that supports up to 300Mbps rate, giving equivalent Ethernet speed to access corporate network or the Internet in a wireless environment. When installed, IEEE 802.11n Wireless LAN USB Adapter is able to communicate with any 802.11b/g/n compliant devices. 1.2 Features and Benefits Automatic rate selection. Support 802.11b/g/n solution in 2.4GHz frequency band. Greater flexibility to locate or move networked PCs. Wireless connection without the cost of cabling. Easy to install and user friendly, just Plug and Play. With built-in antenna. Security Capable: WEP, WPA, WPA2 supported. Software supports for Windows 2000, Windows XP and Vista. 6 1.3 Applications The IEEE 802.11n Wireless LAN USB Adapter offers a fast, reliable, cost-effective solution for wireless client access to the network in applications like these:
Remote access to corporate network information E-mail, file transfer and terminal emulation. Difficult-to-wire environments Historical or old buildings, asbestos installations, and open area where wiring is difficult to deploy. Frequently changing environments Retailers, manufacturers and those who frequently rearrange the workplace and change location. Temporary LANs for special projects or peak time
- Trade shows, exhibitions and construction sites where a temporary network will be practical.
- Retailers, airline and shipping companies need additional workstations during peak period.
- Auditors requiring workgroups at customer sites. Access to database for mobile workers Doctors, nurses, retailers, accessing their database while being mobile in the hospital, retail store or office campus. SOHO (Small Office and Home Office) users SOHO users need easy and quick installation of a small computer network. High security connection The secure wireless network can be installed quickly and provide flexibility. 7 1.4 Product Kit IEEE 802.11n Wireless LAN USB Adapter comes with the following items. Please go through each item below. If any of listed items appears to be damaged or missing, please contact your local dealer. IEEE 802.11n Wireless LAN USB Adapter-------------------------------- x 1 Software and Documentation CD----------------------------------------------.x 1 1.5 IEEE 802.11n Wireless LAN USB Adapter LED Indicators The IEEE 802.11n Wireless LAN USB Adapter has one LED indicators. The behavior of the indicators is described as below:
Link LED Off Power off Solid Green Associate with the Access Point or Ad-Hoc wireless workstation Blinking Green Indicate the device is transmitting data through the Access Point or Ad-Hoc wireless workstation. Also when the PBC button is pressed, the LED will blink to indicate WPS status that the LED will blink 2 seconds and off 2 seconds. 8 Chapter 2 Getting Started This chapter describes the instructions that guide you through the proper installation of your IEEE802.11n Wireless LAN USB Adapter for the Windows Vista/XP/2000 operating systems. 2.1 Installation Requirements Before installation, make sure you have computer with following:
A minimum of 5MB available hard disk space. A minimum of 32 MB RAM A computer equipped with USB slot, and socket services compliant with revision 1.1 or 2.0 of USB specification. A CD-ROM drive. Windows Vista/XP/2000. 2.2 Installation This section describes the installation of the IEEE 802.11n Wireless LAN USB Adapter software for the Windows 2000/XP and Windows Vista. The installation procedures for Windows Vista refer to 2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista; for Windows XP/2000 please see 2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows XP/2000. 9 2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista Step 1: Insert the included CD into the CD-ROM driver on your computer. Locate and double-click setup.exe. Step 2: The following screen displays. Click Next. Step 3: Click Next to accept installing IEEE 802.11n Wireless LAN USB Adapter driver files. 10 Step 4: Click Next to accept the default file location or click Browse to select an alternate folder. Step 5: Select a program folder or type a new folder name and click Next. 11 Step 6: You may add a shortcut in the startup folder as desired and click Next. Step 7: The windows will appear the message about the windows cant verify the publisher of this driver software compatibility with Windows Vista. Select Install this driver software anyway to continue installing 12 Step 8: Click on Finish to complete the installation. Step 9: Insert the IEEE802.11n Wireless LAN USB Adapter into the USB port on your notebook, and the Windows will auto-install the IEEE802.11n Wireless LAN USB Adapter driver and utility. 13 After the driver installed completed, the bellowing information will appear in the system tray. Click the to Chapter 4. icon, to configure the wireless LAN adapter via utility. To use the utility, please refer 14 2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows XP/2000 Step 1: Insert the included CD into the CD-ROM driver on your computer. Locate and double-click setup.exe. Step 2: The following screen displays. Click Next. 15 Step 3: Click Next to accept installing IEEE 802.11n Wireless LAN USB Adapter driver files. Step 4: Click Next to accept the default file location or click Browse to select an alternate folder. 16 Step 5: Select a program folder or type a new folder name and click Next. Step 6: You may add a shortcut in the startup folder as desired and click Next. 17 Step 7: Click on Finish to complete the installation. Step 8: Find an available USB port on the computer and insert the IEEE 802.11n Wireless LAN USB Adapter into the USB port. Step 9: After inserting USB Adapter into the USB port on your computer, Windows will auto-detect new hardware and will display a Found New Hardware Wizard window. Select Install the software automatically (Recommended) and press Next to install the driver. 18 Step 10: The windows will appear the message about the Network Control has not passed Windows Logo testing to verify its compatibility with Windows XP. Click on Continue Anyway button to continue installing. 19 Step 11: The windows will find 802.11n Wireless LAN USB Adapter and start copying corresponding files into the system. Click on Next to continue. Step 12: Click Finish to complete the installation. 20 After you install the driver and utility and insert your wireless USB adapter, the in the system tray. icon appears icon is blue and/or you see the following icon on your desktop, youre already If the connected to a wireless network. Upon completion, clicking on the icon will open the configuration window. When you minimize the window, the system tray icon will be loaded in the System Tray again. 21 The color behind the system tray icon indicates the link status. Refer to the following table for details. Color Description A good or excellent link status. Not connected to a wireless network or is searching for an available wireless network. Note for Windows XP users If you want to use WZC, either to disable the wireless network utility (if you already install it) or just install the driver. To install the driver only 1. Slide the IEEE 802.11n Wireless LAN USB Adapter into an available USB port. 2. The Found New Hardware Wizard window appears. (In Windows XP SP2, select No, not this time and click Next.) 3. Select Install from a list of specific location (Advanced) and click Next. 4. Insert the included CD into your CD-ROM drive, select Search removable media (floppy, CD-ROM
) and then click Next. 5. Click Finish in the last wizard screen to complete the installation. 22 Chapter 3 Wireless LAN Network This chapter provides general overview of wireless LAN network configuration parameters. 3.1 Wireless LAN Overview This section describes applications of IEEE 802.11n Wireless LAN USB Adapter. 3.1.1 SSID The SSID is the unique ID used by Access Points and stations to identify a wireless Network. Wireless clients associating to any Access Point must have the same SSID. The default setting is ANY, which allows your IEEE 802.11n Wireless Network USB Adapter to automatically associate to any Access Point (Infrastructure mode) in the vicinity of your wireless adapter. The ESS ID can be set up to 32 characters and is case sensitive. 3.1.2 Channel A radio frequency used by a wireless device is called a channel. 3.1.3 Transmit Rate (Tx Rate) The IEEE 802.11n Wireless Network USB Adapter supports various transmit (data) rate. The Auto Rate algorithm allows your IEEE 802.11n Wireless Network USB Adapter to operate at the maximum transmit (data) rate. When the communications quality drops below a certain level, the Wireless Network USB Adapter will automatically switch to a lower data rate. Transmission at lower data speed is usually more reliable. However, when the communications quality improves again, the Wireless Network USB Adapter will gradually increase the transmit (data) rate again until it reaches the highest available transmit rate. Note: Actual speed attained also depends on the distance from the AP, noise, etc. 23 3.2 Wireless LAN Security Overview Wireless LAN security is vital to your network to protect wireless communications against hacker entering your system and prevent unauthorized wireless station from accessing data transmitted over the network; the WLAN Utility offers a sophisticated security algorithm. Configure the wireless LAN security by clicking the check box next to Security. A privacy Configuration window will appear. If you do not enable any wireless security on your IEEE 802.11n Wireless LAN USB Adapter, the wireless communication is accessible to any wireless networking device that is in the coverage area. 24 3.2.1 Data Encryption with WEP WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the wireless LAN adapter and the AP or other wireless station to keep network communication private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. The IEEE 802.11n Wireless LAN USB Adapter allows you to configure up to four 64-bit, and 128-bit WEP keys and only one key is used as the default key at one time. The Key index field allows you to specify the key index you desire to use for transmitting data on your wireless LAN. You can change the default key by clicking on the up or down arrow and make sure the default key is set up exactly the same on the Wireless LAN stations as they are on the wireless Access Point. For 64bit encryption you may choose:
Alphanumeric: entering 5 characters (case sensitive) ranging from a-z, A-Z and 0-9
(e.g. MyKey). Hexadecimal: entering 10 hexadecimal digits in the range of A-F, a-f and 0-9 (e.g. 11AA22BB33, showed as below). For 128bit encryption you may choose:
Alphanumeric: entering 13 characters (case sensitive) ranging from a-z, A-Z and 0-9 (e.g. MyKey12345678). Hexadecimal: entering 26 hexadecimal digits in the range of A-F, a-f and 0-9 (e.g. 00112233445566778899AABBCC). 25 3.2.2 IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication can be done using an external RADIUS server. 3.2.2.1 EAP Authentication EAP (Extensible Authentication Protocol) is an authentication protocol which runs on the top of IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an Access Point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP that supports IEEE 802.1X. You must first have a wired connection to the network and obtain the certificate from a certificate authority (CA). A certificate can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. 3.2.3 WPA (2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA. WPA: Allows you to gain access to a more secured wireless network that requires mutual authentication between client and access point with a Radius authentication server or other authentication server on the network. WPA uses 802.1X and Extensible Authentication Protocol
(EAP) for authentication. WPA offers Enterprise and individual needs to meet the different market segments. This product supports various EAP types (TLS, TTLS, SIM and PEAP), which require different credential authentication. In order to access the wireless network, you must select EAP type your service provider supplied in the section of IEEE802.11X Authentication. Choose WPA2 if needed from Authentication Mode. 26 WPA-PSK: WPA-PSK offers a Personal mode of operation. In the Personal mode of operation, a pre-shared key is used for authentication. WPA-PSK allows you to gain access to a secured wireless network that the station and the access point use the same pre-shared key to authenticate. You must type a mixture of numbers and letters in the Pre-shared key section of this menu. You may input either 8-63 ASCII characters or 64 HEX characters. Choose WPA-PSK if needed from Authentication Mode. 27 WPA2: WPA2 provides a stronger encryption mechanism than WPA. WPA2 is the second generation of WPA security, providing personal and enterprise users with a high level of assurance that only authorized users can access to their wireless network. There is no difference between WPA and WPA2. The only difference is that WPA2 provides a stronger data encryption via the AES, contrast to WPA, which uses Temporal Key Integrity Protocol (TKIP). Choose WPA2 if needed from Authentication Mode. WPA2-PSK: Like WPA, WPA2-Personal offers authentication via a pre-shared key. Pre-shared key is usually used for Personal authentication. Personal mode requires only an access point and client on the network. Similarly, you need to type a mixture of numbers and letters in the Pre-shared key section of this menu. You may input either 8-63 ASCII characters or 64 HEX characters. Choose WPA2-PSK if needed from Authentication Mode. 28 3.2.3.1 Encryption Mode WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. The encryption mechanism used for WPA(2) and WPA(2)-PSK are the same. The only difference between them is that WPA(2)-PSK uses a simple common password, instead of user specific credentials. The common password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but its still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. 3.2.3.2 IEEE 802.1X Authentication WPA and WPA2 apply IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4 way handshake) and shortens the time required to connect to a network. Other WPA2 authentication features that are different from WPA include key caching and pre-authentication. 29 After you select the EAP type, you need to click Certification tab to make advanced setting. The following describes configuration of each available EAP type. TLS: Clicking the Certification tab for TLS shows the following menu. TLS requires the entry of Certificate Information and Login Information for mutual authentication. This utility will auto-detect the Certificate Information for you to configure TLS easily. You only need to enter the Login Name in the Login information filed to authenticate. If you desire to use the Certificate Authority manually, you can click the check box next to Verify Certificate Authority and choose the usable selection in the User Certificate field using drop-down menu. User Certificate: select one of user certificates you have enrolled. TLS is used to create a secure tunnel through which authentication and encryption keys can be passed and require server and client side keys. To save the information you entered in the appropriate field, click the OK button. Otherwise, click the Cancel button to close the menu. If you want to return to select other EAP type, click the Security tab. PEAP: Clicking the Certification tab for PEAP displays the following menu. 30 PEAP requires the use of Certificate Information and User Information. This utility will automatically identify Certificate Information and Login Information for users to configure PEAP easily. You only need to enter User Name and Password in the User information filed to authenticate. If you click the Verify Certificate Authority check box, you are able to choose one of User Certificate from the drop-down menu. Furthermore, you need to input User Name and Password in the User Name field on the screen. To save the information you entered in the appropriate field, click the button or button. Otherwise, click the button to close the menu. If you want to return to select other EAP type, click the tab. 31 TTLS: Clicking the Certification tab for TTLS shows the following menu. TTLS requires the mutual authentication between station and access points. You must present a User Name and Password in the User Information field that will be verified by TTLS-capable server. This mutual authentication ensures that only authorized users are allowed access to the network. SIM: Clicking the Certification tab for SIM displays the following menu. 32 SIM requires a valid PIN to the SIM card, which must match the PIN stored on the SIM. Please enter the PIN in the SIM Card ID field. When the configuration takes effect, the EAP authentication process begins automatically, and the client adapter will use the saved PIN to access the SIM card. To verify authentication, double-click My Computer, Control Panel, and Network Connections. The status appears to the right of your Wireless Network Connection. Click View and Refresh to obtain the current status. If the client adapter is authenticated, the status reads, "Authentication succeeded."
3.3 Authentication Mode The IEEE 802.11b/g standard describes a simple authentication method between the wireless stations and AP. Two authentication types are defined: Open system mode and a Shared key mode. Open system mode is implemented for ease-of-use and when security is not an issue. It requires NO authentication, since it allows any device to join a network without performing any security check. The wireless station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen to any data transmitted plaintext. Shared key mode involves a shared secret key to authenticate the wireless station to the AP. It requires that the station and the access point use the same WEP key to authenticate. This basically means that WEP must be enabled and configured on both the AP and the other wireless stations with a same key. Shows as below:
33 3.3 Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) is a standard for easy and secure establishment of a wireless home network, defined by the Wi-Fi Alliance. The goal of the WPS is to simplify the process of connecting any home device to the wireless network. The WPS protocol defines two types of devices in a network:
Registrar: A device with the authority to issue the credentials to enroll new clients on the network. A Registrar may be integrated into an AP, or it may be separate from the AP. Enrollee: A device seeking to join a wireless LAN network. The WPS gives users a variety of setup options. It uses PBC (Push Button Configuration) and PIN (Personal Identification Number) to enable user to automatically configure network names and strong data encryption and authentication. For the PBC mode, the Access Point and the wireless client just simply push a hardware button or software button on the unit. After pushing Access Point WPS button, the client must push software button or hardware button within 2 minutes. For the PIN mode, input the same PIN number for the Access Point and for the wireless client. After the connection is made successfully, the wireless client will be able to receive the data from the Access Point such as SSID, wireless security, and etc. 34 Chapter 4 Configure by Wireless LAN Utility 4.1 Use the 802.11n Wireless LAN Utility This chapter provides more detail introduce for using the utility to configure the wireless adapter. The WLAN Utility enables you to make configuration changes and perform user-level diagnostics on your IEEE802.11n Wireless LAN USB Adapter in the Windows Vista/XP/2000 operating system environments. The WLAN Utility consists of window with 5 items for you to monitor and configure the IEEE802.11n Wireless LAN USB Adapter: Connection, profiles, Link Test, Site Survey and About. Connection The Connection item allows you to monitor the current status and quality of your connection to the wireless network. When you click on this tab, the following screen will display. Status: Shows the MAC address and the network type of Profile with which you are associated. SSID: The SSID is the unique ID used by Access Points and stations to identify a wireless LAN. Wireless clients associating to any Access Point must have the same SSID. The default setting is ANY, which allows your Wireless USB Adapter to automatically associate to any Access Point
(Infrastructure mode) in the vicinity of your wireless adapter. The SSID can be set up to 32 characters and is case sensitive. 35 Channel: Shows the channel on which the connection is made. Elapsed time: Shows the elapsed time of the current association. Auth Mode: Shows the authentication mode of the connected Access Point. Encryption Mode: Shows the current wireless network encryption mode. Signal Strength: Based on the received signal strength measurement of the baseband processor of the Beacon signal. There are 5 states of signal strength:
There is one button to choose from. Clicking on the to let you monitor the more current status of your connection. To close the menu, click
. Profile The Profiles item allows you to add a new profile or to set values for all parameters by editing a previously defined profile. Clicking this tab displays the following screen:
36 Press below. to create a new profile, and configure all the parameters following the steps Input Step1.
(Infrastructure/Adhoc) when Add a profile progress start. the Profile Name, Network
(SSID), and select Network type 37 Step2. To protect against hacker entering your system and prevent unauthorized wireless station from accessing data transmitted over the network, the WLAN Utility offers a sophisticated security algorithm. To activate security enable, click the Security check box. For detailed security configuration please refer to Chapter 3 for how to configure security settings. Step3. Setup the TCP/IP settings. When you check the box, you can choose to obtain the IP address from the DHCP server on your network automatically. Or you can specify IP address manually but it must be an unique IP address to your network. 38 Step4. The WLAN Utility also offers the advanced configuration for user to set the IEEE 802.11n Wireless LAN USB Adapter under certain network environment. These advanced options include Power Save Mode, and Wireless Mode. Note: Under Vista OS, these advanced parameters are not allowed to be configured. Power Save Mode The Power Save Mode is designed to conserve battery life of you computer. When Power Save Mode is enabled, your IEEE 802.11n Wireless LAN USB Adapter will go into sleep mode to minimize power consumption. Note: When power save mode is enabled, the Access Points you use need to support power saving as well so that the communication can be established. Wireless Mode The wireless Mode supports three options: 2.4GH 300Mbps (802.11n), 2.4GH 54Mbps (802.11G), and 2.4GHz 1Mbps (802.11B). These three modes can operate concurrently. 39 Step5. This Confirm Information menu allows you to double-check the changes you make. To apply any changes, click on the button to close this menu. If you want to return to select other security type, click on the button. Otherwise, click on the button. 40 Link Test:
The Link Test menu provides a suite of tests which you can run to identify the connection between your computer and the wireless network. Enter the IP Address of Access Point which you desire to connect. The settings following the address allow you to setup the number and size of packets being transmitted between your computer and the wireless network. Furthermore, clicking the check box Continuous Linktest ignores number of packets you set. On the bottom of this menu provides current and cumulative counters of the activity on your wireless network. The counters of packets turn to 0 once you click on the Start button. Site Survey:
Use the Site Survey function to scan available wireless Access Points on your network. You may click on the Rescan button to enforce the utility to scan Access Points around the environment. Besides showing the ESSID of each Access Point, it also displays wireless network mode and signal strength. To join any of the displayed Access Points, highlight the Access Point you desire to connect and then click Join. 41 By pressing the icon you may see more information of Access Points such as ESSID, Channel, Network Type, BSSID, Security, Signal, and Supported Rates. Click OK to close the menu. 42 About:
The About item displays version number of the Wireless LAN USB Adapter Driver and Utility. Also, the MAC address and frequency domain are displayed. 4.2 Establish WPS Connection The IEEE 802.11n Wireless LAN USB Card supports WPS (Wi-Fi Protected-Setup) feature defined by the Wi-Fi Alliance. Its a new protocol for configuring a wireless network more easily, and secure. The IEEE 802.11n Wireless LAN USB Card supports two modes of WPS protocol, Enrollee mode (Join a WPS WLAN) and Registrar mode (Configure WPS AP). To setup the WPS, please follow the steps below. 43 Step1. Go to profile setup page and click the button. Or, right click on utility icon in the system tray and select WPS (Wi-Fi Protected Setup). Step2. Select the WPS mode to link or manage the WPS-enabled AP you want to connect. 44 If your 802.11n Wireless LAN USB Card performs as enrollee, choose Join a WLAN (Enrollee) and click on Next. You will have two methods to join a WPS-enabled AP. Push Button on AP: Push the button on the Access Point and then click on the client utility to start WPS link within 2 minutes. If WPS link is established successful, it will display the success message. Instead of Push Button on AP, you may use XN-721s hardware push button to establish WPS link as well. Push the button on the Access Point and press PBC button on the client to start WPS link within 2 minutes. If WPS link is established successful, it will display the success message figured below. Furthermore, there are two options for connecting to the WPS-enabled AP, one is that the Utility will find any available WPS-AP on the network by checking the Automatically select the network checkbox. 45 If you want to manually connect to a specified AP, uncheck the Automatically select the network checkbox and click on Next, a WPS AP scan list will appear and scan WPS APs on the network within coverage, select the desired AP and click on Next to start WPS authentication process. 46 Clients PIN Mode: Select PIN and then the PIN key field will generate a dynamic PIN code automatically. Input the PIN key into the Access Point PIN key field, and apply change. Click to start WPS link progress. 47 Same as PBC mode, the Client PIN mode also allows you to connect to any WPS-enabled AP within coverage by checking Automatically select the network checkbox, or select one that you want to connect. 48 If it is necessary to have your 802.11n Wireless LAN USB Card perform as Registrar on your network, select Configure a WLAN (Registrar) and click on Next. The following window will show up. The scan list will scan the WPS-enabled AP on your network within its coverage. Select the one that you want to configure and input the AP pin generated by the AP in the Access Point PIN field. Click Next to proceed to the next step. 49 Manage the network profile in order to configure the AP. Settings that can be managed include SSID, Auth Mode, Encryption Mode and Network Key. Click to start WPS link progress. To check whether the setting of AP is modified corresponding with the profile, you may use scan function to display AP information. 50 Chapter 5 Management with Wireless Zero Configuration This chapter instructs you how to manager your IEEE 802.11n Wireless LAN USB Adapter using the Windows Vista and Windows XP wireless zero configuration tool. 5.1 Windows XP Wireless Zero Configuration Step 1: Make sure the Use Windows to configure my wireless network settings check box is selected in the Wireless Network Connection Properties. Warning: You must choose one way to configure Wireless LAN USB Adapter either of using our WLAN Utility by un-checking this check box or using Windows XP Automatic Wireless Network Configuration first by checking this check box. Step 2: Double click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. 51 Step 3: In the Wireless Network Connection Status screen, click View Wireless Networks to open the Wireless Network Connection screen. Step 4: Click Refresh network list to reload and search for available wireless devices within transmission range. Select a wireless network in the list and click Connect to join the selected wireless network. 52 5.2 Windows Vista WLAN AutoConfig Step 1: Click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Step 2: Select the Connect to a network to open the Connect to the network screen. Step 3: Select a wireless network in the list and click Connect to join the selected wireless network. 53 If the wireless security is activated for the selected wireless network, the related fields must be set to the same security setting as the associated AP. Step 4: Click Connect to connect the wireless network. 54 Limited Warranty This Warranty constitutes the sole and exclusive remedy of any buyer or resellers equipment and the sole and exclusive liability of the supplier in connection with the products and is in lieu of all other warranties, express, implied or statutory, including, but not limited to, any implied warranty of merchantability of fitness for a particular use and all other obligations or liabilities of the supplier. In no even will the supplier or any other party or person be liable to your or anyone else for any damages, including lost profits, lost savings or other incidental or consequential damages, or inability to use the software provided on the software media even if the supplier or the other party person has been advised of the possibility of such damages. The following are special terms applicable to your hardware warranty as well as services you may use during part of the warranty period. Your formal Warranty Statement, including the warranty applicable to our Wireless LAN products, appears in the Quick Installation Guide which accompanies your products. Duration of Hardware Warranty: One Year Replacement, Repair or Refund Procedure for Hardware:
1. This product is design based on the 802.11n draft 2.0 standards, do not guarantee the compatibility with the products that design by other vendors based on 802.11n draft or the products that design accroding to the 802.11n formal standard that announce in the future. 2. The maximum performance defines based on 802.11g and 802.11n draft standard. The actual throughput will be different because of using environment and conditions, including network bandwidth, building materals, building structure, and wireless working range. These are possible to reduce the wireless performance. 3. Dont dismantle the housing of the device as your wish to avoid the product demage. If your unit needs a repair or replacement, return it to your dealer/distributor in its original packaging. When returning a defective product for Warranty, always include the following documents:
The Warranty Repair Card A copy of the invoice/proof of purchase, and The RMA Report Form (To receive a Return Materials Authorization form (RMA), please contact the party from whom you purchased the product). Upon proof-of-purchase we shall, at its option, repair or replace the defective item at no cost to the buyer. 55 This warranty is contingent upon proper use in the application for which the products are intended and does not cover products which have been modified without the resellers approval or which have been subjected to unusual physical or electrical demands or damaged in any way. 56 Please complete the information below and include it along with your products. Name:
Title:
Company:
Telephone:
Fax:
Email:
City/State/Zip code:
Country:
Product Name:
Serial Number:
MAC Address:
Invoice Date:
Product Description:
If you have any further questions, please contact your local authorized reseller for support. 57 Distributor Information Zcomax Technologies, Inc. California Business Center 14545 VALLEY VIEW AVE., SUITE "S"
SANTA FE SPRINGS, CA 90670 98 Ford Road, Suite 3-F, Denville, NJ 07834, USA New Jersey Business Center ZCOMAX - United Kingdom Limited European Business Centre 19 Colindale Avenue London NW9 5DS UK Tel: +1-562-926-4588 Fax:+1-562-926-7885 Tel: +1-973-664-0310 Fax:+1-973-664-0313 Tel: +44-(0)-20-8982-8200 Fax:+44-(0)-20-8201-3232 Sales/Product Inquiries:
sales@zcomax.com Tech Support/Questions:
support@zcomax.com Sales Contact sales@zcomax.co.uk FAE Support support@zcomax.co.uk 58
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2008-08-18 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2008-08-18
|
||||
1 | Applicant's complete, legal business name |
Z Com Inc
|
||||
1 | FCC Registration Number (FRN) |
0006796361
|
||||
1 | Physical Address |
5F, No.8 HSIN-ANN RD. HSINCHU SCIENCE PARK
|
||||
1 |
Hsinchu, N/A 300
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
h******@atcb.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
M4Y
|
||||
1 | Equipment Product Code |
XN721V01
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
J**** j********
|
||||
1 | Title |
R&D DIV Director
|
||||
1 | Telephone Number |
886 3******** Extension:
|
||||
1 | Fax Number |
886 3********
|
||||
1 |
j******@zcom.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
K**** C********
|
||||
1 | Physical Address |
11,Ln.275,Ko Nan 1st street Shiang-Shan District
|
||||
1 |
Hsinchu, 300
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
K******@intertek.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
K****** C****
|
||||
1 | Physical Address |
11,Ln.275,Ko Nan 1st street Shiang-Shan District
|
||||
1 |
Hsinchu, 300
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
K******@intertek.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11n USB Dongle | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | Yes | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is the maximum combined conducted output power. Device is operating in a 1Tx x 2Rx Spatial Multiplexing MIMO configuration as described in this filing. End-users and responsible parties must be provided with operating and installation instructions to ensure RF exposure compliance. The maximum reported SAR value demonstrated for this device at a distance of 15mm: 0.66W/kg | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
A******** L****
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
a******@intertek.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.2810000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC