all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Revised Installation Guide | Users Manual | 1.28 MiB | ||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | Test Setup Photos | |||||||
1 | External Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | Internal Photos | |||||||
1 | Test Setup Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | ID Label/Location Info | |||||||
1 | Cover Letter(s) | |||||||
1 | RF Exposure Info | |||||||
1 | Test Report |
1 | Revised Installation Guide | Users Manual | 1.28 MiB |
Wireless LAN Utility User's Guide Version 2.0 September 2003 Note to OEMs: ZyXEL provides this document as a sample Users Guide. This Users Guide may require customization to reflect your own company name, product name and/or document style. Possible words you may want to change: OEM, WLAN Adapter, WLAN Utility Wireless LAN Utility Copyright Copyright 2003 by the Original Equipment Manufacturer (OEM) The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of the OEM. Published by the OEM. All rights reserved. Disclaimer The OEM does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patents' rights of others. The OEM further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice. Trademarks Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners. ii Copyright Limited Warranty Wireless LAN Utility Limited Warranty iii Wireless LAN Utility Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective operation and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company's inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. For their own protection, users should ensure that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution Users should not attempt to make such connections themselves, but should contact the appropriate electrical inspection authority, or electrician, as appropriate. Note This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus set out in the radio interference regulations of Industry. iv Information for Canadian Users Wireless LAN Utility Federal Communications Commission
(FCC) Interference Statement This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference. 2. This device must accept any interference received, including interference that may cause undesired operations. This equipment has been tested and found to comply with the limits for a CLASS B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Connect the equipment into an outlet on a circuit different from that to which the receiver is Increase the separation between the equipment and the receiver. connected. Consult the dealer or an experienced radio/TV technician for help. Caution This device is intended only for OEM integrators under the following conditions:
1. This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna (installed to end product) shall not be less than 20 cm (8 inches) during normal operation. 2. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter As long as the 2 conditions above are met, further transmitter testing will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emission, PC peripheral requirements, etc.). Notice 1 Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Additional Information to OEM Integrators FCC Statement v Wireless LAN Utility The end user should NOT be provided any instructions on how to remove or install the device. End Product Labeling This transmitter module is authorized only for use in devices where the antenna may be installed such that 20 cm may be maintained between the antenna and users (for example access points, routers, wireless ASDL modems, and similar equipment). The final end product must be labeled in a visible area with the following: Contains TX FCC ID: I88B-120 IMPORTANT NOTE 1. In the event that these conditions can not be met (for example certain laptop configurations or co-
location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization. 2. To comply with FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-
located or operating in conjunction with any other antenna or transmitter."
Certifications Refer to the product page at OEM web site. vi FCC Statement Wireless LAN Utility Customer Support When contacting your Customer Support Representative, please have the following information ready:
Product model and serial number.
Warranty Information.
Date you received your product.
Brief description of the problem and the steps you took to solve it. METHOD LOCATION E-MAIL SUPPORT/SALES TELEPHONE/FAX WEB SITE/ FTP SITE REGULAR MAIL Customer Support vii Wireless LAN Utility Table of Contents 3.2.1 3.1 3.2 1.1 1.2 1.3 1.3.1 1.3.2 Copyright.......................................................................................................................................................ii Limited Warranty........................................................................................................................................iii Information for Canadian Users.................................................................................................................iv Federal Communications Commission (FCC) Interference Statement....................................................v Customer Support.......................................................................................................................................vii List of Figures...............................................................................................................................................xi List of Tables ................................................................................................................................................xi Preface..........................................................................................................................................................xii Chapter 1 Wireless Network Basics .........................................................................................................1-1 Introduction..................................................................................................................................1-1 Benefits of a Wireless LAN .........................................................................................................1-1 Applications .................................................................................................................................1-1 Ad-hoc..................................................................................................................................1-1 Infrastructure........................................................................................................................1-2 Chapter 2 Disable Windows XP Configuration Tool..............................................................................2-1 Chapter 3 Using the Wireless LAN Utility...............................................................................................3-1 Accessing the WLAN Utility .......................................................................................................3-1 Viewing Current Configuration ...................................................................................................3-1 Common Screen Command Buttons ....................................................................................3-3 3.3 The About Screen.........................................................................................................................3-3 3.4 Wireless LAN Parameters............................................................................................................3-5 SSID.....................................................................................................................................3-5 Channel ................................................................................................................................3-5 Tx Rate.................................................................................................................................3-5 3.5 Wireless Network Type................................................................................................................3-5 Ad-Hoc (IBSS).....................................................................................................................3-5 Infrastructure........................................................................................................................3-6 Roaming.......................................................................................................................................3-7 The Site Survey Screen ................................................................................................................3-8 Connecting to a Network....................................................................................................3-10 Configuring the Wireless Parameters.........................................................................................3-11 Network Configuration Profile Setting ......................................................................................3-12 Resetting to Factory Default Values ..................................................................................3-12 Saving the Current Setting to a Profile...............................................................................3-13 Using a Pre-configured Profile...........................................................................................3-13 Deleting a Profile ...............................................................................................................3-13 Chapter 4 Wireless LAN Security ............................................................................................................4-1 Introduction..................................................................................................................................4-1 Data Encryption with WEP..........................................................................................................4-1 3.9.1 3.9.2 3.9.3 3.9.4 3.4.1 3.4.2 3.4.3 3.5.1 3.5.2 3.8 3.9 3.6 3.7 4.1 4.2 3.7.1 Table of Contents ix Wireless LAN Utility 5.2 5.1 4.2.1 4.2.2 5.1.1 5.1.2 5.1.3 Authentication Mode ...........................................................................................................4-1 Configuring the WEP Encryption ........................................................................................4-1 Chapter 5 Advanced Configuration.........................................................................................................5-1 Overview......................................................................................................................................5-1 Threshold Control ................................................................................................................5-1 Authentication Mode ...........................................................................................................5-2 Preamble Type .....................................................................................................................5-2 The Advanced Screen ..................................................................................................................5-3 Chapter 6 Removing and Upgrading the WLAN Utility........................................................................6-1 Removing the WLAN Utility.......................................................................................................6-1 Upgrading the WLAN Utility ......................................................................................................6-1 Chapter 7 Troubleshooting.......................................................................................................................7-1 Problems Starting the WLAN Utility Program............................................................................7-1 Problems Communicating With Other Computers ......................................................................7-2 Problem with the Link Status.......................................................................................................7-2 Index ............................................................................................................................................................. A 7.1 7.2 7.3 6.1 6.2 x Table of Contents Wireless LAN Utility List of Figures Figure 1-1 Ad-hoc Application Example .....................................................................................................1-2 Figure 1-2 Infrastructure Application Example............................................................................................1-2 Figure 2-1 Windows XP: System Tray Icon.................................................................................................2-1 Figure 2-2 Windows XP: Wireless Network Connection Status ..................................................................2-2 Figure 2-3 Windows XP: Connect to Wireless Network..............................................................................2-2 Figure 2-4 Windows XP: Wireless Network Connection Properties............................................................2-3 Figure 3-1 WLAN Utility System Tray Icon................................................................................................3-1 Figure 3-2 WLAN Utility: WLAN Status....................................................................................................3-2 Figure 3-3 WLAN Utility: About.................................................................................................................3-4 Figure 3-4 Ad-hoc Network Example ..........................................................................................................3-6 Figure 3-5 BSS Example..............................................................................................................................3-6 Figure 3-6 Infrastructure Network Example ................................................................................................3-7 Figure 3-7 Roaming Example ......................................................................................................................3-8 Figure 3-8 WLAN Utility: Site Survey........................................................................................................3-9 Figure 3-9 Site Survey Warning.................................................................................................................3-10 Figure 3-10 WLAN Utility: Network Configuration .................................................................................3-11 Figure 4-1 WLAN Utility: Security .............................................................................................................4-2 Figure 5-1 RTS Threshold............................................................................................................................5-1 Figure 5-2 WLAN Utility: Advanced...........................................................................................................5-3 List of Tables Table 3-1 System Tray Icon Description......................................................................................................3-1 Table 3-2 WLAN Utility: WLAN Status......................................................................................................3-2 Table 3-3 Common Screen Command Buttons............................................................................................3-3 Table 3-4 WLAN Utility: About ..................................................................................................................3-4 Table 3-5 WLAN Utility: Site Survey..........................................................................................................3-9 Table 3-6 Color Indicator for Link Quality/Link Strength .........................................................................3-10 Table 3-7 WLAN Utility: Network Configuration.....................................................................................3-12 Table 4-1 WLAN Utility: Security...............................................................................................................4-2 Table 5-1 WLAN Utility: Advanced ............................................................................................................5-4 Table 7-1 Troubleshooting Starting WLAN Utility Program.......................................................................7-1 Table 7-2 Troubleshooting Communication Problems.................................................................................7-2 Table 7-3 Troubleshooting Link Quality......................................................................................................7-2 List of Figures/Tables xi Wireless LAN Utility Preface Congratulations on the purchase of your new Wireless LAN Adapter!
About This User's Guide A practical and comprehensive tool, this guide provides information about the Wireless LAN Utility operation. This guide is for wireless devices that uses the Wireless LAN Utility program, thus the model name shown in the screens may vary from what you actually purchased. Familiarize yourself with the Syntax Conventions listed for better and faster understanding. Related Documentation
Support Disk Refer to the included CD for support documents and device drivers.
Quick Installation Guide Our Quick Installation Guide is designed to help you get your Wireless LAN Adapter up and running right away. It contains a detailed easy-to-follow connection diagram and information on installing your Wireless LAN Adapter.
Glossary and Web Site Please refer to OEM web site for an online glossary of networking terms and additional support documentation. Syntax Conventions Type or Enter means for you to type one or more characters. "Select" or "Choose" means for you to use one of the predefined choices. Window and command choices are in Bold Times New Roman font. Predefined field choices are in Bold Arial font. The Wireless LAN Adapter is referred to as the WLAN Adapter or, simply, as the Adapter in this guide. The Wireless LAN Utility may be referred to as the WLAN Utility in this guide. xii Preface Wireless LAN Utility Chapter 1 Wireless Network Basics This chapter gives you an overview of what a wireless network is, its advantages and applications. Introduction 1.1 A wireless LAN (WLAN) provides a flexible data communication system that you can use to access various services (navigating the Internet, email, printer services, etc.) on the wired network without additional expensive network cabling infrastructure. In effect, a wireless LAN environment provides you the freedom to stay connected to the wired network while moving in the coverage area. 1.2 Benefits of a Wireless LAN
Access to network services in areas otherwise hard or expensive to wire, such as historical buildings, buildings with asbestos materials and classrooms.
Doctors and nurses can access a complete patients profile on a handheld or notebook computer upon entering a patients room.
It allows flexible workgroups a lower total cost of ownership for networks that are frequently reconfigured.
Conference room users can access the network as they move from meeting to meeting- accessing up-to-date information that facilitates the ability to communicate decisions on the fly.
It provides campus-wide networking coverage, allowing enterprises the roaming capability to set up easy-to-use wireless networks that transparently covers an entire campus. 1.3 Applications Unlike wired networks, you can set up wireless networks in two different modes: infrastructure and ad-hoc. Set up your wireless network depending on your network needs. The following sections describe each network mode. 1.3.1 Ad-hoc An ad-hoc network consists of two or more computers communicating with one another through the wireless network. No access points (APs) or existing wired networks are needed. An access point acts as a bridge between the wireless and wired networks Wireless Network Basics 1-1 Wireless LAN Utility Figure 1-1 Ad-hoc Application Example 1.3.2 Infrastructure When wireless clients wish to access and share resources on the wired network, they should use infrastructure mode. Wireless clients may move from one coverage area to another seamlessly without network interruption. This is called roaming. The figure below depicts an infrastructure network example Figure 1-2 Infrastructure Application Example Wireless Network Basics 1-2 Wireless LAN Utility Chapter 2 Disable Windows XP Configuration Tool Windows XP includes a basic configuration tool for wireless devices. DO NOT use the Windows XP configuration tool together with the WLAN Utility. It is recommended you use the WLAN Utility to configure the WLAN Adapter. Follow the steps below to disable the configuration tool in Windows XP after you install the WLAN Utility. Step 1. Double-click on the network icon for wireless connection in the system tray. Proceed to Step 2 if the icon is not present. Otherwise go to Step 5. Figure 2-1 Windows XP: System Tray Icon Step 2. If the icon for the wireless network connection is not in the system tray, click start, Control Panel and double-click on Network Connections. Disable Windows XP 2-1 Wireless LAN Utility Step 3. Double-click on the icon for wireless network connection to display a status window as shown next. Figure 2-2 Windows XP: Wireless Network Connection Status Step 4. Click Properties and click the Wireless Networks tab. Then go to Step 6. Step 5. When a Connect to Wireless Network window displays, click Advanced. Figure 2-3 Windows XP: Connect to Wireless Network 2-2 Disable Windows XP Step 6. Wireless LAN Utility In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Figure 2-4 Windows XP: Wireless Network Connection Properties Disable Windows XP 2-3 Wireless LAN Utility Chapter 3 Using the Wireless LAN Utility This chapter shows you basic wireless LAN configuration using the Wireless LAN Utility. Install the WLAN Adapter before you proceed. Refer to the Quick Installation Guide. For Windows XP users: disable the Windows XP wireless configuration tool first before you proceed. Refer to Chapter 2. Screen shots for Windows XP are shown unless otherwise specified. 3.1 Accessing the WLAN Utility After the Wireless LAN Utility is installed, an icon appears in the system tray. If the WLAN Utility system tray icon displays, the WLAN Adapter is installed properly. Figure 3-1 WLAN Utility System Tray Icon The color of the WLAN Utility system tray icon indicates the status of the WLAN Adapter. Refer to the following table for details. Table 3-1 System Tray Icon Description DESCRIPTION The WLAN Adapter is working properly but is not connected to any AP or wireless station. The WLAN Adapter is connected to a wireless network. COLOR Yellow Green Double click on the Wireless LAN Utility icon in the system tray to open the WLAN Utility. 3.2 Viewing Current Configuration When the WLAN Utility starts, the WLAN Status screen displays, showing the current configuration of your WLAN Adapter. Using the Wireless LAN Utility 3-1 Wireless LAN Utility Figure 3-2 WLAN Utility: WLAN Status When the WLAN Adapter is turned on for the first time, the WLAN Adapter automatically scans and connects to a network with the best link quality and link strength. Once you connect to a wireless network, the WLAN Adapter will connect to that network each time the WLAN Adapter is turned on. The following table describes the labels in this screen. Table 3-2 WLAN Utility: WLAN Status LABEL DESCRIPTION 3-2 Using the Wireless LAN Utility LABEL Device Re-Connect Wireless LAN Utility Table 3-2 WLAN Utility: WLAN Status DESCRIPTION Select an available wireless card from the drop-down list menu if you have more than one wireless cards in your computer. Click Re-Connect to re-establish connection to the wireless device whose SSID is shown in the Current Service Set Identifier field. Current Channel This field displays the radio channel the WLAN Adapter is currently using. Current Transfer Rate Current Service Set Identifier Tx/Rx Frame This field displays the current transmission rate of the WLAN Adapter in megabits per second. This field displays the name of the wireless device to which the WLAN Adapter is associated. Transmitted This field displays the number of data frames transmitted. Received This field displays the number of data frames received. Link Quality Link Strength Percent/dBm The status bar and the percentage number show the quality of the signal. The status bar and the percentage number or a number in dBm show the strength of the signal. Click this button to display either percentages in the Link Quality and Link Strength fields or a number in dBm in the Link Strength field. 3.2.1 Common Screen Command Buttons The following table describes common command buttons on all WLAN Utility screens. Table 3-3 Common Screen Command Buttons BUTTON OK Cancel Help DESCRIPTION Click OK to save all changes and close the WLAN Utility. Click Cancel to discard changes and close the WLAN Utility. Click Help to display the on-line help window. 3.3 The About Screen The About screen displays related version numbers of the WLAN Adapter. You may click Help to view related help topics. Using the Wireless LAN Utility 3-3 Wireless LAN Utility Figure 3-3 WLAN Utility: About The following table describes the read-only labels in this screen. FIELD Driver Version Utility Version Firmware Version Table 3-4 WLAN Utility: About DESCRIPTION This field displays the version number of the WLAN Adapters driver. This field displays the version number of the WLAN Utility. This field displays the version of the firmware on which the driver and the utility are based. 3-4 Using the Wireless LAN Utility Wireless LAN Utility 3.4 Wireless LAN Parameters This section describes each wireless LAN parameter. 3.4.1 SSID The SSID (Service Set IDentity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. 3.4.2 Channel A range of radio frequencies used by IEEE 802.11b wireless devices is called a channel. 3.4.3 Tx Rate The WLAN Adapter provides various transmission (data) rate options for you to select. Options include Fully Auto, 1 M bit/sec, 2 M bit/sec, 5.5M bit/sec and 11M bit/sec. In most networking scenarios, the factory default Fully Auto setting proves the most efficient. This setting allows your WLAN Adapter to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the WLAN Adapter automatically switches to a lower transmission (data) rate. Transmission at lower data speeds is usually more reliable. However, when the communication quality improves again, the WLAN Adapter gradually increases the transmission (data) rate again until it reaches the highest available transmission rate. If you wish to balance speed versus reliability, you can select any of the above options 11M bit/sec or 5.5M bit/sec is used in a networking environment where you are certain that all wireless devices can communicate at the highest transmission (data) rate. 1M bit/sec or 2M bit/sec are used often in networking environments where the range of the wireless connection is more important than speed. 3.5 Wireless Network Type Wireless LAN works in either of the two modes: ad-hoc and infrastructure. To connect to a wired network within a coverage area using Access Points (APs), set the WLAN Adapters operation mode to Infrastructure. An AP acts as a bridge between the wireless stations and the wired network. In case you do not wish to connect to a wired network, but prefer to set up a small independent wireless workgroup without an AP, use the Ad-hoc (IBSS) (Independent Basic Service Set) mode. 3.5.1 Ad-Hoc (IBSS) Ad-hoc mode does not required an AP or a wired network. Two or more wireless clients communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). Using the Wireless LAN Utility 3-5 Wireless LAN Utility Figure 3-4 Ad-hoc Network Example To set up an ad-hoc network, configure all wireless clients in ad-hoc network type and use the same SSID and channel. 3.5.2 Infrastructure When a number of wireless clients are connected using a single AP, you have a Basic Service Set (BSS). Figure 3-5 BSS Example A series of overlapping BSS and a network medium, such as an Ethernet forms an Extended Service Set
(ESS) or infrastructure network. All communication is done through the AP, which relays data packets to other wireless clients or devices connected to the wired network. Wireless clients can then access resource, such as the printer, on the wired network. 3-6 Using the Wireless LAN Utility Wireless LAN Utility Figure 3-6 Infrastructure Network Example 3.6 Roaming In an infrastructure network, wireless clients are able to switch from one AP to another as they move between the coverage areas. During this period, the wireless client maintains uninterrupted connection to the network. This is roaming. As the wireless client moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization or other factors. The following figure depicts a roaming example. When Wireless Client B moves to position X, the WLAN Adapter in Wireless Client B automatically switches the channel to the one used by Access Point 2 in order to stay connected to the network. Using the Wireless LAN Utility 3-7 Wireless LAN Utility Figure 3-7 Roaming Example 3.7 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically. 3-8 Using the Wireless LAN Utility Wireless LAN Utility Figure 3-8 WLAN Utility: Site Survey The following table describes the fields in the Available Network table. Table 3-5 WLAN Utility: Site Survey FIELD SSID BSSID Channel Signal DESCRIPTION This field displays the SSID (or name) of each wireless network. This field displays the MAC address of the wireless network. This field displays the channel number used by each wireless network. This field displays the signal strength of each wireless network. Using the Wireless LAN Utility 3-9 Wireless LAN Utility FIELD WEP Table 3-5 WLAN Utility: Site Survey DESCRIPTION This field shows whether the WEP data encryption is activated (Enable) or inactive
(Disable). Click Search to scan for available wireless device within transmission range. Click Connect to associate to the selected wireless device. Search Connect The following table describes the colors used for the entries in the Site Survey screen. Table 3-6 Color Indicator for Link Quality/Link Strength COLOR Green Blue Red DESCRIPTION Excellent link quality or link strength. Good link quality or link strength. Poor link quality or link strength. 3.7.1 Connecting to a Network Follow the steps below to connect to a network. Step 1. Click Rescan to scan for all available wireless networks within range. Step 2. To join a network, either click an entry in the Available Network table to select a wireless network and then click Connect or double-click an entry. If the WEP Status field is Enable for the selected wireless network, the following screen displays. Figure 3-9 Site Survey Warning Step 3. Step 4. Click OK to display the Security screen and refer to Section 4.2 to set up WEP keys. Otherwise click Cancel and connect to another wireless network without WEP encryption. 3-10 Using the Wireless LAN Utility Wireless LAN Utility Step 5. To verify that you have successfully connected to the selected network, check the network information in the Link Info screen. 3.8 Configuring the Wireless Parameters Click Network Configuration in the WLAN Utility program to display the Network Configuration screen as shown next. Figure 3-10 WLAN Utility: Network Configuration Follow the instructions in the table below to configure the wireless LAN related parameters. Refer to the next section for Profile field descriptions. Using the Wireless LAN Utility 3-11 Wireless LAN Utility Table 3-7 WLAN Utility: Network Configuration FIELD DESCRIPTION Configuration Operating Mode Select Infrastructure(BSS) or Ad-Hoc(IBSS) from the drop-down list box. Service Set Identifier (SSID) Transfer Rate Channel Power Saving Mode Select Infrastructure(BSS) to associate to an AP. Select Ad-Hoc(IBSS) to associate to a peer ad-hoc computer. Refer to the Wireless Network Type section for more information. Enter the SSID of the AP or the peer ad-hoc computer to which you want to associate in this field. To associate to an ad-hoc network, you must enter the same SSID as the peer ad-hoc computer. Enter Any to associate to or roam between any infrastructure wireless networks. This is the default setting. Select a transmission speed from the drop-down list box. Choose from Fully Auto
(default), 1M bit/sec, 2M bit/sec, 5.5M bit/sec and 11M bit/sec. Select the channel number from the drop-down list box. To associate to an ad-hoc network, you must use the same channel as the peer ad-hoc computer. Select Enable from the drop-down list menu to save power (especially for laptop computers). This forces the WLAN Adapter to go to sleep mode when it is not transmitting data. When you select Disable, the WLAN Adapter will never go to sleep mode. Restore Default Click Restore Default to reset all fields back to factory default values. Undo Changes Apply Changes Click Apply Changes to save the changes back to WLAN Adapter. Click Undo Changes to start configuring the fields again. 3.9 Network Configuration Profile Setting The Profile in the Configuration screen allows you to save the wireless network settings in the Configuration screen, use one of the pre-configured network profiles or reset the settings in the Configuration screen to the factory default values. 3.9.1 Resetting to Factory Default Values To reset the fields in the Configuration screen back to factory default values select Default from the drop-
down list menu and click Activate. 3-12 Using the Wireless LAN Utility Wireless LAN Utility 3.9.2 Saving the Current Setting to a Profile To save the current settings in the Configuration screen to a new profile enter a descriptive name in the field provided and click Create. 3.9.3 Using a Pre-configured Profile To use a previously saved network profile select the profile file name from the drop-down list box and click Activate. 3.9.4 Deleting a Profile To delete an existing wireless network configuration select a profile from the drop-down list box and click Remove. Using the Wireless LAN Utility 3-13 Wireless LAN Utility Chapter 4 Wireless LAN Security Introduction This chapter shows you how to set up the wireless LAN security available in the WLAN Adapter. 4.1 Wireless LAN security is vital to your network to protect wireless communication between wireless clients and the wired network. Configure the wireless LAN security using the Security screen. If you do not enable any wireless security on your WLAN Adapter, communication between the WLAN Adapter and the wired network is accessible to any wireless networking device that is in the coverage area. 4.2 Data Encryption with WEP WEP (Wired Equivalent Privacy) encryption scrambles the data transmitted between the WLAN Adapter and the AP or other wireless stations to keep network communications private. It encrypts unicast and multicast communications in a network. Both the wireless clients and the access points must use the same WEP key for data encryption and decryption. Your WLAN Adapter allows you to configure up to four 64-bit or 128-bit WEP keys but only one key can be enabled at any one time. 4.2.1 Authentication Mode The IEEE 802.11b standard describes a simple authentication method between the wireless clients and AP. Three authentication modes are defined: Auto, Open and Shared. Open authentication mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen to any data transmitted plaintext. Shared authentication mode involves a shared secret key to authenticate the wireless station to the AP. This requires you to enable a security feature and specify a shared secret key (usually the WEP encryption and WEP key) on both the wireless station and the AP. Auto authentication mode allows the WLAN Adapter to switch between the open and shared key authentication modes automatically. Use the auto mode if you do not know the authentication mode of the other wireless clients. 4.2.2 Configuring the WEP Encryption Click the Security tab to display the Security screen as shown below. Wireless LAN Security 4-1 Wireless LAN Utility Figure 4-1 WLAN Utility: Security Follow the instructions in the table to configure the WEP encryptions. FIELD Encryption (WEP) Table 4-1 WLAN Utility: Security DESCRIPTION Select either 64 Bits or 128 Bits from the drop-down list box to activate WEP encryption and then fill in the related fields. Select Disable to deactivate the WEP encryption. WEP Key Entry The WEP keys are used to encrypt data before it is transmitted. The values for the keys must be set up exactly the same on the APs or other peer ad-hoc wireless computers as they are on the WLAN Adapter. Key Type Select either the HEX or ASCII WEP key type. 4-2 Wireless LAN Security Wireless LAN Utility Table 4-1 WLAN Utility: Security FIELD DESCRIPTION Key 1 4 Enter the WEP keys in the fields provided. If you select 64 Bits in the Encryption field.
Enter either 10 hexadecimal digits in the range of A-F, a-f and 0-9
(e.g. 11AA22BB33) for HEX key type or
Enter 5 printable ASCII characters (case sensitive) ranging from a-z, A-Z and 0-9 (e.g. MyKey) for ASCII key type. If you select 128 Bits in the Encryption field,
Enter either 26 hexadecimal digits in the range of A-F, a-f and 0-9
(for example, 00112233445566778899AABBCC) for HEX key type or
Enter 13 printable ASCII characters (case sensitive) ranging from a-
z, A-Z and 0-9 (for example, MyKey12345678) for ASCII key type. You must configure all four WEP keys the first time you use the WLAN Adapter. ASCII WEP keys are case sensitive. Click Restore Default to reset all fields back to factory default values. Click Undo Changes to start configuring the fields again. Click Apply Changes to save the changes back to WLAN Adapter. Restore Default Undo Changes Apply Changes Wireless LAN Security 4-3 Wireless LAN Utility Chapter 5 Advanced Configuration This chapter shows you how to configure advanced features of the WLAN Adapter. 5.1 Overview The following sections introduce the advanced features you can configure. 5.1.1 Threshold Control Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the WLAN Adapter will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS Threshold value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS Threshold size. RTS/CTS Threshold A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot hear each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 5-1 RTS Threshold Advanced Configuration 5-1 Wireless LAN Utility When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS Threshold is designed to prevent collisions due to hidden nodes. An RTS/CTS Threshold defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked. When a data frame exceeds the RTS/CTS Threshold value you set (between 0 to 2432 bytes), the station that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within its range to notify them to defer their transmission. It also reserves and confirms with the requesting station the time frame for the requested transmission. Stations can send frames smaller than the specified RTS/CTS Threshold directly to the AP without the RTS (Request To Send)/CTS (Clear to Send) handshake. You should only configure RTS/CTS Threshold if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead involved in the RTS
(Request To Send)/CTS (Clear to Send) handshake. If the RTS/CTS Threshold value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS Threshold size. Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. 5.1.2 Authentication Mode The IEEE 802.11b standard describes a simple authentication method between the wireless clients and AP. Three authentication modes are defined: Auto, Open and Shared. Open authentication mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen to any data transmitted plaintext. Shared authentication mode involves a shared secret key to authenticate the wireless station to the AP. This requires you to enable a security feature and specify a shared secret key (usually the WEP encryption and WEP key) on both the wireless station and the AP. Auto authentication mode allows the WLAN Adapter to switch between the open and shared key authentication modes automatically. Use the auto mode if you do not know the authentication mode of the other wireless clients. 5.1.3 Preamble Type A preamble is a signal used to synchronize the transmission timing in your wireless network. There are two preamble modes: Long and Short. 5-2 Advanced Configuration Wireless LAN Utility Long preamble mode allows more processing time for each transmitted data packet. Short preamble mode allows less processing time for the transmitted data packets. Using short preamble mode may minimize overhead and maximize network throughput. However, short preamble mode is supported by IEEE 802.11b compliant wireless devices, thus wireless stations using short preamble mode cannot communicate with wireless stations using the original IEEE 802.11 standard. 5.2 The Advanced Screen To set the advanced features on the WLAN Adapter, click the Advanced tab. Figure 5-2 WLAN Utility: Advanced The following table describes the fields in this screen. Advanced Configuration 5-3 Wireless LAN Utility FIELD Transmit Threshold Control Table 5-1 WLAN Utility: Advanced DESCRIPTION Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Move the slider to set the fragmentation threshold. RTS/CTS Threshold Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to zero turns on the RTS/CTS handshake. Move the slider to set the RTS/CTS threshold. Security Shared Mode
(Authenticate Access Point) Preamble Type Restore Default Undo Changes Apply Changes Select this checkbox to use a shared key to authenticate the access point. Refer to Section 5.1.2 for more information. Select a preamble type from the drop-down list menu. Choices are Long Preamble, Short Preamble and Auto. The default setting is Auto. Refer to Section 5.1.3 for more information. Click Restore Default to reset all fields back to factory default values. Click Undo Changes to start configuring the fields again. Click Apply Changes to save the changes back to WLAN Adapter. 5-4 Advanced Configuration Wireless LAN Utility Chapter 6 Removing and Upgrading the WLAN Utility This chapter describes how to uninstall or upgrade the WLAN Utility. 6.1 Removing the WLAN Utility Follow the steps below to remove (or uninstall) the WLAN Utility from your computer. Step 1. Click Start, Programs, IEEE 802.11bWireless LAN Utility, Uninstall IEEE 802.11b Package. Step 2. When prompted, click Yes to remove the driver and the utility software. Step 3. When prompted to restart your computer, click Yes and then click Finish. 6.2 Upgrading the WLAN Utility The WLAN Utility continually improves and changes with new driver upgrades. Visit OEM web site to find the most recent upgrades and information. Before you uninstall the driver, save the current network configuration. To perform the upgrade, follow the steps below. Step 1. Download the latest version of the driver save the file on your computer. Step 2. Follow the steps in the Removing the WLAN Utility section to remove the current WLAN Utility from your computer. Step 3. Restart the computer when prompted. Step 4. After restarting, refer to the procedure in the Quick Installation Guide to install the new utility Step 5. Check the version numbers in the About screen to make sure the new driver is installed software. properly. Removing and Upgrading the WLAN Utility 6-1 Wireless LAN Utility Chapter 7 Troubleshooting This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 7.1 Problems Starting the WLAN Utility Program Table 7-1 Troubleshooting Starting WLAN Utility Program Cannot start the WLAN Utility. Make sure the WLAN Adapter is properly inserted and the LED(s) is on. Refer to the Quick Installation Guide for the LED descriptions. Use the Device Manager to check for possible hardware conflicts. Click Start, Settings, Control Panel, System, Hardware and Device Manager. Verify the status of the WLAN Adapter under Network Adapter.
(Steps may vary depending on the version of Windows). Install the WLAN Adapter in another computer. If the error persists, you may have a hardware problem. In this case, you should contact your local vendor. Troubleshooting 7-1 Wireless LAN Utility 7.2 Problems Communicating With Other Computers Table 7-2 Troubleshooting Communication Problems CORRECTIVE ACTION PROBLEM The WLAN Adapter computer cannot communicate with the other computer. A. Infrastructure Make sure that the AP and the associated computers are turned on and working properly. Make sure the WLAN Adapter computer and the associated AP use the same SSID. Make sure that the computer and the AP share the same security option and key. Verify the settings in the Security screen. B. Ad-Hoc (IBSS) Verify that the peer computer(s) is turned on. Make sure the WLAN Adapter computer and the peer computer(s) are using the same SS ID and channel. Make sure that the computer and the peer computer(s) share the same security option and key. Change the wireless clients to use another radio channel if interference is high. 7.3 Problem with the Link Status PROBLEM The Link Quality bar indicator is red all the time. The Link Strength bar indicator is red all the time. Table 7-3 Troubleshooting Link Quality CORRECTIVE ACTION Move your computer closer to the AP or the peer computer(s) within the transmission range. There is too much radio interference (for example microwave) around your wireless network. Relocate or reduce the radio interference. Move your computer closer to the AP or peer computer(s) within the transmission range. There is too much radio interference (for example microwave) around your wireless network. Relocate or reduce the radio interference. 7-2 Troubleshooting Wireless LAN Utility PROBLEM The Survey screen displays all entries in red. Table 7-3 Troubleshooting Link Quality CORRECTIVE ACTION Move your computer closer to the AP or peer computer(s) within the transmission range. There is too much radio interference (for example microwave) around your wireless network. Relocate or reduce the radio interference. Troubleshooting 7-3 A Access Point....................................................1-1 Accessing the WLAN Utility..........................3-1 Additional Information to OEM Integrators .....vi Advanced Configuration.................................5-1 AP .............................................See Access Point Applications Ad-hoc ........................................................1-1 Infrastructure...............................................1-2 Authentication Mode............................... 4-1, 5-2 Auto .................................................... 4-1, 5-2 Open.................................................... 4-1, 5-2 Shared ................................................. 4-1, 5-2 Auto authentication mode ....................... 4-1, 5-2 B Basic Service Set.................................... See BSS BSS .................................................................3-6 C Certifications.....................................................vi Common Screen Command Buttons...............3-3 Communication Problem ................................7-2 Ad-hoc(IBSS) .............................................7-2 Infrastructure...............................................7-2 Connecting to a Network ..............................3-10 Copyright ...........................................................ii Disclaimer......................................................ii Trademarks ....................................................ii CTS (Clear to Send .........................................5-2 Customer Support ............................................vii D Data encryption...............................................4-1 Index Wireless LAN Utility Index E End Product Labeling........................................vi ESS..................................................................3-6 Extended Service Set...............................See ESS F FCC....................................................................v Federal Communications Commission (FCC) Interference Statement....................................v Fragmentation Threshold ................................5-1 H Hidden node ....................................................5-1 I IBSS ................................................................3-5 Important Note ..................................................vi IMPORTANT NOTE........................................vi Independent Basic Service Set ..............See IBSS Information for Canadian Users........................iv Caution..........................................................iv Note...............................................................iv N Network Configuration Profile......................3-12 Reset to factory defaults............................3-12 Saving........................................................3-13 Using pre-configured profile.....................3-13 Network Type .................................................3-5 Ad-Hoc(IBSS).............................................3-5 Infrastructure...............................................3-6 Notice.................................................................v A Wireless LAN Utility O Survery........................................................7-3 Open authentication mode .......................4-1, 5-2 Operating Mode......................See Network Type P Power Saving Mode...................................... 3-12 Preamble Mode...............................................5-2 Long............................................................5-3 Short............................................................5-3 Preface ............................................................. xii problem description ........................................7-1 Profile Network Configuration............................. 3-12 R Rate Transmission...............................................3-5 Related Documentation.................................... xii Roaming Example......................................................3-7 RTS (Request To Send) ..................................5-2 RTS/CTS handshake.......................................5-2 RTS/CTS Threshold .......................................5-1 S Shared authentication mode.....................4-1, 5-2 Site Survey......................................................3-9 Syntax Conventions......................................... xii System tray Icon Color Description................3-1 T Transfer Rate ................................................ 3-12 Transmission Speed...................................... 3-12 Troubleshooting..............................................7-1 Checking Hardware Conflict ......................7-1 Communication problems...........................7-2 Radio interference................................7-2, 7-3 Starting the WLAN Utility .........................7-1 U Using the WLAN Utility.................................3-1 Note.............................................................3-1 V Viewing Current Configuration ......................3-2 W Warranty ...........................................................iii WEP................................................................4-1 WEP Data Encryption Configuring.................................................4-1 WEP Data Encryption with.............................4-1 WEP Key ........................................................4-2 Type ............................................................4-2 Wired Equivalent Privacy..................... See WEP Wireless LAN .................................................1-1 Applications................................................1-1 Benefits.......................................................1-1 Wireless LAN Parameters...............................3-5 Channel.......................................................3-5 Configuring...............................................3-11 Network Type .............................................3-5 SSID............................................................3-5 Tx Rate........................................................3-5 Wireless LAN Security...................................4-1 Data Encryption with WEP.........................4-1 WLAN ....................................See Wireless LAN WLAN Utility About ..........................................................3-4 Before you upgrade.....................................6-1 Remove and Upgrade..................................6-1 Removing....................................................6-1 Site Survey..................................................3-9 Upgrading ...................................................6-1 WLAN Status..............................................3-2 B Index
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2003-10-24 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2003-10-24
|
||||
1 | Applicant's complete, legal business name |
ZyXEL Communications Corporation
|
||||
1 | FCC Registration Number (FRN) |
0021059092
|
||||
1 | Physical Address |
No.2, Industry East Road IX, Science Park
|
||||
1 |
Hsinchu, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
h******@americanTCB.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
I88
|
||||
1 | Equipment Product Code |
B-120
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
E******** B******
|
||||
1 | Title |
Section Manager
|
||||
1 | Telephone Number |
886 3******** Extension:
|
||||
1 | Fax Number |
886 3********
|
||||
1 |
E******@zyxel.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Intertek Testing Services Taiwan, Ltd.
|
||||
1 | Name |
E**** C******
|
||||
1 | Physical Address |
No. 11, Ko-Tze-Nan Chia-Tung Li
|
||||
1 |
Hsinchu, 300
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
+886 ******** Extension:
|
||||
1 | Fax Number |
+886 ********
|
||||
1 |
e******@intertek.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11b Mobile Module | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Single Modular Approval | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is Conducted. This transmitter shall not to be offered for sale to the general public. Modular Approval restricted to OEM installation in configurations where the antenna is at least 20cm from all persons. The OEM integrator must not provide information to the end user regarding how to install or remove this RF module in the users manual of the end product which will integrate this module. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and OEM integrators must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
A******** L******
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
a******@intertek.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0550000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC