Abocom Systems WM5200 User Manual

802.11n compliant 2.4GHz Mini-PCI Module
User’s Manual
REGULATORY STATEMENTS
FCC Certification
Part15, Class B
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
1) This device may not cause harmful interference, and
2) This device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Warning: Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment.
CAUTION
1. This Transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
2. For product available in the USA market, only channel 1~11 can be
operated. Selection of other channels is not possible.
Agency in the United States of America: Company Name: Xterasys Corporation Tel: 909-590-0600 Fax: 909-590-0388 Address: 4711 CHINO AVE. CHINO, CA91710
IMPORTANT NOTE:
This module is intended for OEM integrator. The OEM integrator is still responsible for the FCC compliance requirement of the end product, which integrates this module.
20cm minimum distance has to be able to be maintained between the antenna and the users for the host this module is integrated into. Under such configuration, the FCC radiation exposure limits set forth for an population/uncontrolled environment can be satisfied.
Any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment.
USERS MANUAL OF THE END PRODUCT:
In the users manual of the end product, the end user has to be informed to keep at least 20cm separation with the antenna while this end product is installed and operated. The end user has to be informed that the FCC radio-frequency exposure guidelines for an uncontrolled environment can be satisfied. The end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user's authority to operate this equipment. If the size of the end product is smaller than 8x10cm, then additional FCC part 15.19 statement is required to be available in the users manual: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation.
LABEL OF THE END PRODUCT:
The final end product must be labeled in a visible area with the following " Contains TX FCC ID: MQ4WM5200 ". If the size of the end product is larger than 8x10cm, then the following FCC part 15.19 statement has to also be available on the label: This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation.
Table of Contents
INTRODUCTION...................................................................................................1
WIRELESS NETWORK OPTIONS ...............................................................................1
The Peer-to-Peer Network......................................................................... 1
The Access Point Network........................................................................2
SOFTWARE INSTALLATION.............................................................................3
INSTALL THE DEVICE ..............................................................................................3
INSTALL THE DRIVER & UTILITY ............................................................................3
HARDWARE INSTALLATION............................................................................8
VERIFICATION ........................................................................................................8
NETWORK CONNECTION.................................................................................9
IN WINDOWS 2000/ XP ..........................................................................................9
IP ADDRESS .........................................................................................................11
CONFIGURATION UTILITY.............................................................................12
INTELLIGENT WIRELESS UTILITY..........................................................................13
Profile......................................................................................................13
Network...................................................................................................22
Advanced.................................................................................................27
Statistics...................................................................................................29
WMM / QoS............................................................................................32
WPS.........................................................................................................33
Radio On/Off...........................................................................................36
About....................................................................................................... 36
UNINSTALLATION.............................................................................................38
INTRODUCTION
The 802.11n compliant 2.4GHz Mini-PCI Module is a device that allows you connect your computer to a wireless local area network (LAN). A wireless LAN allows your system to use wireless Radio Frequency (RF) technology to transmit and receive data without physically attaching to the network. The Wireless protocols that come with this product ensure data security and isolation from interference generated by other radio frequencies.
This card also allows you to take full advantage of your computer’s mobility with access to real-time information and online services anytime and anywhere. In addition, this device eliminates the bother of pulling cable through walls and under furniture. It even allows you to place your system in locations where cabling is impossible. Modifying and augmenting networks has never been so easy.
Wireless Network Options
The Peer-to-Peer Network
This network installation lets you set a small wireless workgroup easily and quickly. Equipped with wireless PC Cards or wireless PCI, you can share files and printers between each PC and laptop.
-
1 -
You can also use one computer as an Internet Server to connect to a wired global network and share files and information with other computers via a wireless LAN.
The Access Point Network
The network installation allows you to share files, printers, and Internet access much more conveniently. With Wireless LAN Cards, you can connect wireless LAN to a wired global network via an Access Point.
-
2 -
SOFTWARE INSTALLATION
Install the device
1. Make sure the computer is turned off. Remove the expansion slot
cover from the computer.
2. Carefully slide the 802.11n compliant 2.4GHz Mini-PCI Module
into the mini PCI slot. Push evenly and slowly and ensure it is properly seated.
3. A fter the device has been connected to your computer, turn on your
computer. Windows will detect the new hardware and then automatically copy all of the files needed for networking.
Install the Driver & Utility
1. Exit all Windows programs. Insert the included CD-ROM into your
computer. The CD-ROM will run automatically.
2. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement “ then click Next to continue.
-
3 -
3. Select the check box to choose a Configuration Tool from the listed
two choices.
z Configuration Tool: Choose to use our configuration utility. z Microsoft Zero Configuration Tool: Choose to use Windows XP’s
built-in Zero Configuration Utility (ZCU).
Click Next to continue.
-
4 -
4. There are two modes for you to choose in this screen, either choose
WiFi mode or performance mode (TxBurst mode). This mode selection screen is set for the default mode shown in the utility screen, you can still change its mode later in the utility screen. Click Next to continue.
-
5 -
5. When you are prompted the following message, please click Install
to begin the installation.
-
6 -
6. When the following screen appears, click Finish to complete the
software installation.
-
7 -
HARDWARE INSTALLATION
Verification
To verify if the device exists in your computer and is enabled, go to Start > Control Panel > System (> Hardware) > Device Manager. Expand the Network Adapters category. If the 802.11n compliant 2.4GHz Mini-PCI Module is listed here, it means that your device is properly installed and enabled.
-
8 -
NETWORK CONNECTION
Once the device driver is well installed, a network setting described in the following should be also established.
In Windows 2000/ XP
1. (In Windows 2000)
Go to Start Æ Settings Æ Control Panel Æ Network and Dial-up
Connections Æ Local Area Connection Æ Properties.
(In Windows XP)
Go to Start Æ Control Panel Æ Network and Internet Connections Æ Network Connections Æ Wireless Network Connection Æ Properties.
-
9 -
2. Make sure that all the required components are installed.
3. If any components are missing, click on the Install… button to select the Client/Service/Protocol required. After selecting the component you need, click Add… to add it in.
4. For making your computer visible on the network, make sure you
have installed File and Printer Sharing for Microsoft Networks.
-
10 -
IP Address
Note: When assigning IP Addresses to the computers on the network, remember to have the IP address for each computer set on the same subnet mask. If your Broadband Router use DHCP technology, however, it won’t be necessary for you to assign Static IP Address for your computer.
1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP
technology), check the Obtain an IP Address Automatically option.
2. To configure a fixed IP address (if you broadband Router is not DHCP
supported, or when you need to assign a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for example, enter 192.168.1.254 in the IP address field, and 255.255.255.0 for the Subnet Mask.
-
11 -
CONFIGURATION UTILITY
After the Wireless adapter has been successfully installed, users can use the included Configuration Utility to set their preference.
Go to StartJ (All) ProgramsJ Ralink WirelessJ Ralink Wireless Utility.
You can also open the Configuration Utility by double clicking the icon or right clicking to select Launch Config Utilities.
-
12 -
Intelligent Wireless Utility
Profile
Profile can book keeping your favorite wireless setting among your home, office, and other public hot-spot. You may save multiple profiles, and activate the correct one at your preference. The Profile manager enables you to Add, Edit, Delete and Activate profiles.
-
13 -
Profile Tab
Profile Name
SSID
Network Type
Authentication Encryption Use 802.1x
Channel Power Save
Mode Tx Power
RTS Threshold Fragment
Threshold Add
You may enter a distinctive name of profile in this
column. The default is PROF# (# 1, #2, #3....)
The SSID is the unique name shared among all points in your wireless network.
Shows the network type of the device, including infrastructure and Ad-Hoc.
Shows the authentication mode. Shows the encryption type. Whether or not use 802.1x feature. Shows the selected channel that is currently in use. (There
are 13 channels available, depending on the country.) Choose from CAM (Constantly Awake Mode) or Power
Saving Mode. Transmit power, the amount of power used by a radio
transceiver to send the signal out. Shows the RTS Threshold of the device.
Shows the Fragment Threshold of the device. Click to add a profile from the drop-down screen.
System Configuration tab:
-
14 -
Profile Name: User can enter profile name, or use default
name defined by system. The default is PROF# (# 1, #2,
#3....).
SSID: The SSID is the unique name shared among all points in your wireless network. The name must be identical for all devices and points attempting to connect to the same network. User can use pull-down menu to select from available APs.
Power Save Mode:
CAM (Constantly Awake Mode): When this mode is
selected, the power supply will be normally provided even when there is no throughput.
PSM (Power Saving Mode): When this mode is
selected, this device will stay in power saving mode even when there is high volume of throughput.
Network Type: There are two types, infrastructure and Ad-hoc modes. Under Ad-hoc mode, user can also choose the preamble type, the available preamble type includes Auto and Long. In addition to that, the channel field will be available for setup in Ad-hoc mode.
-
15 -
The infrastructure is intended for the connection
between wireless network cards and an Access Point. With the wireless adapter, you can connect wireless LAN to a wired global network via an Access Point.
The Ad-hoc lets y ou set a small wireless workgroup
easily and quickly. Equipped with the wireless adapter, you can share files and printers between each PC and laptop.
Tx Power: Select the Tx power percentage from the pull-down list including Auto, 100%, 75%, 50%, 25%,
10% and Lowest. Preamble: A preamble is a signal used in wireless
environment to synchronize the transmitting timing including Synchronization and Start frame delimiter. Select from the pull-down menu to change the Preamble type into Auto or Long.
RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly. The default value is 2347. RTS/CTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. If the “Hidden Node” problem is an issue, users have to specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the value you set.
This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor modifications of this value are recommended.
Fragment Threshold: User can adjust the Fragment threshold number by sliding the bar or key in the value directly. The default value is 2346. The mechanism of Fragmentation Threshold is used to improve the efficiency when high traffic flows along in the wireless network. If your Wireless LAN Adapter often transmits large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346.
-
16 -
Authentication and Encryption tab:
Authentication Type: There are seven type of
authentication modes including Open, Shared, Leap, WPA, WPA-PSK, WPA2, WPA2-PSK, and WPA-None.
Open: If your access point/wireless router is using
"Open” authentication, then the wireless adapter will need to be set to the same authentication type.
Shared: Shared Key is when both the sender and the
recipient share a secret key.
LEAP: Light Extensible Authentication Protocol. It is
an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication (only with CCX mode enabled.)
WPA-PSK: WPA-PSK offers two encryption
methods, TKIP and AES. Select the type of algorithm,
-
17 -
TKIP or AES and then enter a WPA Shared Key of 8-63 characters in the WPA Pre-shared Key field.
Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 length.
WEP Key: Only valid when using WEP encryption algorithm. The key must match with the AP’s key. There are several formats to enter the keys.
Hexadecimal (40bits): 10 Hex characters.
Hexadecimal (128bits): 32Hex characters.
ASCII (40bits): 5 ASCII characters.
ASCII (128bits): 13 ASCII characters.
Show Password: Check this box to show the password
you entered.
802.1x Setting: When user use radius server to authenticate client certificate for WPA authentication mode.
802.1x tab:
-
18 -
EAP Method:
PEAP: Protect Extensible Authentication Protocol.
PEAP transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.
TLS / Smart Card: Transport Layer Security.
Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.
TTLS: Tunneled Transport Layer Security. This
security method provides for certificate-based, mutual authentication of the client and network through an
-
19 -
encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.
EAP-FAST: Flexible Authentication via Secure
Tunneling. It was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning is an in-band, over the air, distribution. For tunnel authentication, only support "Generic Token Card" authentication now.
MD5-Challenge: Message Digest Challenge.
Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network.
Tunnel Authentication:
Protocol: Tunnel protocol, List information including
EAP-MSCHAP v2, EAP-TLS/Smart card, and Generic Token Card.
Tunnel Identity: Identity for tunnel.
Tunnel Password: Password for tunnel.
Session Resumption: User can click the box to enable or disable this function.
ID\PASSWORD tab:
-
20 -
ID/ PASSWORD: Identity and password for server.
Authentication ID / Password: Identity, password
and domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain name can be keyed in blank space.
Tunnel ID / Password: Identity and Password for
server.
OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit.
Client Certification tab:
Client Certification: Client Certicate for server
authentication. Use Client certification: Choose to enable server authentication.
OK: Click to save settings and exit this page. Cancel: Click call off the settings and exit.
Server Certification tab:
-
21 -
Delete Edit Activate
Use Certificate chain: Choose use server that issuer of
certificates. Allow intimidate certificates: It must be in the server
certificate chain between the server certificate and the server specified in the certificate issuer must be field.
Server name: Enter an authentication sever root. Server name must match exactly: Click to enable or
disable this function. Domain name must end in specified name: Click to
enable or disable this function.
OK: Click to save settings and exit this page. Cancel: Click call off the settings and exit.
Click to delete an existing profile. Click to edit a profile. Click to make a connection between devices.
Network
The Network page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Network type, Channel, Wireless mode, Security-Enabled and Signal.
-
22 -
Network Tab
Sorted by
Show dBm
SSID Network Type
Channel Wireless mode
Indicate that AP list are sorted by SSID, Channel or Signal. Check the box to show the dBm of the AP list. Shows the name of BSS network. Network type in use, Infrastructure for BSS, Ad-Hoc for
IBSS network. Shows the currently used channel. AP support wireless mode. It may support 802.11a,
802.11b, 802.11g or 802.11n wireless mode.
-
23 -
Encryption
Signal Rescan Connect
Add to Profile
Link status
Status
Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, and Not Use.
Shows the receiving signal strength of specified network. Click to refresh the AP list. Select an item on the list and then click to make a
connection. Select an item on the list and then click to add it into the
profile list.
Shows the current connection status. If there is no connection existing, it will show Disconnected.
Extra Info Channel Authentication
Encryption
Network Type
IP Address Sub Mask Default
Gateway Link Quality
Shows the link status. Shows the current channel in use. Authentication mode used within the network, including
Unknown, WPA-PSK, WPA2-PSK, WPA and WPA2. Shows the encryption type currently in use. Valid value
includes WEP, TKIP, AES, and Not Use. Network type in use, Infrastructure for BSS, Ad-Hoc for
IBSS network. Shows the IP address information. Shows the Sub Mask information.
Shows the default gateway information.
Shows the connection quality based on signal strength and
-
24 -
Signal Strength 1, 2 and 3
Noise Strength
TX/RX packet error rate. Shows the Receiving signal strength, you can choose to
display as percentage or dBm format.
Shows the noise signal strength.
Transmit
Receive
Link Speed Throughput
Shows the current Link Speed and Throughput of the transmit rate.
Shows the current Link Speed and Throughput of receive rate.
Shows the current transmitting rate and receiving rate. Shows the transmitting and receiving throughput in the
unit of K bits/sec.
AP information
When you double click on the intended AP, you can see AP's detail information that divides into three parts. They are General, WPS, CCX information. The introduction is as following:
General
General information contain AP's SSID, MAC address, Authentication Type, Encryption Type, Channel, Network Type, Beacon Interval, Signal Strength and Supported Rates.
OK: Click this button to exit the information screen.
-
25 -
WPS
WPS information contains Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands.
Authentication Type: There are four types of authentication modes supported by RaConfig. They are open, Shared, WPA-PSK and WPA system.
Encryption Type: For open and shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
Config Methods: Correspond to the methods the AP supports as an Enrollee for adding external Registrars.
Device Password ID: Indicate the method or identifies the specific password that the selected Registrar intends to use.
Selected Registrar: Indicate if the user has recently activated a Registrar to add an Enrollee. The values are "TRUE" and "FALSE".
State: The current configuration state on AP. The values are "Unconfigured" and "Configured".
Version: WPS specified version. AP Setup Locked: Indicate if AP has entered a setup locked state. UUID-E: The universally unique identifier (UUID) element
generated by the Enrollee. There is a value. It is 16 bytes. RF Bands: Indicate all RF bands available on the AP. A
dual-band AP must provide it. The values are "2.4GHz" and "5GHz".
OK: Click this button to exit the information screen.
-
26 -
CXX
CCX information contains CCKM, Cmic and Ckip information. OK: Click this button to exit the information screen.
Advanced
This Advanced page provides advanced and detailed settings for your wireless network.
-
27 -
Advanced Tab
Wireless mode
Enable Tx Burst Enable TCP
Window Size Fast Roaming at
Show
Select wireless mode. There are 802.11b/g/n mixed,
802.11b only and 802.11b/g mixed modes are supported. Default mode is 802.11b/g/n mixed.
Check to enable the burst mode. Check to increase the transmission quality. Check to set the roaming interval, fast to roaming, setup
by transmits power. When you connect AP with authentication, choose
-
28 -
Authentication Status Dialog
Select Your Country Region Code
Enable CCX (Cisco Compatible extensions)
Apply
whether show "Authentication Status Dialog" or not. Authentication Status Dialog displays the process about
802.1x authentications. Select your country region code from the pull-down
menu. Check to enable the CCX function.
Turn on CCKM
Enable Radio Measurements: Check to enable the
Radio measurement function.
Non-Serving Measurements limit: User can set channel
measurement every 0~2000 milliseconds. Default is set to 250 milliseconds.
Click to apply above settings.
Statistics
The Statistics screen displays the statistics on your current network settings.
-
29 -
Transmit
Frames Transmitted Successfully
Shows information of frames successfully sent.
Frames Retransmitted Successfully
Frames Fail To Receive ACK After All Retries
RTS Frames Successfully Receive CTS
Shows information of frames successfully sent with one or more reties.
Shows information of frames failed transmit after hitting retry limit.
Shows information of successfully receive CTS after sending RTS frame
-
30 -
RTS Frames Fail To Receive CTS
Shows information of failed to receive CTS after sending RTS.
Reset Counter
Click this button to reset counters to zero.
Receive Statistics
Frames Received Successfully
Frames Received With CRC Error
Shows information of frames Received Successfully.
Shows information of frames received with
-
31 -
CRC error.
Frames Dropped Due To Out-of-Resource
Duplicate Frames Received
Reset Counter
Shows information of frames dropped due to resource issue.
Shows information of duplicate received frames.
Click this button to reset counters to zero.
WMM / QoS
The WMM page shows the Wi-Fi Multi-Media power save function and Direct Link Setup that ensure your wireless network quality.
-
32 -
WMM Enable
WMM- Power Save Enable Direct Link Setup Enable MAC Address
Timeout Value
Apply Tear Down
Check the box to enable Wi-Fi Multi-Media function.
Select which ACs you want to enable. Check the box to enable Direct Link Setup.
The setting of DLS indicates as follow : Fill in the blanks of Direct Link with MAC
Address of STA, and the STA must conform to two conditions:
Connecting with the same AP that supports
DLS feature.
DSL enabled. Timeout Value represents that it disconnect
automatically after few seconds. The value is integer that must be between 0~65535. It represents that it always connects if the value is zero. Default value of Timeout Value is 60 seconds.
Click this button to apply the settings. Select a direct link STA, then click "Tear Down"
button to disconnect the STA.
WPS
The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and manage ment of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push Button Configuration) method through an internal or external Registrar.
-
33 -
WPS AP List
Rescan
Information
Display the information of surrounding APs with WPS IE from last scan result. List information included SSID, BSSID, Channel, ID (Device Password ID), Security-Enabled.
Issue a rescan command to wireless NIC to update information on surrounding wireless network.
Display the information about WPS IE on the selected network. List information included Authentication Type,
-
34 -
Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands.
PIN Code
Config Mode
Detail Connect
Rotate
Disconnect
PIN
PBC
8-digit numbers. It is required to enter PIN Code into Registrar using PIN method.
Our station role-playing as an Enrollee or an external Registrar.
Information about Security and Key in the credential.
Command to connect to the selected network inside credentials. The active selected credential is as like as the active selected Profile.
Command to rotate to connect to the next network inside credentials.
Stop WPS action and disconnect this active link. And then select the last profile at the Profile Page. If there is an empty profile page, the driver will select any non-security AP.
Start to add to Registrar using PIN (Personal Identification Number) configuration method. If STA Registrar, remember that enter PIN Code read from your Enrollee before starting PIN.
Start to add to AP using PBC (Push Button Configuration) method.
WPS associate IE
WPS probe IE
Send the association request with WPS IE during WPS setup. It is optional for STA.
Send the probe request with WPS IE during WPS setup.
-
35 -
It is optional for STA.
Progress Bar Status Bar
Radio On/Off
Click this icon to turn on radio function.
Click this icon to turn off radio function.
About
Click this button to show the information of the wireless card including,
Display rate of progress from Start to Connected status.
Display currently WPS Status.
RaConfig Version/ Date, Driver Version/ Date, EEPROM Version, Firmware Version and Phy_Address.
-
36 -
-
37 -
UNINSTALLATION
In case you need to uninstall the utility and driver, please refer to below steps. (As you uninstall the utility, the driver will be uninstalled as well.)
1. Go to Start Æ Programs ÆRalink Wireless Æ Uninstall.
-
38 -
2. Select Remove all button and click Next to start uninstalling.
3. Click Yes to complete remove the selected application and all of its
features.
-
39 -
4. Select “Yes, I want to rest art my computer now” and then click
Finish to complete the uninstallation.
-
40 -
Loading...