Rosewill RNX-N360PC User Manual

Page 1
Wireless N PCI Adapter RNX-N360PC
User Manual
1910020413
Page 2
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to pro-vide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not in-stalled and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
z Reorient or relocate the receiving antenna.
z Increase the separation between the equipment and receiver.
z Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
z Consult the dealer or an experienced radio/ TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1). This device may not cause harmful interference.
2). This device must accept any interference received, including interference that may cause undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter.
“To comply with FCC RF exposure compliance requirements, this grant is applicable to only Mobile Configurations. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.”
CE Mark Warning
This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
Page 3
National Restrictions
2400.0-2483.5 MHz
Country Restriction Reason/remark
Bulgaria General authorization required for outdoor
use and public service
France Outdoor use limited to 10
mW EIRP. within the band 2454-2483.5 MHz
Italy If used outside of own premises, general
Luxembourg General authorization required for network
Norway Implemented
Russian Federation
Note: Please don’t use the product outdoors in France
Only for indoor applications
Military Radiolocation use. Refarming of the
2.4 GHz band has been ongoing in recent years to allow current relaxed regulation. Full implementation planned 2012
authorization is required
and service supply(not for spectrum)
This subsection does not apply for the geographical area within a radius of 20 km from the centre of Ny-Ålesund
Page 4
Table of Content
Package Contents..........................................................................................1
Chapter 1 Overview ......................................................................................2
1.1 Overview of the product...................................................................2
1.2 Features...........................................................................................2
1.3 LED Status.......................................................................................3
Chapter 2 Installation Guide ........................................................................4
2.1 Hardware Installation .......................................................................4
2.2 Software Installation.........................................................................4
2.2.1 Ov
2.2.2 Software Installation for Windows XP
2.2.3 Software Installation for Windows Vista
2.2.4 Software Installation for Windows 7
erview .............................................................................................. 4
................................................... 4
................................................ 9
.................................................... 12
Chapter 3 Configuration Guide .................................................................16
3.1 Current Status................................................................................16
3.2 Profile Management.......................................................................17
3.2.1 Add or Modify
3.2.2 Remove a profile
3.2.3 Switch a profile
3.2.4 Ex
3.2.5 Import a Prof
3.2.6 Scan Av
3.2.7 Auto Profile
port a profile ................................................................................... 23
a Configuration Profile ................................................. 18
................................................................................ 22
................................................................................... 22
ile ................................................................................... 23
ailable Networks.................................................................... 24
Selection Management ................................................... 24
3.3 Diagnostics ....................................................................................25
3.3.1 Check Driv
3.3.2 Check Receive and Transmit Statistica
er Information.................................................................... 26
l Information .......................... 26
3.4 Configuration for Windows Vista....................................................27
3.5 Configuration for Windows 7..........................................................29
Chapter 4 WPS Configuration ...................................................................32
4.1 PBC (Push Button Configuration) method .....................................32
4.2 PIN method....................................................................................34
4.2.1 Enter a PIN i
4.2.2 Enter the PI
nto your AP device ......................................................... 34
N from your AP device..................................................... 36
Appendix A: Specifications.........................................................................37
Appendix B: Glossary .................................................................................38
Appendix C: FAQ .........................................................................................40
Page 5
Package Contents
The following items should be found in your package:
¾ One RNX-N360PC Wireless N PCI Adapter
¾ Quick Installation Guide
¾ One Resource CD for RNX-N360PC, including:
Wireless N Client Utility and Drivers
User Guide
Other Helpful Information
Note:
)
Make sure that the package contains the above items. If any of the listed items are damaged or missing, please contact with your distributor.
Conventions:
The ‘Adapter’ mentioned in this user guide stands for RNX-N360PC Wireless N PCI Adapter without any explanations.
1
Page 6

Chapter 1 Overview

Thank you for choosing RNX-N360PC Wireless N PCI Adapter.

1.1 Overview of the product

The adapter is an 802.11n client device; it is designed to provide a high-speed and unrivaled wireless performance for your notebook. With a faster wireless connection, you can get a better Internet experience, such as downloading, gaming, video streaming and so on.
With the 802.11n technology, higher throughput improvements using MIMO (multiple input, multiple output antennas), the RNX-N360PC’s auto-sensing capability allows high packet transfer rate of up to 300Mbps for maximum throughput. It has good capability on anti-jamming, and it can also interoperate with other wireless (802.11b) products. The adapter supports WEP, WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed.
The adapter is easy to install and manage. The Quick Setup Wizard guides you step-by-step through the installation process; the Wireless N Client Utility helps you create a wireless connection immediately.
With unmatched wireless performance, reception, and security protection, the RNX-N360PC is the best choice for easily adding or upgrading wireless connectivity to your notebook computer.

1.2 Features

¾ Complies with IEEE802.11n, IEEE802.11g, IEEE802.11b standards
¾ Supports WPA/WPA2 data security, IEEE802.1x authentication, TKIP/AES encryption,
64/128/152-bit WEP encryption
¾ Supports high rate of up to 300Mbps for maximum throughput, supports automatically
adjust to lower speeds due to distance or other operating limitations
2
Page 7
¾ Provides 32-bit PCI interface
¾ Supports Ad-Hoc and Infrastructure modes
¾ Good capability on anti-jamming
¾ Supports roaming between access points when configured in Infrastructure mode
¾ Ease to configure and provides monitoring information
¾ Supports Windows 2000/ XP/ Vista/ 7
¾ Three External antennas which are listed in a format of 3x3 for three receivers and
three transmitters.

1.3 LED Status

LED Indications Status Working Status
Status Solid Light
Flashing Slowly
Activity
Flashing Quickly The adapter is transmitting or receiving data.
The adapter is inserted in the slot and the power is on.
The adapter is trying to scan a networking connection;
The adapter is already connected but is not transmitting or receiving data.
3
Page 8

Chapter 2 Installation Guide

2.1 Hardware Installation

To install the adapter, follow these steps listed below:
1. Turn off your desktop PC and disconnect the power.
2. Remove your PC case and locate an available PCI slot on the motherboard. Remove the metal slot cover on the back of the PC. Check with your computer manufacturer for instructions if needed.
3. Slide the PCI Adapter into the PCI slot. Make sure that all of its pins are touching the slot's contacts. Once the adapter is firmly in place, secure its fastening tab to your PC's chassis with a mounting screw. Then, close your PC case.
4. Reconnect your PC’s power and turn on your desktop PC.

2.2 Software Installation

2.2.1 Overview

The Adapter’s Setup Wizard will guide you through the Installation procedure for Windows 2000/ XP/ Vista/ 7. The Setup Wizard will install the Wireless N Client Utility and drivers.
When you install the hardware prior to before installing the software, the system will prompt “Found New Hardware Wizard”, click Cancel, and run the Setup Wizard program on the CD-ROM.
The Setup steps for Windows 2000/ XP/ Vista/ 7 are very similar. The following setup steps are for Windows XP and for Windows Vista.

2.2.2 Software Installation for Windows XP

1. Insert the Resource CD into your CD-ROM drive, and open the folder named RNX-N360PC. Double-click Setup.exe in the proper folder to start the installation, and then the following screen for preparing setup will appear.
4
Page 9
Figure 2-1
2. Soon, Figure 2-2 will display after a moment. Click Next to continue.
Figure 2-2
3. After that, you should choose a Setup type. It is recommended that you select Install Client Utilities and Driver. Select Install Driver Only to install driver only (shown in Figure 2-3). Click Next to continue.
5
Page 10
Figure 2-3
4. Click Browse to change the destination location for the software, then click Next in the screen below (shown in Figure 2-4).
Figure 2-4
5. After that, select the program folder, you should create a new folder name or select one from the Existing Folders list. It is recommended that you keep the default setting. Click Next to continue the installation.
6
Page 11
Figure 2-5
6. Choose configuration tool, if you are not sure, please leave it default. Then click Next to continue.
Figure 2-6
7. Wait a while for the setup as shown in Figure 2-7.
7
Page 12
Figure 2-7
Note:
)
1) For Windows XP, the Setup Wizard will notify you of how to proceed with the
installation duringthese steps (shown inFigure 2-8). Our drivers have be thoroughly, and are able to work with the operating system. Click Continue Anyway to continue the Installation.
en tested
Figure 2-8
2) In Windows 2000, the warning screen is shown below (Figure 2-9), and please
8
Page 13
select Yes to continue installation.
Figure 2-9
8. After all the steps above, you will see the screen below, click Finish to complete the installation.
Figure 2-10

2.2.3 Software Installation for Windows Vista

1. Insert the Resource CD into your CD-ROM drive, and open the folder named
RNX-N360PC. Double-click Setup.exe in the proper folder to start the installation,
9
Page 14
then the following screen for preparing setup will appear.
Figure 2-11
2. Soon, Figure 2-12 will display after a moment. Click Next to continue.
3. Click Yes to continue.
Figure 2-12
10
Page 15
Figure 2-13
4. The following page will display and please wait a moment.
Figure 2-14
Note:
)
For Windows Vista, the Setup Wizard will notify you of how to proceed with the installation during these steps (shown in Figure 2-15). Ou are able to work with the operating system. Click Install this driver software anyway to continue the Installation.
r drivers have been tested thoroughly, and
11
Page 16
Figure 2-15
5. Click Finish to complete the installation.
Figure 2-16

2.2.4 Software Installation for Windows 7

1. Insert the Resource CD into your CD-ROM drive. To continue, find the CD/DVD drive where the installation CD was placed. Open RNX-N360PC folder, and double-click Setup.exe. Then you will see Figure 2-17.
12
Page 17
Figure 2-17
2. Soon, Figure 2-18 will display after a moment. Click Next to co
Figure 2-18
ntinue.
3. Wait a while for the setup as shown in Figure 2-19.
13
Page 18
Figure 2-19
Note:
)
For Windows 7, the Setup Wizard will notify you about the Windows Security with the installation during these steps (shown in Figure 2-20). Our drivers have been tested thoroughly, and are able to work with the operating system. Click Install this driver software anyway to continue the installation.
Figure 2-20
4. Then you will see Figure 2-21. Click Fin
ish to complete.
14
Page 19
Figure 2-21
15
Page 20

Chapter 3 Configuration Guide

RNX-N360PC can be configured by Wireless N Client Utility. This chapter describes how to configure your Adapter for wireless connectivity on your Wireless Local Area Network (WLAN) and use the data security encryption features.
After Installing the Adapter, the Adapter’s tray icon
appears at the bottom of the screen, and shows the signal strength using color and the received signal strength indication (RSSI).
If the icon is gray, there is no connection.
If the icon is red, there is poor signal strength and the RSSI is less than 5dB.
If the icon is yellow, there is poor signal strength and the RSSI is between 5dB and
10dB.
If the icon is green, there is good signal strength and the RSSI is between 10dB and
20dB.
If the icon is green, there is excellent signal strength and the RSSI is more than 20dB.
Double-click the icon and the Wireless N Client Utility will run. You can also run the utility by clicking the Start All programs rosewill Wireless N Client Utility Wireless Client Utility. The Wireless N Client Utility provides some integrated and easy tools to:
¾ Display current status information
will appear in your system tray. It
¾ Edit and add configuration profiles ¾ Display current diagnostics information
The section below introduces these above capabilities.

3.1 Current Status

The Current Status tab contains general information about the program and its operations. The Current Status tab needn’t any configurations.
16
Page 21
Figure 3-1
The following table describes the items found on the Current Status screen.
¾ Profile Name - This shows the name of current selected configuration profile. The
configuration of Profile name will be described on the General tab of Profile Management.
¾ Link Status - This shows whether the station is associated to the wireless network.
¾ Wireless Mode - Here displays the wireless mode.
¾ Network Type - The type of network and the station currently connected are shown
here. The options include:
Infrastructure (Access Point)
Ad Hoc
Note:
)
You can configure the network type and wireless mode on the
Management
¾ IP Address - This displays the computer’s IP address.
¾ Control Channel - This shows the currently connected channel.
.
Advanced
tab of
Profile
¾ Data Encryption - Here displays the encryption type the driver is using. You can
configure it on the Security tab of Profile Management.
¾ Server Based Authentication - This shows whether the server based authentication
is used.
¾ Signal Strength - This shows the strength of the signal.
Click Advanced on the screen above, you can see advanced information about the program and its operations.

3.2 Profile Management

Click the Profile Management tab of the Wireless N Client Utility and the next screen will appear (shown in Figure 3-2). The Profile Management screen provides tools to:
17
Page 22
¾ Add a new profile
¾ Modify a Profile
¾ Remove a Profile
¾ Activate a Profile
¾ Import a Profile
¾ Export a Profile
¾ Scan Available Networks
¾ Order profiles
Figure 3-2

3.2.1 Add or Modify a Configuration Profile

To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration profile from the Profile list and click Modify. Then you will see the Management dialog box (shown in Figure 3-3).
Edit the General tab
1.
¾ Profile Name - Please enter the Profile name which identifies the configuration
profile. This name must be unique. Note that the profile names are not case-sensitive.
¾ Client Name - Please enter the Profile name which identifies the client machine.
¾ Network Names (SSIDs) - Please enter the IEEE 802.11 wireless network name.
This field has a maximum limit of 32 characters.
18
Page 23
Figure 3-3
2. Edit the Security tab
Select the Security tab in the screen above, and then you can edit the fields to configure the profile. To define the security mode, select the radio button of the desired security mode as follows.
Figure 3-4
¾ WPA/WPA2: Wi-Fi Protected Access
¾ WPA/WPA2 Passphrase: Wi-Fi Protected Access Passphrase
¾ 802.1x: Enables 802.1x security.
¾ Pre-Shared Key (Static WEP): Enables the use of shared keys that are defined on
19
Page 24
both the access point and the station. To define shared encryption keys, choose the Shared Key radio button and click Configure to fill in the Define Shared Keys window (shown in Figure 3-5).
Note:
)
The
¾ None: No security (not recommended).
)
If the access point which the Adapter is associated has WEP set and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security tab to allow
802.11 Authentication Mode as appropriate on the Advanced tab of this Profile
Management dialog.
To configure the Encryption Keys under the Pre-Shared keys (Static WEP) Security mode:
security mode is not available for 802.11n.
WEP
Note:
association. To complete WEP encryption configuration, you must select the
Figure 3-5
Note:
)
Select different Security Options, the configurations are different; you can select the appropriate security option and configure the exact key as your need.
3. Edit the Advanced tab
This screen below allows you to make advanced configuration for the profile.
20
Page 25
Figure 3-6
¾ Power Save Mode - Please select the power save mode in the drop-down list.
Maximum-Selects maximum mode to let the access point buffer incoming
messages for the Adapter. The Adapter will detect the access point if any messages are waiting periodically.
Normal -Normal mode uses maximum when retrieving a large number of
packets, then switches back to power save mode after retrieving the packets.
Off - Turns power saving off, thus powering up the Wireless PCI Adapter
continuously for a short message response time.
¾ Network Type: There are basically two modes of networking:
Infrastructure- All wireless clients will connect to an access point or wireless
router.
Ad-Hoc- Directly connecting to another computer, for peer-to-peer
communication, using wireless network adapters on each computer, such as two or more RNX-N360PC wireless adapters.
Note:
)
1) An Infrastructure network contains an Access Point or wireless router. All the wireless devices or clients will connect to the wireless router or access point.
2) An Ad-Hoc network contains only clients, such as laptops with wireless desktop
adapters. All the adapters must be in Ad-Hoc mode to communicate.
¾ Wireless Mode: Specifies 2.4 GHz 300 Mbps, 2.4 GHz 54 Mbps or 2.4 GHz 11 Mbps
operation in an access point network. The Wireless adapter must match the wireless mode of the access point with which it associates.
¾ Wireless Mode when Starting Ad Hoc Network: S
to start an Ad Hoc network if no matching network name is found after scanning all available modes. This mode also allows the selection of the channel that the Wireless
21
pecifies 2.4 GHz 300/54/11 Mbps
Page 26
Adapter uses. The channels available depend on the regulatory domain. If the adapter finds no other ad hoc adapters, the channel that the adapter starts the ad hoc network with will be selected automatically. The Adapter must match the wireless mode and channel of the clients it associates.
¾ 802.11 Authentication Mode: Select which mode the Adapter uses to authenticate
to an access point:
Auto causes the adapter to attempt authentication using shared, but switches it
to open authentication if shared fails.
Open enables an adapter to attempt authentication regardless of its WEP
settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match.
Shared only allows the adapter to associate with access points that have the
same WEP key.
For infrastructure (Access Point) networks, click Preferred APs… to specify four access points at most to the client adapter that attempts to be associated to the access points. The four access points have different priorities; the frontal has the higher priority.
Figure 3-7

3.2.2 Remove a profile

1. Go to the Profile Management tab (shown in Figure 3-2).
2. Select the profile name in the Profiles List.
3. Click Remove.
Note:
)
The profile being used can’t be removed.

3.2.3 Switch a profile

1. Go to the Profile Management screen (shown in Figure 3-2).
2. Select the profile name required in the Profiles List.
3. Click Activate.
22
Page 27

3.2.4 Export a profile

1. From the Profile Management screen (shown in Figure 3-2), highlight the profile to
export.
2. Click Export…, the Export Profile window will then appear below.
3. Browse the directory to export the profile to.
4. Click Save. The profile should then be exported to the specified location.
Figure 3-8

3.2.5 Import a Profile

1. From the Profile Management screen (shown in Figure 3-2), click Import…. Then the Import Profile will appear below.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open, the imported profile will then appear in the Profiles List.
23
Page 28
Figure 3-9

3.2.6 Scan Available Networks

1. Click Scan on the Profile Management screen (shown in Figure 3-2), the Available Infrastructure and Ad Hoc Networks window will appear below.
2. Click Refresh to refresh the list at any time.
3. Highlight a network name and click Activate to connect to an available network. If no configuration profile exists for that network, the Profile Management window will open the General tab screen. Fill in the Profile name and click OK to create the configuration profile for that network.
Figure 3-10

3.2.7 Auto Profile Selection Management

The auto selection feature allows the adapter to automatically select a profile from the list of profiles and use it to connect to the network. To add a new profile into the Auto Selected Profiles list, please follow these steps.
1. On the Profile Management screen (shown in Figure 3-2), click Order Profiles….
2.
The Auto Profiles Selection management window will appear (shown in Figure 3-11) with a list of
all created profiles in the Available Profiles.
24
Page 29
Figure 3-11
3. Highlight the profiles to add to auto profile selection, and click Add. The profile will appear in the Auto Selected Profiles box.
4. Highlight a profile in the Auto Selected Profiles box.
5. Click Move Up or Move Down as appropriate.
Note:
)
The first profile in the Auto Selected Profiles box has highest priority, while the last profile has the lowest priority.
6. Click OK.
7. Check the Auto Select Profiles checkbox on the Profile Management tab (shown in Figure 3-2).
Note:
)
When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the client adapter will scan for an available network. The profile with the
highest priority and the same SSID as one of the found networks will be used to connect to the network. If the connection fails, the client adapter will try the next highest priority profile that matches the SSID until an available network is found.

3.3 Diagnostics

The Diagnostics tab of the Wireless N Client Utility provides buttons used to retrieve receiving and transmitting statistics. The Diagnostics tab does not require any configuration.
The Diagnostics tab lists the following receiving and transmitting diagnostics for frames received or transmitted by the wireless network adapter:
¾ Multicast frames transmitted and received
25
Page 30
¾ Broadcast frames transmitted and received
¾ Unicast frames transmitted and received
¾ Total bytes transmitted and received
Figure 3-12

3.3.1 Check Driver Information

Click the Adapter Information button in the screen above, you will see the adapter information, including general information about the wireless network adapter and the Network Driver Interface Specification (NDIS) driver. Access the adapter information from the Diagnostics tab.
¾ Card Name - The name of the wireless network adapter.
¾ MAC Address - The MAC address of the wireless network adapter.
¾ Driver - The driver name and path of the wireless network adapter driver.
¾ Driver Version - The version of the wireless network adapter driver.
¾ Driver Date - The creation date of the wireless network adapter driver.
¾ Client Name - The name of the client computer.

3.3.2 Check Receive and Transmit Statistical Information

The Advanced Statistics show receiving and transmitting statistical information about the following receiving and transmitting diagnostics for frames received by or transmitted to the wireless network adapter.
26
Page 31
Figure 3-13

3.4 Configuration for Windows Vista

After the Adapter's driver has been installed, Windows Vista will display a wireless Network Connection message like this one.
Figure 3-14
To establish a connection, please follow the steps below.
1. Right-click the icon
2. The following screen will show you available wireless networks. Highlight the one you want to join, and then click Connect.
in your system tray, then click Connect to a network.
Figure 3-15
27
Page 32
Figure 3-16
3. To continue, click Connect Anyway. Click the Cancel button to end the connection.
Figure 3-17
4. If the connection is successfully established, the following screen will appear, click Close to finish the connection.
28
Page 33
Figure 3-18

3.5 Configuration for Windows 7

Wireless N Client Utility is not available for Windows 7. So after the Adapter's driver has been installed, we have to use Windows WLAN Autoconfig to establish a connection. Please follow the steps below.
29
Page 34
1. Right-click the icon at the bottom of your screen in your system tray and then you will see the available wireless network list. Select the SSID of your Access Point, take rosewill for example. Click Connect.
Figure 3-19
2. If your wireless network is secured, you will be required to enter the security key as shown in Figure 3-20. Enter the passphrase, take 12345
67890 for example. And then
click OK.
Figure 3-20
30
Page 35
3. If the key entered is correct, you will successfully connect to the network as shown in Figure 3-21.
Figure 3-21
31
Page 36

Chapter 4 WPS Configuration

WPS (Wi-Fi Protected Setup) function allows you to add a new wireless device to an existing network quickly.
If the wireless card supports WPS, you can establish a wireless connection between wireless card and router using either Push Button Configuration (PBC) method or PIN method.
First, the WPS software should be installed. Insert the Resource CD into your CD-ROM drive, and open the folder named RNX-N360PC. Double-click WPS.exe in the proper folder to start the installation, then the following screen for preparing setup will appear.
Figure 4-1
Then, please follow the clue of the Operation System to complete the WPS installation. After that, WPS function can be enabled. Here we will introduce two ways to configure the WPS (For the configuration of WPS, here takes the Wireless Router of our company for example).

4.1 PBC (Push Button Configuration) method

1. Firstly, press the WPS button directly on the front panel of the Router shown in Figure
4-2.
Figure 4-2
2. Double click the icon
the welcome screen shown as Figure 4-3. Click Next to continue. Then select Push
on the desktop to open the WPS Utility and then you can see
32
Page 37
the button on my access point in the next screen shown in Figure 4-4 and click Next.
Figure 4-3
Figure 4-4
3. Then wait a minute until Figure 4-5 appears. Click Fin
configuration.
33
ish to complete the WPS
Page 38
Figure 4-5

4.2 PIN method

There are two ways to configure the WPS by PIN method:
1) Enter a PIN into your AP device.
2) Enter the PIN from your AP device.
Following are the detailed configuration procedure of each way.

4.2.1 Enter a PIN into your AP device

1. Double click the icon on the desktop to open the WPS Utility and then you can
see the welcome screen shown as Figure 4-3. Click Next to continue. Figure 4-4 will appear is randomly generated. Click Next.
. Select the second option and you will see the PIN value of the adapter which
34
Page 39
Figure 4-6
2. Open the Router’s Web-based Utility and click WPS link on the left of the main menu.
Then Figure 4-7 will appear.
Figure 4-7
3. Click Add device, then you can see Figure 4-8. Select Enter the ne
and enter the PIN value of the adapter shown in Figure 4-6, click Connect.
Figure 4-8
4. When Figure 4-5 appears, the WPS configuration is complete.
35
w device’s PIN
Page 40

4.2.2 Enter the PIN from your AP device

1. Open the WPS Utility and you will see Figure 4-3. Click Next to continue. Then Figure
4-4 will appear. Select the third option and enter the PIN value which is labeled on the bottom of the Router. Click Next.
Figure 4-9
2. When Figure 4-5 appears, the WPS configuration is complete.
Note:
)
If you generate a new PIN code for your Router, please enter the new one instead.
36
Page 41
Appendix A: Specifications
Normal
Interface 32 bit PCI Interface
Standards IEEE802.11n; IEEE802.11g; IEEE802.11b;
Operating System Windows 2000/Windows XP/Windows Vista/Windows 7
Up to 300Mbps
13.5/27/40.5/54/81/108/121.5/135Mbps 13/26/39/52/78/104/117/130Mbps
Radio Data Rate
6.5/13/19.5/26/39/52/58.5/65Mbps 1/2/5.5/11Mbps
(Auto Rate Sensing)
11b:CCK,QPSK,BPSK;
Modulation
Media Access Protocol CSMA/CA with ACK
Data Security WPA/WPA2; 64/128/152-bit WEP; TKIP/AES
Frequency
Spread Spectrum Direct Sequence Spread Spectrum (DSSS)
Safety & Emissions FCC, CE
11g:OFDM;
11n: QPSK,BPSK,16-QAM,64-QAM;
2.412 ~ 2.462GHz
(Only 2.412GHz~2.462GHz is allowed to be used in the USA, which means only channel 1~11 is available for American users to choose)
Environmental and Physical
Operating Temp.
Storage Temp.
0~40 (32~104)
-40– 70 (-40~158)
Working Humidity 10% - 90% RH, Non-condensing
Storage Humidity 5% - 90% RH, Non-condensing
37
Page 42

Appendix B: Glossary

¾ 802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps
using direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks.
¾ 802.11g - specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology, using OFDM modulation and operating in the unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices, and WEP encryption for security.
¾ Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless
Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers operate on a peer-to-peer basis, communicating directly with each other without the use of an access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as peer-to-peer mode, and is useful at a departmental scale or SOHO operation.
¾ DSSS - (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit
pattern for all data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS signal is recognized as the only valid signal, and interference is inherently rejected (ignored).
¾ FHSS - (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops)
the carrier frequency of a conventional carrier several times per second according to a pseudo-random set of channels. Because a fixed frequency is not used, and only the transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.
¾ Infrastructure Network - An infrastructure network is a group of computers or other
devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN. In infrastructure mode, the wireless devices communicate with each other and to a wired network by first going through an access point. An infrastructure wireless network connected to a wired network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a corporation scale, or when it is necessary to connect the
¾ Spread Spectrum - Spread Spectrum technology is a wideband radio frequency
technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
wired and wireless networks.
38
Page 43
¾ SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric
key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID.
¾ WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or
128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily.
¾ Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the
Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 802.11b devices.
¾ WLAN - (Wireless Local Area Network) - A group of computers and associated
devices communicate with each other wirelessly, which network serving users are limited in a local area.
¾ WPA - (Wi-Fi Protected Access) - A wireless security protocol uses TKIP (Temporal
Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.
39
Page 44

Appendix C: FAQ

This chapter provides solutions to problems that may occur during the installation and operation of the Wireless Adapter. Read the descriptions below to solve your problems.
1. I cannot communicate with the other computers linked via Ethernet in the
Infrastructure configuration.
1. Make sure that the PC to which the Adapter is associated is powered on.
2. Make sure that your Adapter is configured on the same channel and with the
same security options as with the other computers in the Infrastructure configuration.
2. What should I do when the computer with the Adapter installed is unable to
connect to the wireless network and/or the Internet?
1. Check that the LED indicators for the broadband modem are indicating normal activity. If not, there may be a problem with the broadband connection.
2. Check that the LED indicators on the wireless router are functioning properly. If not, check that the AC power and Ethernet cables are firmly connected.
3. Check that the IP address, subnet mask, gateway, and DNS settings are correctly entered for the network.
4. In Infrastructure mode, make sure the same Service Set Identifier (SSID) is specified on the settings for the wireless clients and access points.
5. In Ad-Hoc mode, both wireless clients will need to have the same SSID. Please note that it might be necessary to set up one client to establish a BSS (Basic Service Set) and wait briefly before setting up other clients. This prevents several clients from trying to establish a BSS at the same time, which can result in multiple singular BSSs being established, rather than a single BSS with multiple clients associated to it.
6. Check that the Network Connection for the wireless client is configured properly.
If Security is enabled, make sure that the correct encryption keys are entered on both the Adapter and the access point.
3. I can’t find any wireless access point / wireless device in ‘Site Survey’ function.
1. Click ‘Rescan’ for few more times and see if you can find any wireless access
point or wireless device.
2. Please move closer to any known wireless access point.
3. ‘Ad hoc’ function must be enabled for the wireless device you wish to establish a
direct wireless link.
4. Please adjust the position of network card (you may have to move your computer
if you’re using a notebook computer) and click ‘Rescan’ button for few more times. If you can find the wireless access point or wireless device you want to connect by doing this, try to move closer to the place where the wireless access point or wireless device is located.
4. I cannot establish connection with a certain wireless access point
1. Click ‘Add to Profile’ for few more times.
2. If the SSID of access point you wish to connect is hidden (nothing displayed in
40
Page 45
3. ‘SSID’ field in ‘Site Survey’ function), you have to input correct SSID of the access
point you wish to connect. Please contact the owner of access point to ask for correct SSID.
4. You have to input correct passphrase / security key to connect an access point
with encryption. Please contact the owner of access point to ask for correct passphrase / security key.
5. The access point you wish to connect only allows network cards with specific
MAC address to establish connection. Please go to ‘Status’ menu and write the value of ‘MAC Address’ down, then present this value to the owner of access point so he / she can add the MAC address of your network card to his / her access point’s list.
5. The network is slow / having problem when transferring large files
1. Move closer to the place where access point is located.
2. There could be too much people using the same radio channel. Ask the owner of
the access point to change the channel number.
Thank you for purchasing a quality Rosewill Product.
Please register your product at: www.rosewill.com for complete warranty information and future support for your product.
41
Loading...