TRENDnet TEW-509UB User Manual

1
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
z Reorient or relocate the receiving antenna. z Increase the separation between the equipment and receiver. z Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
z Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions : (1) This device may not cause harmful interference, and (2) this device mus t accept any interference received, including interference that may cause undesired operation.
IMPORTANT NOTE: FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This device complies with FCC RF Exposure limits set forth for an uncontroll e d envir on me nt, under 47 CFR 2.1093 paragraph (d)(2). This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This device was tested for typical by stander conditions that may occur during use. To comply with FCC RF exposure requirements a minimum separation distance of 1.5cm must be maintained between the user’s body and the device, including the antenna.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
2
Table of Contents
Federal Communications Commission (FCC) Interference statement 2 CE Mark Warning 2
Chapter 1 Wireless LAN Networking
Transmission Rate 4
Type of Wireless Networks 4 Ad-Hoc (IBSS) Network 5 Infrastructure (BSS) Network 5 Wireless LAN Security 7 Data Encryption with WEP 7
Chapter 2 - Getting Started
About Your 802.11b/g Wireless USB2.0 Adapter 8
Package Content 8
System Requirement 8
Wireless Utility and Adapter Hardware Installation 9
Using the Utility to Configure Your Network 12
Link Information 13
Site Survey 14
Profile 15
Chapter 3 – HotSpot Features
Charging the TEW-509UB 20 Identifying Components 20 LCD Display 21 Finding a HotSpot 21 Accessing a HotSpot 21
Chapter 4 – Maintenance
Uninstalling the Driver 22
Uninstall the Client Utility 22
Upgrading the Wireless Utility 22
Glossary 23
Rev. 1.1
3
Chapter 1- Wireless LAN Networking
This section provides background information on wireless LAN networking technology.
T
HE INFORMATION IN THI S SE CTI ON IS FOR YOUR REFER ENC E. CHANGING
NETWORK SETTINGS AND PARTICULARLY SE CURI TY SETTT INGS SHOU LD ONLY BE DONE BY AN AUTHORIZED ADMINISTRA T OR.
Transmission Rate (Transfer Rate)
The adapter provides various transmission (data) rate options for you to select. Options include Fully Auto, 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, and 54Mbps. In most networking scenarios, the factory default Fully Auto setting proves the most efficient. This setting allows your adapter to operate at the maximum transmission (data) rate. When the communication quality drops below a certain level, the adapter automatically switches to a lower transmission (data) rate. Transmission at lower data speeds is usually more reliable. However, when the communication quality improves again, the adapter gradually increases the transmission (data) rate again until it reaches the highest available transmission rate.
Types of Wireless Networks
Wireless LAN networking works in either of the two modes: ad-hoc and infrastructure. In infrastructure mode, wireless devices communicate to a wired LAN via access points. Each access point and its wireless devices are known as a Basic Service Set (BSS). An Extended Service Set (ESS) is two or more BSSs in the same subnet. In ad hoc mode (also known as peer-to-peer mode), wireless devices communicate with each other directly and do not use an access point. This is an Independent BSS (IBSS).
To connect to a wired network within a coverage area using access points, set the adapter operation mode to Infrastructure (BSS). To set up an independent wireless workgroup without an access point, use Ad-hoc (IBSS) mode.
A
D-HOC (IBSS) NETWORK
Ad-hoc mode does not require an access point or a wired network. Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS).
To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel for each client.
4
When a number of wireless stations are connected using a single access point, you have a
Basic Service Set (BSS).
5
In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the adapter automatically switches to the channel used in BSS (2).
Roaming in an ESS network diagram
6
WIRELESS LAN SECURITY
Because wireless networks are not as secure as wired networks, it is vital that security settings are clearly understood and applied.
The list below shows the possible wireless security levels on your adapter starting with the most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. EAP requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the WAN or the LAN to provide authentication service for wireless stations.
1. Wi-Fi Protected Access (WPA)
2. IEEE802.1X EAP with RADIUS Server Authentication
3. WEP Encryption
4. Unique ESSID
D
ATA ENCRYPTION WITH WEP
The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks. WEP encryption scrambles all data packets transmitted between the adapter and the access point or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.
DO NOT ATTEMPT TO CONFIGURE OR CHANGE S EC URI TY SETTTINGS FOR A
NETWORK WITHOUT AUTHORIZA TION AND WITHOUT CLEARLY UNDERSTANDING THE SETTINGS YOU ARE APPLING. DA TA YOU SEN D CAN BE SEEN BY OTHER S.
WITH POOR SECURITY S ETTIN G S, SEN SITIVE
There are two ways to create WEP keys in your adapter.
Automatic WEP key generation based on a password phrase called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Securi ty Settings screen of the wireless utility and enteri ng the m ma nually as the WEP keys in the other WLAN adapter(s).
The adapter allows you to configure up to four WEP keys and only one key is used as the default transmit key at any one time.
T
HE adapter supports 64-BIT, 128-BIT, or 152-BIT WEP Encryptions. THE 152-BIT WEP MUST
COMPLY WITH THE
WEP SETTING OF YOUR ACCESS POINT OR R OUTER.
7
Chapter 2 - Getting Started
This chapter introduces the Adapter and prepares you to use the Wireless Utility.
2.1 About Your 802.11a/b/g Wireless USB2.0 Adapter with HotSpot Detector
The Adapter is an 802.11a, 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment.
The following lists the main features of your Adapter.
9 Your Adapter can communicate with other IEEE 802.11a/b/g compliant wireless devices. 9 Automatic rate selection. 9 Standa rd data transmission rates up to 54 Mbps 9 Offers 64-bit, 128-bit and 152-bit WEP (Wired Equivalent Privacy) data encryption for
network security.
9 Supports IEEE802 .1x and WPA (Wi-F i Protected Access). 9 Low CPU utilization allowing more computer system resources for other programs. 9 A built-in antenna. 9 Driver support for Windows Win98SE/ME/2000/XP/2003 Server
2.2 Package Content
¾ 54Mbps 802.11a/g Wireless USB 2.0 Adapter with HotSpot Detector ¾ Driver/Utility CD-ROM ¾ Multi-Language Quick Installation Guide
2.3 System Requirement
z Pentium class notebook computers with at least one available USB port z Microsoft Windows 98SE/ME/2000/XP/2003 z CD-ROM drive
8
Loading...
+ 18 hidden pages