MicroNet SP907GK User Manual

Wireless lan usb adapter

Advertisement

User's Manual
Wireless LAN USB Adapter
Model No.: SP907GK
http://www.micronet.info

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SP907GK and is the answer not in the manual?

Questions and answers

Summary of Contents for MicroNet SP907GK

  • Page 1 User’s Manual Wireless LAN USB Adapter Model No.: SP907GK http://www.micronet.info...
  • Page 2: Table Of Contents

    CONTENTS INTRODUCTION ..................1 1.1 FEATURES.....................2 1.2 PACKAGE CONTENTS ................2 INSTALLATION ...................3 CONFIGURATION AND MANAGEMENT ............8 3.1 AD-HOC MODE ..................8 To use this adapter in Ad-Hoc Mode................8 3.2 INFRASTRUCTURE MODE ..............9 To use this adapter in Infrastructure Mode..............10 INTRODUCTION TO THE WIRELESS LAN UTILITY........11 4.1 STARTING THE WIRELESS LAN UTILITY..........
  • Page 3: Introduction

    1 Introduction Thank you for purchasing the Micronet SP907GK Wireless LAN USB Adapter and it launches IEEE 802.11g wireless network at 54 Mbps in the 2.4GHz frequency, which is also compatible with IEEE 802.11b wireless devices at 11Mbps. When it is connected to 11b devices, the link speed will be up to 11Mbps.
  • Page 4: Features

    1.2 Package Contents Before you begin the installation, please check the items in your package. The package should include the following items: Micronet SP907GK Wireless LAN USB Adapter Driver and Manual CD Quick Installation Guide If any of the above items is missing, contact your supplier as soon as possible.
  • Page 5: Installation

    2 Installation Before you proceed with the installation, please read the following notes carefully. Note1: Please do not install SP907GK into your laptop computer before installing the software program from the CD. Note2: The following installation was performed under Windows XP. (Procedures are similar for Windows 98SE/Me/2000.)
  • Page 6 Step6. If you are using Windows 98se or ME, the system may ask for the driver CD. Please click the Browse button. Select your CD-ROM Drive then select SP907GK Utility and Driver WIN98 (or WINME) to browse the driver. If not, please skip this step.
  • Page 7 Step7. Click the “Finish” button to complete driver and utility installation Step8. For Windows XP and 2000 users, please insert this wireless adapter to your computer. If you are using Windows 98se or ME, please restart the system first before connect this wireless adapter to your computer. Step9.
  • Page 8 Step11. Select “Install the software automatically” and click the “Next” button. Step12. Please wait while installing the driver. The Windows logo testing warning window may pops up again. Please click the “Continue Anyway” button to continue. - 6 -...
  • Page 9 Step13. Click the “Finish” button after driver installation - 7 -...
  • Page 10: Configuration And Management

    3 Configuration and Management Read this chapter to understand the management interface of the device and how to manage the device. In the following instruction for making a network connection, we use the utility we provided to configure your wireless network settings. Note: For Windows XP users that want to configure your wireless network using this Utility, please perform the following procedures to disable your native Windows XP wireless support (Wireless Zero Configuration Service)
  • Page 11: Infrastructure Mode

    3. Click the OK button to confirm that you are connecting to an open wireless network. 4. Click OK to add this network into the profile list. Note: This example is an open wireless network. If you are going to connect to a Wireless adapter with security protection, you will have to configure the encryption settings in this profile to be corresponding to the other wireless adapter.
  • Page 12: To Use This Adapter In Infrastructure Mode

    To use this adapter in Infrastructure Mode 1. Double click the icon on your desktop. 2. Click the “Available Network” button to scan available access points. Double click on the AP that you are going to connect to. 3. Click the OK button to confirm that you are connecting to an open wireless network. Note: This example is an open wireless network.
  • Page 13: Introduction To The Wireless Lan Utility

    4 Introduction to the Wireless LAN Utility Note: This management instruction uses Windows XP as the presumed operation system. Some functions are not supported in Windows 98se or Windows ME. 4.1 Starting the Wireless LAN Utility Double click the shortcut on your desktop. The Wireless LAN Utility pops up. You may click on the tabs above to configure this adapter.
  • Page 14: Profile

    Status: Check if the device associated to target network. The current connection speed Speed: Type: Infrastructure mode or Ad-Hoc mode. The performing encryption mode for connecting to current Encryption: network profile. SSID: The SSID (network name) of the connected wireless network. Signal Strength: Indicates the signal strength detected by this adapter.
  • Page 15: Configure The Profile

    Duplicate To make a copy of a profile, click the profile that going to be copied, and click this button to copy it. Set Default To select a profile as your default wireless connection, click this profile on the list and click this button. You may also double click on each profile to select it as your default wireless connection.
  • Page 16: Wireless Network Security

    4.1.3.2 Wireless network security Parameter Description Network This setting has to be consistent with the wireless networks Authentication Type that SP908GK intends to connect. Open System – No authentication is needed in the wireless network. Shared Key – Only wireless devices using a shared key (WEP Key identified) are allowed to connect to each other.
  • Page 17 advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required by the corporate user or government users. The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WPA2-PSK –...
  • Page 18: 802.1X Setting-Certification

    The IEEE 802.1X specification describes a protocol used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do.
  • Page 19 Parameter Description Authentication Type The EAP authentication protocols this card supports are listed below. This setting has to be consistent with the wireless APs or Routers that SP908GK intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol to be used within an encrypted tunnel.
  • Page 20: 802.1X Setting-Ca Server

    4.1.3.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and requires a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
  • Page 21: Available Network

    4.1.4 Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of Wireless LAN Adapter and automatically connect you to the wireless device with the greatest signal strength. The “Available Network”...
  • Page 22 Power Save None Disable Power saving function. Minimum power consumption Maximum power consumption Turbo Mode Disable turbo mode Enable turbo mode AUTO Enable or disable turbo automatically according to the detected environment Fragment Threshold The maximum size of a packet that is going to be segmented and transmitted. Select the size from 256 to 2432(default) bytes.
  • Page 23: Status

    4.1.6 Status This tab shows the current connection status of this adapter. 4.1.7 Statistics See this tab to show the transmission activity record. Clicking the “Reset” button recounts the values from zero. - 21 -...
  • Page 24: Ap Mode Management Guide

    4.2 AP mode management guide 4.2.1 General After configuring the adapter in AP mode, this “General” page shows up, which shows the general information of this AP. SSID: The SSID (network name) of the wireless network constructed by this AP. BSSID: The MAC address of this AP Config:...
  • Page 25: Statistics

    4.2.3 Statistics See this tab to show the transmission activity record. Clicking the “Reset” button recounts the values from zero. - 23 -...
  • Page 26: Softap

    4.2.4 SoftAP This page allows users to select the adapter for connect to public network. Please click on the device that are used for connecting to public network and click the “Select” button, and then click the “Apply” button to execute. - 24 -...
  • Page 27: Troubleshooting

    5 Troubleshooting This chapter provides solutions to problems commonly encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications which provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream in wireless LAN technology for the home, office and public networks.
  • Page 28 database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 29 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secured, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
  • Page 30 Copyright 2006 Micronet Communications, Inc. All rights reserved. No Part of the contents of this guide maybe transmitted or reproduced in any form or by any means without the written permission of manufacturer. Printed in Taiwan. FCC Statement This product has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules.
  • Page 31 transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) R&TTE...

Table of Contents