Home
        Edimax EW-7318Ug Wireless USB2.0 Adapter
         Contents
1.   3 Configuration Utility    The Ralink Configuration Utility is a powerful application that helps you configure the USB adapter and  monitor the link status and the statistics during the communication process     When the adapter is installed  the configuration utility will be displayed automatically  This adapter will  auto connect to wireless device which has better signal strength and no wireless security setting     1 lt  Ralink Wireless Utility    Profile   Link Status   Site Survey   Statistics   Advanced   QoS   About      Profile List       Profile Name Channel   Authentication   Encryption   Network Ty     E PROF1 Default Auto Open Infrastructure  PROF2 BF_EMAX Auto Open Infrastructure    E Delete Edit Activate       The Ralink Configuration Utility appears as an icon on the system tray of Windows while the adapter is  running  You can open the utility by double click on the icon     Ly RA 19 10 02 AM       In Windows XP  there is a    Windows Zero Configuration Tool    for you to setup wireless clients  If you  want to switch to use Ralink configuration utility  please follow one of the ways as below     First Way    Right click the icon in the system tray and select    Use RaConfig as Configuration utility              Second Way    A  Right click the icon and select    View Available Wireless Networks           B  Click    Advanced             Wireless Network Connection 38          Connect          C  Uncheck    Use Windows to configure my wireless network setti
2.   the more radio signal been received by the  adapter  This indicator helps to find the proper position of the  wireless device for quality network operation           Parameter Description    Noise Level Display the noise level in the wireless environment        3 4 Statistics    This option enables you to view the statistic information of the connection including transmit statistics  and receive statistics  You may reset the counters by clicking  Reset Counter        Ralink Wireless Utility    Profile   Link Status   Site Survey Statistics   Advanced   QoS   About        Transmit Statistics  Frames Transmitted Successfully  Frames Transmitted Successfully    Without Retry  Frames Transmitted Successfully After Retry s   Frames Fail To Receive ACK After All Retries  RTS Frames Successfully Receive CTS  RTS Frames Fail To Receive CTS       y Receive Statistics  Frames Received Successfully  Frames Received With CRC Error  Frames Dropped Due To Out of Resource    Duplicate Frames Received          3 5 Advance    This option enables you to configure more advanced settings  for example  wireless mode  protection  mode and etc     Ralink Wireless Utility    Profile   Link Status   Site Survey   Statistics Advanced   QoS   About      Wireless mode 802 11 B G mix y  r Select Your Country Region Code  mAd hoc wireless mode  118 G Jo  CH1 11         C OnyB    B GMised    OnyG    4 Mode    B G Protection  Auto y     Tx Rate  Auto Y    I Tx BURST    I Enable TCP window Size  I Fast Roa
3.  Key from joining the network and also encrypts the  data traveling between authorized devices     When you have set the Authentication Type to Open  Shared   WPA or WPA2  you can also enable IEEE 802 1x setting to use  the authentication server or certification server to authenticate  client users     None   Disable the encryption mode     WEP   Enable the WEP Data Encryption  When the item is  selected  you have to continue setting the WEP Encryption keys     TKIP     TKIP  Temporal Key Integrity Protocol  changes the  temporal key every 10 000 packets  a packet is a kind of message  transmitted over a network   This ensures much greater security  than the standard WEP security        14       Parameter    Description    AES   AES has been developed to ensure the highest degree of    WPA Pre Shared Key    WEP Key   Key1   Key4     security and authenticity for digital information and it is the most  advanced solution defined by IEEE 802 11i for the security in the  wireless network     Note  All devices in the network should use the same encryption  method to ensure the communication     The WPA PSK key can be from 8 to 64 characters and can be  letters or numbers  This same key must be used on all of the  wireless stations in the network     The WEP keys are used to encrypt data transmitted in the  wireless network  There are two types of key length  64 bit and  128 bit  Select the default encryption key from Key 1 to Key 4 by  selected the radio button     Fill the text b
4.  Token Card  The client  certificate is optional required for the authentication     TLS Smart Card    TLS is the most secure of the EAP protocols  but not easy to use  It requires that digital certificates be  exchanged in the authentication phase  The server presents a  certificate to the client  After validating the server   s certificate  the  client presents a client certificate to the server for validation     There are    Disabled        Reauthentication        Roaming        SameSsid     and    Always    selections for you to choose whether to recovery the  session in different status     Enter the password as the identity for the server     Aclient certificate is required for TLS  and is optional for TTLS and  PEAP  This forces a client certificate to be selected from the  appropriate Windows Certificate Store and made available to the  RADIUS server for certification     When the authentication type is PEAP or TTLS  select a protocol  to be used to build the encrypted tunnel     This is the protected user EAP Identity used for authentication   The identity specified may contain up to 63 ASCII characters  is  case sensitive and takes the form of a Network Access Identifier   consisting of  lt name of the user gt   lt user   s home realm gt   The  user   s home realm is optional and indicates the routing domain     The password used for authentication  It may contain up to 63  ASCII characters and is case sensitive        802 1x Setting    Certification CA Server    C
5. 802 11g Turbo  Wireless LAN USB Adapter    User Manual    Version  1 1   Jun  2006     COPYRIGHT    Copyright  2005 2006 by this company  All rights reserved  No part of this  publication may be reproduced  transmitted  transcribed  stored in a retrieval system   or translated into any language or computer language  in any form or by any means   electronic  mechanical  magnetic  optical  chemical  manual or otherwise  without the  prior written permission of this company    This company makes no representations or warranties  either expressed or implied   with respect to the contents hereof and specifically disclaims any warranties   merchantability or fitness for any particular purpose  Any software described in this  manual is sold or licensed  as is   Should the programs prove defective following their  purchase  the buyer  and not this company  its distributor  or its dealer  assumes the  entire cost of all necessary servicing  repair  and any incidental or consequential  damages resulting from any defect in the software  Further  this company reserves the  right to revise this publication and to make changes from time to time in the contents  hereof without obligation to notify any person of such revision or changes     All brand and product names mentioned in this manual are trademarks and or  registered trademarks of their respective holders     Federal Communication Commission  Interference Statement    This equipment has been tested and found to comply with the limit
6. EC   Telecommunications Terminal Equipment and Satellite Earth Station Equipment  As  of April 8  2000     Safety    This equipment is designed with the utmost care for the safety of those who install and  use it  However  special attention must be paid to the dangers of electric shock and  static electricity when working with electrical equipment  All guidelines of this and of  the computer manufacture must therefore be allowed at all times to ensure the safe  use of the equipment     EU Countries Intended for Use    The ETSI version of this device is intended for home and office use in Austria   Belgium  Denmark  Finland  France  Germany  Greece  Ireland  Italy  Luxembourg   the Netherlands  Portugal  Spain  Sweden  and the United Kingdom    The ETSI version of this device is also authorized for use in EFTA member states   Iceland  Liechtenstein  Norway  and Switzerland     EU Countries Not intended for use    None     1    CONTENTS    INTRODUCTION gieccasssdscecnssecssssessesscndescgees tase secadonetscsvaaestenessnnens Ganeecenaoseeces venus 1  KE Ud 2  RS A E EE T E A AS 2  1 35    Package AA ages satan sczien sSeedundaiee sites nausea E Ra a Ee Eaa oeii Sa Casan 3  INSTALLATION PROCEDURE siesssisssccensesssvessodesiesssvessstenssedencesasesssntseveenvecses 4  CONEIGURATION UTILITY isisicsssiccessesscesdsccsdovensesctcdesesovectocscesceecsctocesdsensass 7  Dols Oe SUVE een dl SS 9  a O cee ar ias 10  3 2 1 Configure the Profle sisas 11  3 22 11  Configurations seernes na
7. ar 11  3 2 1 2 Authentication and Security iS 13  3 2 1 3 802 1x Setting Certification AAA 17  3 2 1 4 802 1x Setting CA Server sigsacvssiedeasssnceaasvsesedecs sageansaavss cdachsacede sateen vuaevdantane 18  A OS 19  3A AA tt e 20  E 20  BO OS Saab vances O 23  Ded    ADO id didas 24  3S DM dE 25  3 9  SOAP ri E A iene a toad Salta oh 25  IN A i anaa a AE O EE aac A EES AT heme 25  DIRT AU VS ECU NAAA 28  O a nA e a R eaten R A Ees 30  DDS  Mac Tao tas 31  394  Event Logs minita E E E E E E ed  n 32  SA PES E a OE TEE EE E tut A AT 32  ID TADA ae 33    1 Introduction    Thank you for purchasing the 802 11g Turbo Wireless LAN USB Adapter  This USB adapter is  designed to comply with IEEE 802 11g Wireless LAN standard and easy to carry with the Mini size  It is  suitable for any Laptop or Desktop computers     This adapter supports higher data throughput than the IEEE 802 11g standard  up to 54Mbps   It  supports specific ways to increase the data transfer rate at a time  compress the data and decrease the  waiting time to send the next data to the Routers or APs  This feature is called Turbo Mode  When the  adapter is connecting to the Routers or APs with the proprietary feature  the wireless network will be  more effective     For WLAN security issues  this adapter supports 64 128 bit WEP data encryption that protects your  wireless network from eavesdropping  It also supports WPA  Wi Fi Protected Access  feature that  combines IEEE 802 1x and TKIP  Temporal Key Integrity P
8. ata over the link   In turn  the device  responds with its identity  and the AP relays this identity to an authentication server  which is typically  an external RADIUS server     An example for MD5 Authentication                                                                         IEEE 802 1x RADIUS RADIUS  Access Client M Client  3  Server      gt  AS  27T 27 TN    Sa N    sio   Ip  sS E Access Point Fa MUNA  BD A w 4                       Windows 2000 IAS   Internet Authentication  Service      1  Client requests to login the  3  Send username  password to    network  RADIUS server    2  Login with username   4  Approve or deny user  password  login to the LAN     3 2 1 3 802 1x Setting Certification       Parameter    Description       Authentication Type    Session Resumption    Password    Use Client Certificate    Tunneled Authentication    Protocol    Identity    Password    The EAP authentication protocols this adapter has supported are  included as follows  This setting has to be consistent with the  wireless APs or Routers that the adapter intends to connect     PEAP  amp TTLS     PEAP and TTLS are similar and easier than TLS  in that they specify a stand alone authentication protocol be used  within an encrypted tunnel  TTLS supports any protocol within its  tunnel  including CHAP  MS CHAP  MS CHAPv2  PAP and  EAP MD5  PEAP specifies that an EAP compliant authentication  protocol must be used  this adapter supports EAP MSCHAP v2   EAP TLS Smart Card and Generic
9. ation be intercepted while transmitting on air    WLAN features two fold protection in security  On the hardware side  as with Direct Sequence  Spread Spectrum technology  it has the inherent security feature of scrambling  On the software  side  WLAN series offer the encryption function  WEP  to enhance security and Access Control   Users can set it up depending upon their needs     12  What is DSSS   What is FHSS   And what are their differences    Frequency hopping spread spectrum  FHSS  uses a narrowband carrier that changes frequency  in a pattern that is known to both transmitter and receiver  Properly synchronized  the net effect  is to maintain a single logical channel  To an unintended receiver  FHSS appears to be  short duration impulse noise  Direct sequence spread spectrum  DSSS  generates a redundant  bit pattern for each bit to be transmitted  This bit pattern is called a chip  or chipping code   The  longer the chip is  the greater the probability that the original data can be recovered  Even if one  or more bits in the chip are damaged during transmission  statistical techniques embedded in the  radio can recover the original data without the need for retransmission  To an unintended  receiver  DSSS appears as low power wideband noise and is rejected  ignored  by most  narrowband receivers     35    13  What is Spread Spectrum    Spread Spectrum technology is a wideband radio frequency technique developed by the military  for use in reliable  secure  mission c
10. ce and distribute an unlimited number of  copies of the SOFTWARE PRODUCT  provided that each copy shall be a true and complete         Install Shield          C  In Windows XP  there is a    Windows Zero Configuration Tool    for you to setup the wireless adapter   You can choose to configure the adapter through the Windows Zero Configuration Tool or the  Ralink Configuration Tool for the adapter  It is recommended to choose the Ralink Configuration    Tool for the adapter  Click    Next    to continue     RALINK Wireless Network Card Setup    Choose Configuration Tool       Ralink Configura        Microsc       D  If you need the adapter to operate with better performance  please choose the    Optimize for  performance    to enable the Tx Burst mode  Or you can choose    Optimize for Wi Fi mode    to let the    adapter run in standard wireless network     RALINK Wireless Network Card Setup    Choose Configuration TxBurst or WiFi             E  The system starts to install the software of the adapter  Please follow the instructions of the  program to plug in the adapter into the USB port of your computer  And the system will  automatically detect the adapter    RALINK Wireless Network Card Setup    Setup Status    Install Shield          a  gt  Please plugin the RT 2500 USB Wireless LAN Card on your computer        F  Please click    Finish    to complete the installation     RALINK Wireless Network Card Setup    Setup has finished installing    Click Finish    inated        
11. contact your supplier as soon as possible     2 Installation Procedure    Before you proceed with the installation  please notice following descriptions     Note1  Please do not install the adapter into your computer before installing the software  program from the CD     Note2  The following installation was operated under Windows XP   Procedures are similar for  Windows 98SE Me 2000 2003 Server      Note3  If you have installed the Turbo Wireless LAN USB Adapter driver  amp  utility before  please  uninstall the old version first     A  Insert the Installation CD to your CD ROM Drive  Execute the    setup    program     Ralink Wireless LAN Install   InstallShield Wizard    Preparing Setup  Please le the In     e    InstallShield       RALINK Wireless Network Card Setup    Please read the following License Agreement                    RALINK Wireless Utility for Windows 38 ME  2000 XP_  Copyright  C  RALINK TECHNOLOGY  CORP  All Rights Reserved                       Thank you for purchasing RALINK Wireless product     SOFTWARE PRODUCT LICENSE  Mees SOFTWARE PRODUCT is protected by copyright laws and international cops   treaties  as well as other intellectual property laws and treaties  The SOFTWARE F PRODUCT  is licensed  not sold     1  GRANT OF LICENSE  This End User License Agreement grants you the following  fights Installation and Use     You may install and use an unlimited number of copies of the  SOFTWARE PRODUCT     Reproduction and Distribution     You may reprodu
12. data traveling between  authorized devices     WPA2 PSK   WPA2 PSK is also for home and small business     WPA PSK WPA2 PSK   When selecting this mode  the AP  supports both WPA PSK and WPA2 PSK        28       Parameter    Encryption Type    WPA Pre shared Key    Group Rekey Interval    Wep Key   Key 1   Key 4     Show Password    Description    Not Use   Disable the encryption mode     WEP   Enable the WEP Data Encryption  When the item is  selected  you have to continue setting the WEP Key     TKIP   TKIP  Temporal Key Integrity Protocol  changes the  temporal key every 10 000 packets  a packet is a kind of message  transmitted over a network   This ensures much greater security  than the standard WEP security     AES   AES has been developed to ensure the highest degree of  security and authenticity for digital information and it is the most   advanced solution defined by IEEE 802 11i for the security in the  wireless network     BOTH     When selecting this mode  the AP supports both TKIP  and AES     The WPA Pre shared Key can be from 8 to 64 characters and can  be letters or numbers  This same key must be used on all of the  wireless stations in the network     This function is available when using WPA PSK and WPA2 PSK  encryption algorithm  The key will change compliance with  seconds or beacon that user set     The WEP keys are used to encrypt data transmitted in the  wireless network  There are two types of key length  64 bit and  128 bit  Select the default encrypt
13. different country  you have to  adjust the channel setting to comply the regulation of the country     If you have a mix of 802 11b and 802 11g wireless stations in the  network  it is recommended to enable the protection mechanism   This mechanism can decrease the rate of data collision between  802 11b and 802 11g wireless stations  When the protection mode  is enabled  the throughput of the adapter will be a little lower due to  many of frame traffic should be transmitted    Auto     Based on the status of the network and automatically  disable enable protection mode     On     Always enable the protection mode     Off     Always disable the protection mode     21       Parameter    Tx Rate    Tx BURST    Enable TCP Window Size    Fast Roaming at  70dBm    Turn Off RF Button    CCX 2 0    Description    There are several options including  Auto 1 2 5 5 11 6 9 12 18 24 36 48 54Mbps for you to select   When the    Auto    is selected  the device will choose the most  suitable transmission rate automatically  The higher data rate you  designated in the network  the shorter distance is allowed between  the adapter and the wireless stations     When the wireless mode is    802 11 B only     the maximum data rate  is 11Mbps  11b  so that there are only    Auto 1 2 5 5 11Mbps     options you can select     Tx Burst enables the adapter to deliver better throughput in the  same period and environment     The TCP Window is the amount of data a sender can send on a  particular connec
14. e 802 11g standard requires backward compatibility with 802 11b     The standard specifically calls for     A     Anew physical layer for the 802 11 Medium Access Control  MAC  in the 2 4 GHz frequency  band  known as the extended rate PHY  ERP   The ERP adds OFDM as a mandatory new  coding scheme for 6  12 and 24 Mbps  mandatory speeds   and 18  36  48 and 54 Mbps   optional speeds   The ERP includes the modulation schemes found in 802 11b including  CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps       Aprotection mechanism called RTS CTS that governs how 802 11g devices and 802 11b    devices interoperate     2  What is the IEEE 802 11b standard    The IEEE 802 11b Wireless LAN standard subcommittee  which formulates the standard for the  industry  The objective is to enable wireless LAN hardware from different manufactures to  communicate     3  What does IEEE 802 11 feature support    The product supports the following IEEE 802 11 functions     CSMA CA plus Acknowledge Protocol  Multi Channel Roaming   Automatic Rate Selection   RTS CTS Feature   Fragmentation   Power Management    4  What is Ad hoc    An Ad hoc integrated wireless LAN is a group of computers  each has a Wireless LAN adapter   Connected as an independent wireless LAN  Ad hoc wireless LAN is applicable at a  departmental scale for a branch or SOHO operation     5  What is Infrastructure    An integrated wireless and wireless and wired LAN is called an Infrastructure configuration   Inf
15. e profile        3 2 1 Configure the Profile    Add Profile    Configuration   Authentication and Security      PROF3 SSID    Profile Name    Network Type    l RTS Threshold       C PSM  Power Saving Mode     Infrastructure TX Power Auto X  0 L 2347  A Y       Fragment Threshold 256 o 2246      3 2 1 1 Configuration             Parameter Description   Profile Name Define a recognizable profile name for you to identify the different  networks    SSID The SSID  up to 32 printable ASCII characters  is the unique    PSM  Power Saving Mode     name identified in a WLAN  The ID prevents the unintentional  merging of two co located WLANs     You may specify a SSID for the adapter and then only the device  with the same SSID can interconnect to the adapter  If you want to  add the network nearby to the profile list  pull down the menu  all  the networks will be listed for you to add one of them to the profile  list     The power saving function is only available when the network type  is in Infrastructure    CAM  Constantly Awake Mode      The adapter will always set in  active mode     PSM  Power Saving Mode      Enable the adapter in the power  saving mode when it is idle        11       Parameter  Network Type    TX Power    Preamble    RTS Threshold    Fragment Threshold    Channel    Description   Infrastructure     This operation mode requires the presence of an  802 11 Access Point  All communication is done via the Access  Point or Router     Ad Hoc   Select this mode if you 
16. ertificate issuer      Any Trusted CA        Allow intermidiate certificates       Server name                 Server name must match exactly    C Domain name must end in specified name       3 2 1 4 802 1x Setting CA Server       Parameter Description       Use Certificate Chain When the EAP authentication type such as TLS  TTLS or PEAP is  selected and required a certification to tell the client what server  credentials to accept from the authentication server in order to  verify the server  you have to enable this function     Certificate Issuer Choose the server from the list to issue the certificate  If    Any  Trusted CA    is selected  any CA included in the list  provided by  the Microsoft Certificate Store  is permitted     Allow Intermediate Certificates A server designates an issuer as a trusted root authority by  placing the issuer s self signed certificate  which contains the  issuer s public key  into the trusted root certification authority  certificate store of the host computer  Intermediate or subordinate  certification authorities are trusted only if they have a valid  certification path from a trusted root certification authority     Server Name Enter the authentication server name     Server name must match exactly When selected  the server name must match exactly the server  name found on the certificate     Domain name must end in When selected  the server name field identifies a domain  The   specified name certificate must use a server name belonging 
17. ion key from Key 1 to Key 4 by  selected the radio button     Fill the text box by following the rules below    64 bit     Input 10 digit Hex values  in the    A F        a f    and    0 9     range  or 5 digit ASCII characters  including    a z    and    O 9     as  the encryption keys  For example     0123456aef  or    test1        128 bit     Input 26 digit Hex values  in the    A F        a f    and    0 9     range  or 13 digit ASCII characters  including    a z    and    O 9     as  the encryption keys  For example       012345678901 23456789abcdef  or    administrator        The password will be shown in clear text instead of in asterisk        29    3 9 2 Access Control    The Access Control page enables you to configure the access control policy used within the AP     Ralink Wireless Utility    Config Access Control   Mac Table   Event Log   Statistics   About    Access Poley E  MAC Address Access List          Parameter Description       Access Policy Disable     Disable the MAC Address filtering function     Allow All     Only the wireless adapters with the MAC Address  listed in Access List can connect to the AP     Reject All     The wireless adapters with the MAC Address listed in  Access List will be rejected to connect to the AP     MAC Address MAC Address is a unique identification for hardware devices in the  network  It is a 12 digit hexadecimal values     Access List Display all the MAC Address user adds   Add Add the MAC Address to Access List   Delete De
18. ions including  Auto 1 2 5 5 11 6 9 12 18 24 36 48 54Mbps for you to select   When the    Auto    is selected  the AP will choose the most suitable  transmission rate automatically  The higher data rate you  designated in the network  the shorter distance is allowed  between the AP and the wireless clients     When the wireless mode is    802 11 B only     the maximum data  rate is 11Mbps  11b  so that there are only    Auto 1 2 5 5 11 Mbps     options you can select     Select the number of the radio channel used by the AP  The  wireless adapters connected to the AP should set up the same  channel     The SSID  up to 32 printable ASCII characters  is the unique  name identified in a WLAN  The ID prevents the unintentional  merging of two co located WLANs     The default SSID of the AP is SoftAP X   X is the last number of  this adapter   s Mac Address  Wireless adapters connect to the AP  should set up the same SSID as the AP     Click this button to create a unique SSID based on the adapter   s  Mac Address     Click this button to further configure WLAN authentication and  security setting  Please refer to 3 9 1 1     The available channel differs from different countries  For  example  USA  FCC  is channel 1 11  Europe  ETSI  is channel  1 13  The operating frequency channel will be restricted to the  country user located before importing  If you are in different  country  you have to adjust the channel setting to comply the  regulation of the country        26       Para
19. lete the selected MAC Address from Access List   Remove All Remove all the MAC Address from Access List   Apply Click to apply the setting change        30    3 9 3 Mac Table    The Mac Table page displays the detail information of the wireless adapters connected to the AP     Ralink Wireless Utility    Config   Access Control Mac Table   Event Log   Statistics   About      MAC Address Power Saving Mode             Parameter Description   MAC Address The MAC Address of the wireless adapters connected to the AP    AID The Association ID of current connection    Power Saving Mode The supporting status of Power Saving Mode of the wireless  adapter connected        31    3 9 4 Event Log    The Event Log page displays all the event time and message  You may clear the table by clicking     Clear        Ralink Wireless Utility    Config   Access Control   Mac Table Event Log   Statistics   About      Event Time  yp mm  dd  hh mm ss    Message oo    2006   06   23 09  57  31 Restart Access Point  2006   06   23 09  57  33 Restart Access Point       3 9 5 Statistics    The Statistics page displays the statistic information of the AP including transmit statistics and receive  statistics  You may reset the counters by clicking    Reset Counters        Ralink Wireless Utility    Config   Access Control   Mac Table   Event Lag Statistics   About           Transmit Statistics  Frames Transmitted Successfully  Frames Transmitted Successfully Without Retry  Frames Transmitted Successfully Af
20. level of security     Supports CCX 2 0  Cisco Compatible Extensions  for the radio monitoring and fast  roaming     Supports Software AP function  which turns the wireless station into a wireless AP   Automatic fallback increases data security and reliability    Supports the most popular operating system  Windows 98SE Me 2000 XP 2003 Server   Supports USB 2 0 1 1 interface     Portable and mini size design     1 2 Specifications    Standards  IEEE 802 11b g  Bus Type  USB 2 0 Type A  Frequency Band  2 4000   2 4835GHz  Industrial Scientific Medical Band   Modulation  OFDM with BPSK  QPSK  16QAM  64QAM  11g   BPSK  QPSK  CCK  11b   Data Rate  54 48 36 24 1 8 1 2 1 1 9 6 5 5 2 1 Mbps auto fallback    Securities  64 128 bit WEP Data Encryption  WPA  TKIP with IEEE 802 1x   WPA2   AES with IEEE 802 1x     Note  WPA2 is only enabled in Windows 2000 XP 2003 Server   Antenna  Internal Antenna   Drivers  Windows 98SE Me 2000 XP 2003 Server   LEDs  Link Activity   Transmit Power  17dBm   2dBm   Receive Sensitivity   7OdBm 54Mbps   83 5dBm 11Mbps  Dimension  9 H  x 27 W  x 87 D  mm   Temperature  32 122 F  0   50  C    Humidity  10 95   NonCondensing    Certification  FCC  CE    1 3 Package Contents    Before you begin the installation  please check the items of your package  The package should include  the following items     e One USB Adapter   e One USB 2 0 Extension Cable  100 cm   e One CD  Driver Utility User s Manual    e One Quick Guide    If any of the above items is missing  
21. meter    B G Protection    Preamble    Beacon  ms     TX Power    Tx BURST    No forwarding among wireless  clients    Hide SSID    Use Short Slot    Auto Channel Selection at next  boot    Description    If you have a mix of 802 11b and 802 11g wireless clients in the  network  it is recommended to enable the protection mechanism   This mechanism can decrease the rate of data collision between  802 11b and 802 11g wireless clients  When the protection mode  is enabled  the throughput of the AP will be a little lower due to  many of frame traffic should be transmitted    Auto     Based on the status of the network and automatically  disable enable protection mode     On     Always enable the protection mode     Off     Always disable the protection mode     802 11g wireless adapters support both long and short preamble   but for 802 11b wireless adapters  supporting short preamble is  optional  The throughput will be better when using short preamble   Long Preamble     128 bits sync field     Short Preamble     56 bits sync field     Here defines the time between two beacons  the default value is  100ms     If you want to lower the transmit power of the AP for saving the  power of the system  you can select the lower percentages from  the list  The lower power will cause the lower signal strength and  the coverage range     Tx BURST enables the AP to deliver better throughput in the  same period and environment     Enable this setting to force the wireless clients connected t
22. ming at  70 dBm    E Turn off RF         20       Parameter  Wireless Mode    Ad Hoc Wireless Mode    Select Your Country Region Code    B G Protection    Description   802 11 B G mix     If you have a mix of 802 11b and 802 119  wireless stations in your network  it is recommended to set the  adapter to this mode  This mode is also the default setting     802 11 B only     This adapter can be compatible with both 802 11g  and 802 11b wireless stations  If there are only 802 11b wireless  stations in the network  you can set the adapter to this mode     When the adapter is set in Ad Hoc  Peer to Peer Mode   you can  designate the wireless connection mode for the Ad Hoc network   Only B     This adapter can be compatible with both 802 11g and  802 11b wireless stations  If there are only 802 11b wireless  stations in the network  you can set the adapter to this mode     B G Mixed   If you have a mix of 802 11b and 802 11g wireless  stations in your network  it is recommended to set the adapter to  this mode  This mode is also the default setting     Only G     This adapter can be compatible with both 802 11g and  802 11b wireless stations  lf there are only 802 11g wireless  stations in the network  you can set the adapter to this mode     The available channel differs from different countries  For example   USA  FCC  is channel 1 11  Europe  ETSI  is channel 1 13  The  operating frequency channel will be restricted to the country user  located before importing  If you are in 
23. ngs    to enable the utility for the  adapter     Available networks   To connect to an available network  click Configure        Preferred networks     Automatically connect to available networks in the order listed  below     Leam about setting up wireless network  configuration        Note  If    Wireless Zero Configuration    is enabled  you can only configure the advance setting or check  the link status and statistics from the configuration utility of the adapter     3 1 Site Survey    When you open the Ralink Configuration Utility  the system will scan all the channels to find all the  access points stations within the accessible range of your adapter and automatically connect to the  wireless device with the highest signal strength  From the    Site Survey     all the networks nearby will be  listed  You can change the connection to another networks or add one of the networks to your own  profile list    K Ralink Wireless Utility    Profile   Link Status Site Survey   Statistics   Advanced   QoS   About      SSID BSSID Network T     BF_EMAX 00 DE 2E FF FF       86   11  None   Unknown   Infrastruct    ES Default 00 00 0E 79 33     50  11 None Unknown Infrastruct        lt   gt   Connected  lt    gt  Default Rescan Connect Add to Profile             Parameter Description       Available Networks This list shows all available wireless networks within range of your  adapter  It also displays the information of the networks including  the SSID  BSSID  Signal Strength  Cha
24. nnel  Encryption   Authentication and Network Type  If you want to connect to any  networks on the list  double click the item on the list  and the  adapter will automatically connect to the selected network     Rescan Button Click    Rescan    button to collect the new information of all the  wireless networks nearby     Connect Button Click    Connect    to connect to the selected network     Add to Profile Button Add the selected network to Profiles list        3 2 Profile    The    Profiles List    is for you to manage the networks you connect to frequently  You are able to  Add Delete Edit Activate a profile     K Ralink Wireless Utility  Profile   Link Status   Site Survey   Statistics   Advanced   QoS   About      Profile List    Profile Name   SSID Channel   Authentication   Encryption   Network Ty       E PROF1 Default Auto Open None Infrastructure  PROF2 BF_EMAX Auto Open None Infrastructure          a Delete   Edit PEREG          Parameter Description   Profiles List The profiles list display all the profiles and the relative settings of  the profiles including Profile Name  SSID  Channel  etc   Y This sign indicates the activated profile is been connecting   v This sign indicates the activated profile is not been       connecting   Add Delete Edit Button Click these buttons to add delete edit the selected profiles   Activate Button Click    Activate    to connect to the selected profile  When a profile is    activated  the adapter will be initially connected to th
25. o this  AP not sharing information each other     If    Hide SSID    checkbox is enabled  the AP will not appear in the   site survey list of any wireless clients  It means only the wireless   clients set the same SSID can connect to the AP  It avoids the AP  being connected by unauthorized users     Short slot time is 9 us and long slot time is 20 us     The AP will select a random channel at next booting        27       Parameter Description    Default Click to use with default value     Apply Click to apply the setting change        3 9 1 1 Auth  Vs  Security    This option enables you to configure the authentication mode and encryption algorithm used within the  AP     Auth  vs  Security    Authentication Type  Open v  Encrpption Type    SIR RE       WPA Pre shared Key      Group Rekey Interval              F Show Password    Cancel       Parameter Description    Authentication Type There are four types of authentication mode supported   Open     No authentication is needed among the wireless network        WPA PSK   It is a special mode designed for home and small  business users who do not have access to network authentication  servers  In this mode  known as Pre Shared Key  the user  manually enters the starting password in their access point or  gateway  as well as in each wireless station in the network   WPA PSK takes over automatically from that point  keeping  unauthorized users that don t have the matching password from  joining the network  while encrypting the 
26. onfigured  to provide Wireless Domain Services  WDS  takes the place of the  RADIUS server and authenticates the client so quickly that there is  no perceptible delay in voice or other time sensitive applications     When this parameter is enabled  the Cisco AP can run the radio  monitoring through the associated CCX compliant clients to  continuously monitor the WLAN radio environment and discover  any new APs that are transmitting beacons     The Cisco AP can perform monitoring measurements through the  CCX compliant clients on the non serving channels when this  parameter is enabled     It limits the channel measurement time  The default value is 250  milliseconds        3 6 QoS    This option enables you to configure QoS settings  for example  WMM  WMM   Power Save and Direct    Link Setup     Ralink Wireless Utility       Direct Link  Direct Link Setup    MAC Address   xz   E a mls en 5 malls    Timeout Value   sec  DLS Status  MAC Address Timeout          23       Parameter  WMM Enable    WMM     Power Save Enable    Direct Link Setup Enable  Direct Link    Direct Link Setup  MAC Address    Timeout Value    DLS Status    Description   Check on this item and click    Apply    to enable WMM function  and  then further you can configure WMM Power Save and Direct Link  Setup function     Check on this item to enable WMM Power Save function   Click    Setting    to further configure WMM Power Save setting   which includes  AC_BK  AC_BE  AC_Vl and AC_VO        Check on this i
27. onnecting to        Add Profile    Configuration Authentication and Security      Authentication Type    Encryption      WPA  Preshared Key         I Show Passward          3 2 1 2 Authentication and Security       Parameter Description       Authentication Type This setting has to be consistent with the wireless networks that  the adapter intends to connect   Open     No authentication is needed among the wireless network     Shared     Only wireless devices using a shared key  WEP Key  identified  are allowed to connecting each other     LEAP   LEAP is a pre EAP  Cisco proprietary protocol  with many  of the features of EAP protocols  Cisco controls the ability of other  vendors to implement this protocol  so it should be selected for  use only when limited vendor choice for client  access point  and  server products is not a concern  When you have set up LEAP  authentication  you have to enter the user name and password of  your computer     WPA     WPA provides a scheme of mutual authentication using  either IEEE 802 1x Extensible Authentication Protocol  EAP   authentication or pre shared key  PSK  technology  It provides a  high level of assurance to enterprises  small businesses and  home users that data will remain protected and that only  authorized users may access their networks  For enterprises that  have already deployed IEEE 802 1x authentication  WPA offers  the advantage of leveraging existing authentication databases  and infrastructure        13       Parame
28. ox by following the rules below    64 bit     Input 10 digit Hex values  in the    A F        a f    and    0 9     range  or 5 digit ASCII characters  including    a z    and    O 9     as  the encryption keys  For example     0123456aef  or    test1        128 bit     Input 26 digit Hex values  in the    A F        a f    and    0 9     range  or 13 digit ASCII characters  including    a z    and    O 9     as  the encryption keys  For example        01234567890 123456 789abcdef  or    administrator        802 1x Setting    Certification   CA Server      Authentication Type  PEAP    Session Resumption   Disabled v    PEAP    TLS Smart Card  Identity TTLS    Md5 Challenge    Use Client certificate      is    Tunneled Authentication    Protocol EAP MSCHAP v2    Identity  Password       The IEEE 802 1X specification describes a protocol that can be used for authenticating both clients and  servers on a network  The authentication algorithms and methods are those provided by the Extensible  Authentication Protocol  EAP   a method of authentication that has been in use for a number of years  on networks that provide Point to Point Protocol  PPP  support as many internet service providers and  enterprises do     When an AP acting as an authenticator detects a wireless station on the LAN  it sends an EAP Request  for the user s identity to the device   EAP  or the Extensible Authentication Protocol  is an authentication  protocol that runs before network layer protocols transmit d
29. rastructure is applicable to enterprise scale for wireless access to central database  or  wireless application for mobile workers     34    6  Whatis BSS ID    A specific Ad hoc LAN is called a Basic Service Set  BSS   Computers in a BSS must be  configured with the same BSS ID     7  Whatis WEP    WEP is Wired Equivalent Privacy  a data privacy mechanism based on a 40 bit shared key  algorithm  as described in the IEEE 802  11 standard     8  What is TKIP   TKIP is a quick fix method to quickly overcome the inherent weaknesses in WEP security   especially the reuse of encryption keys  TKIP is involved in the IEEE 802 111 WLAN security  standard  and the specification might be officially released by early 2003     9  Whatis AES   AES  Advanced Encryption Standard   a chip based security  has been developed to ensure the  highest degree of security and authenticity for digital information  wherever and however  communicated or stored  while making more efficient use of hardware and or software than  previous encryption standards  It is also included in IEEE 802 11i standard  Compare with AES   TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at  the hardware level     10  Can Wireless products support printer sharing    Wireless products perform the same function as LAN products  Therefore  Wireless products can  work with Netware  Windows 2000  or other LAN operating systems to support printer or file  sharing     11  Would the inform
30. rietary Turbo Mode feature  the  Turbo Mode will be enabled automatically without any configuration     3 9  SoftAP    This adapter can run as a wireless AP  The relative configurations of the AP including channel  SSID   MAC Address Filtering and so on are described as follows     Right click the Ralink Configuration Utility icon on the system tray of Windows and select    Switch to AP  Mode    to turn on SoftAP function     Launch Config Utilities    Switch to AP Mode    XI       3 9 1 Config    The Config page enables you to configure the AP connection setting  Country Region Code and other  advanced functions     Ralink Wireless Utility    Config   Access Control   Mac Table   Event Log   Statistics   About      Wireless Mode 802 11 B G Mixed TX Rate    Auto   Channel  1 y   SSID Soft amp P 42  lt   Use Mac Address Auth  vs  Security    Country Region Code  11 B G 0  CH1 11 v    MV Tx BURST    B G Protection fauto ti    iS I No forwarding among wireless clients  Preamble  Long Preamble y  Hide SSID   Beacon  ms  f 10 M Use Short Slot   TX Power hoz y   F Auto Channel Selection at next boot    Default Apply       25       Parameter  Wireless Mode    TX Rate    Channel    SSID    Use Mac Address    Auth  vs  Security    Country Region Code    Description    Selects the wireless mode supports by the AP   802 11 B G Mixed     The AP works in 11b g mixed mode     802 11 B Only     The AP works in 11b mode     802 11 G Only     The AP works in 11g mode     There are several opt
31. ritical communication systems  It is designed to trade off  bandwidth efficiency for reliability  integrity  and security  In other words  more bandwidth is  consumed than in the case of narrowband transmission  but the trade off produces a signal that  is  in effect  louder and thus easier to detect  provided that the receiver knows the parameters of  the spread spectrum signal being broadcast  If a receiver is not tuned to the right frequency  a  spread    spectrum signal looks like background noise  There are two main alternatives  Direct  Sequence Spread Spectrum  DSSS  and Frequency Hopping Spread Spectrum  FHSS      14  What is WMM    Wi Fi Multimedia  WMM   a group of features for wireless networks that improve the user  experience for audio  video and voice applications  WMM is based on a subset of the IEEE  802 11e WLAN QoS draft standard  WMM adds prioritized capabilities to Wi Fi networks and  optimizes their performance when multiple concurring applications  each with different latency  and throughput requirements  compete for network resources  By using WMM  end user  satisfaction is maintained in a wider variety of environments and traffic conditions  WMM makes it  possible for home network users and enterprise network managers to decide which data streams  are most important and assign them a higher traffic priority     15  What is WMM Power Save    WMM Power Save is a set of features for Wi Fi networks that increase the efficiency and  flexibility of data tran
32. rotocol  technologies  Client users are  required to authorize before accessing to APs or AP Routers  and the data transmitted in the network is  encrypted decrypted by a dynamically changed secret key  Furthermore  this adapter supports WPA2  function  WPA2 provides a stronger encryption mechanism through AES  Advanced Encryption  Standard   which is a requirement for some corporate and government users     When you use the devices such as Voice over Internet Protocol  VoIP  phones  televisions  VCRs and  MP3 players  how can you speed up the audio  video and voice data to pass through the wireless  network  IEEE 802 11e Quality of Service  QoS   The Wi Fi Alliance defined WMM as a profile of the  IEEE 802 11e  extensions for 802 11 networks will help to define the priorities of the data traffics by the  data categories to provide enhanced multimedia support  This adapter supports the advanced  technology for sure     This adapter is cost effective  together with the versatile features  it is the best solution for you to build  your wireless network     1 1 Features    Works with both IEEE 802 11b and IEEE 802 11g products   High speed transfer data rate     up to 54Mbps     Supports Turbo Mode to enhance the data transfer speed within the specific wireless  network     Supports WMM  IEEE 802 11e QoS standard  function to meet the multi media data  bandwidth requirement     Supports 64 128 bit WEP  WPA  TKIP with IEEE 802 1x   WPA2  AES with IEEE  802 1x  functions for high 
33. s for a Class B  digital device  pursuant to Part 15 of FCC Rules  These limits are designed to  provide reasonable protection against harmful interference in a residential installation   This equipment generates  uses  and can radiate radio frequency energy and  if not  installed and used in accordance with the instructions  may cause harmful  interference to radio communications  However  there is no guarantee that  interference will not occur in a particular installation  If this equipment does cause  harmful interference to radio or television reception  which can be determined by  turning the equipment off and on  the user is encouraged to try to correct the  interference by one or more of the following measures     1  Reorient or relocate the receiving antenna   2  Increase the separation between the equipment and receiver     3  Connect the equipment into an outlet on a circuit different from that to which the  receiver is connected     4  Consult the dealer or an experienced radio technician for help     FCC Caution    This device and its antenna must not be co located or operating in conjunction with  any other antenna or transmitter     This device complies with Part 15 of the FCC Rules  Operation is subject to the  following two conditions   1  this device may not cause harmful interference  and  2   this device must accept any interference received  including interference that may  Cause undesired operation     Any changes or modifications not expressly approved b
34. smission in order to conserve power  WMM Power Save has been optimized  for mobile devices running latency sensitive applications such as voice  audio  or video  but can  benefit any Wi Fi device  WMM Power Save uses mechanisms included in the IEEE 802 11e  standard and is an enhancement of IEEE 802 11 legacy power save  With WMM Power Save   the same amount of data can be transmitted in a shorter time while allowing the Wi Fi device to  remain longer in a low power    dozing    state     36    
35. tem and click    Apply    to enable DLS function     Specify the MAC Address of the client adapter you want to direct  link to and click    Apply    to add into DLS Status table     Specify the timeout value for the direct link you want to setup     The DLS Status displays all the direct link connections and you  can click    Tear Down    to stop any of them        3 7 About    By choosing this option  you can click the hyperlink to connect the website for the information of the  wireless chipset vendor and review basic information about the Utility such as the Driver  Utility and  EEPROM Version  The MAC Address of the adapter is displayed in the screen as well     Ralink Wireless Utility    Profile   Link Status   Site Survey   Statistics   Advanced   QoS    R    About     c  Copyright 2004  Ralink Technology  Inc  All rights reserved     RaConfig Version  1 2 2 0    Driver Version      EEPROM Version  1 3    IP Address      Sub Mask         Date  06 09 2006    1 1 1 0 Date  06 08 2006    Firmware Version  1 8    192 168 2 102 Phy_Address   00 0E 2E 00 11 42    255 255 255 0 Default Gateway  192 168 2 1    24    3 8 Turbo Mode    This adapter supports specific ways to increase the data transfer rate at a time  compress the data and  decrease the waiting time to send the next data to the Routers or APs  this feature  known as Turbo  Mode  enables higher throughput than IEEE 802 11g standard  Up to 54Mbps      When the adapter is connecting to the Routers or APs with the prop
36. ter    802 1x Setting    Encryption Mode    Description    WPA PSK   It is a special mode designed for home and small  business users who do not have access to network authentication  servers  In this mode  known as Pre Shared Key  the user  manually enters the starting password in their access point or  gateway  as well as in each wireless station in the network   WPA PSK takes over automatically from that point  keeping  unauthorized users that don t have the matching password from  joining the network  while encrypting the data traveling between  authorized devices     WPA2   Like WPA  WPA2 supports IEEE 802 1x EAP  authentication or PSK technology  It also includes a new  advanced encryption mechanism using the Advanced Encryption  Standard  AES   AES is required to the corporate user or  government users  The difference between WPA and WPA2 is that  WPA2 provides data encryption via the AES  In contrast  WPA  uses Temporal Key Integrity Protocol  TKIP      WPA2 PSK     WPA2 PSK is also for home and small business   The difference between WPA PSK and WPA2 PSK is that  WPA2 PSK provides data encryption via the AES  In contrast   WPA PSK uses Temporal Key Integrity Protocol  TKIP      WPA NONE     WPA NONE is defined for Ad hoc mode and  behaves like WPA PSK  WPA PSK is only defined for  infrastructure mode   The user manually enters the Pre Shared  Key in each wireless station in the network and WPA NONE  controls unauthorized users that don t have the matching  Pre Shared
37. ter Retry  Frames Fail To Receive ACK After All Retries  RTS Frames Successfully Receive CTS  RTS Frames Fail To Receive CTS          m Receive Statistics    Frames Received Successfully  Frames Received With CRC Error    Frames Dropped Due To Out of Resource          Duplicate Frames Received          32    3 9 6 About    The About page displays the basic information about the Utility  including Driver  Utility and EEPROM  Version  The MAC Address of the adapter is displayed in the screen as well     Ralink Wireless Utility    Contig   Access Control   Mac Table   Event Log   Statistics About    R     c  Copyright 2004  Ralink Technology  Inc  All rights reserved              Utility Version   1 0 9 0 Date  06 08 2006  Driver Version   1 1 1 0 Date  06 08 2006    EEPROM Version  1 3 Firmware Version  1 8          MAC Address   O0 0E  2E 00 11 42          33    4 Troubleshooting    This chapter provides solutions to problems usually encountered during the installation and operation  of the adapter     1  What is the IEEE 802 11g standard   802 11g is the new IEEE standard for high speed wireless LAN communications that provides for  up to 54 Mbps data rate in the 2 4 GHz band  802 11g is quickly becoming the next mainstream  wireless LAN technology for the home  office and public networks   802 11g defines the use of the same OFDM modulation technique specified in IEEE 802 11a for  the 5 GHz frequency band and applies it in the same 2 4 GHz frequency band as IEEE 802 11b   Th
38. tion before it gets an acknowledgment back from  the receiver that it has gotten some of it  When the Router or AP  the adapter is connecting to have set up the TCP Window  you can  enable the parameter to meet the data size for the Router or AP  connection  The larger TCP Window the better performance     When you want to fast roaming to the network nearby without  intercepting the wireless connection especially the adapter is  applied to the multimedia application or a voice call  you can  enable the parameter  The adapter will fast roaming to the near  network when the receive sensitivity  signal strength  is lower to  the value you have set up     If you want to turn off the radio of the adapter temporarily  click this  button  To turn on the radio  click this button again     CCX 2 0  Cisco Compatible Extensions  is developed by Cisco for  the radio monitoring and fast roaming        22       Parameter  LEAP Turn on CCKM    Enable Radio Measurement    Non Serving Channel  Measurements    Limit xxx milliseconds  0 2000     Description   During normal operation  LEAP enabled client devices mutually  authenticate with a new access point by performing a complete  LEAP authentication  including communication with the main  RADIUS server     When you configure your wireless LAN for fast re association   however  LEAP enabled client devices roam from one access  point to another without involving the main server  Using Cisco  Centralized Key Management  CCKM   an access point c
39. to this domain or to  one of its sub domains  e g  zeelans com  where the server is  blueberry zeelans com  but it may be any name used in the  certificate name field     18    3 3 Link Status    From the    Link Status    option  you can view all the information of the network you are connecting to     1 lt  Ralink Wireless Utility    Profile Link Status   Site Survey   Statistics   Advanced   QoS   About      Status   Extra Info    Link Speed      Throughput      Link Quality      Signal Strength      Noise Level         Default  lt    gt  00 00 0E 79 33 A      Link is Up  TxPower 100   Channel   111  lt    gt  2462000 KHz  Tx  Mbps  24 0 Rx  Mbps  1 0  Tx  Kbps  0 0 Ax  Kbps  13 4    ADORA AAA RBA  dBm    Weak 39     Low 43           Parameter Description   Status Display the SSID and MAC ID of the network the adapter is  connecting to    Extra Info Display the link status    Channel Display the number of the radio channel and the frequency used    Link Speed  Mbps     Throughput  Kbps     Link Quality    dBm    Signal Strength    for the networking     Display the transmission and reception rate of the network  The  maximum transmission rate is 54Mbps     Display the speed of data transmitted and received     This bar indicates the quality of the link  The higher the  percentage  the better the quality     If you want to know the signal strength in the unit of dBm  select  this check box     This bar shows the signal strength level  The higher percentage  shown in the bar
40. want to connect to another  wireless stations in the Wireless LAN network without through an  Access Point or Router     If you want to lower the transmit power of the adapter for saving the  power of the system  you can select the lower percentages from the  list  The lower power will cause the lower signal strength and the  coverage range     The preamble defines the length of the CRC block for  communication among wireless devices  This option is only active  in the Ad Hoc network     There are two modes including Auto and Long Preamble  If      Auto    mode is selected  the adapter will auto switch the preamble  mode depending on the wireless devices the adapter is connecting  to     Minimum packet size required for an RTS  Request To Send   For  packets smaller than this threshold  an RTS is not sent and the  packet is transmitted directly to the wireless network  Select a  setting within a range of 0 to 2347 bytes  Minor change is  recommended     The value defines the maximum size of packets  any packet size  larger than the value will be fragmented  If you have decreased this  value and experience high packet error rates  you can increase it  again  but it will likely decrease overall network performance  Select  a setting within a range of 256 to 2346 bytes  Minor change is  recommended     This setting is only available for Ad Hoc mode  Select the number of  the radio channel used for the networking  The channel setting  should be the same with the network you are c
41. y the party responsible for  compliance could void the authority to operate equipment     Federal Communications Commission  FCC  Radiation Exposure Statement    This equipment complies with FCC radiation exposure set forth for an uncontrolled  environment  In order to avoid the possibility of exceeding the FCC radio frequency  exposure limits  human proximity to the antenna shall not be less than 2 5cm  1 inch   during normal operation     Federal Communications Commission  FCC  RF Exposure Requirements    SAR compliance has been established in the laptop computer s  configurations with  PCMCIA slot on the side near the center  as tested in the application for Certification   and can be used in laptop computer s  with substantially similar physical dimensions   construction  and electrical and RF characteristics  Use in other devices such a PDAs  or lappads is not authorized  This transmitter is restricted for use with the specific  antenna s  tested in the application for Certification  The antenna s  used for this  transmitter must not be co located or operating in conjunction with any other antenna  or transmitter     R amp TTE Compliance Statement    This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE  EUROPEAN PARLIAMENT AND THE COUNCIL of March 9  1999 on radio  equipment and telecommunication terminal Equipment and the mutual recognition of  their conformity  R amp TTE    The R amp TTE Directive repeals and replaces in the directive 98 13 E
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
SMC Networks SMC2635W User's Manual  Ti100 & Ti200 OPERATION MANUAL  DICENTIS  Cables Direct ERT-601V networking cable  ポンドテックキット    USER MANUAL  REFUEL  suite - Lochinvar    Copyright © All rights reserved. 
   Failed to retrieve file