Corinex Global Network Card ETS 300 328 User Manual

Corinex  
Wireless G USB  
Mini Adapter  
Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Corinex Wireless G USB Mini Adapter  
FCC ID: PANWL2203  
Corinex Communications Corp.  
# 670-789 West Pender Street  
Vancouver, BC  
Canada V6C 1H2  
Vancouver / Mar. 1. 2005  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Copyright  
This document, as well as the software described in it, is furnished under license and  
may be used or copied only in accordance with the terms of the license. The content  
of this document is furnished for informational use only, it is subject to change without  
notice, and it does not represent a commitment on the part of Corinex Communications  
Corp.  
Corinex Communications Corp. assumes no responsibility or liability for any errors or  
inaccuracies that may appear in this document.  
It is our policy to enhance our products as new technologies, hardware components,  
software and firmware become available; therefore, the information contained in this  
document is subject to change without notice.  
Some features, functions, and operations described in this document may not be included  
and sold in certain countries due to government regulations or marketing policies.  
The use of the product or its features described in this document may be restricted or  
regulated by law in some countries. If you are unsure which restrictions or regulations  
apply, you should consult your regional Corinex office or the authorized reseller.  
Published by:  
1
Corinex Communications Corp.  
#670-789 West Pender Street  
Vancouver, B.C.  
Canada V6C 1H2  
Tel.: +1 604 692 0520  
Fax: +1 604 694 0061  
Corinex is a registered trademark of Corinex Communications Corp.  
Microsoft, MS-DOS, MS, Windows are either registered trademarks or trademarks of  
Microsoft Corporation in the U.S.A. and/or other countries.  
All products or company names mentioned herein may be the trademarks of their  
respective owners.  
Copyright (c) 2001-2005 by Corinex Communications Corp.  
NOTE: This equipment has been tested and found to comply with the limits for  
Class B information technology equipment. These limits are designed to provide  
reasonable protection against harmful interference in a residential installation.  
This equipment generates, uses and can radiate radio frequency energy and, if  
not installed and used in accordance with the instructions, may cause harmful  
interference to radio communications. However, there is no guarantee that in-  
terference will not occur in a particular installation. If this equipment does cause  
harmful interference, the end user is advised to take adequate measures.  
2005-02-14 ver. 1  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSowBnlMoaidn.i Adapter  
End User License Agreement  
CORINEX COMMUNICATIONS CORPORATION  
This End User License Agreement (“EULA) is a legal agreement between you and CORINEX  
COMMUNICATIONS CORPORATION (“CORINEX”) with regard to the copyrighted Software  
provided with this EULA.  
Use of any software and related documentation (“Software”) provided with a CORINEX hardware  
product, or made available to you by CORINEX via download or otherwise, in whatever form or media,  
will constitute your acceptance of these terms, unless separate terms are provided by the software  
supplier, in which case certain additional or different terms may apply. If you do not agree with the terms  
of this EULA, do not download, install, copy or use the Software.  
1. Licence Grant. CORINEX grants to you a personal, non-transferable and non-exclusive right to use  
the copy of the Software provided with this EULA. You agree you will not copy the Software except  
as necessary to use it on a single hardware product system. You agree that you may not copy the  
written materials accompanying the Software. Modifying, translating, renting, copying, transferring  
or assigning all or part of the Software, or any rights granted hereunder, to any other persons, and  
removing any proprietary notices, labels or marks from the Software is strictly prohibited. Furthermore,  
you hereby agree not to create derivative works based on the Software. You may permanently transfer  
all of your rights under this EULA, provided you retain no copies, you transfer all of the Software, and  
the recipient agrees to the terms of this EULA. If the Software is an upgrade, any transfer must include  
all prior versions of the Software.  
2. Copyright. The Software is licensed, not sold. You acknowledge that no title to the intellectual property  
in the Software is transferred to you. You further acknowledge that title and full ownership rights to  
the Software will remain the exclusive property of Corinex Communications Corporation and/or its  
suppliers, and you will not acquire any rights to the Software, except as expressly set forth above. All  
copies of the Software will contain the same proprietary notices as contained in or on the Software.  
2
3. Reverse Engineering. You agree that you will not attempt, and if you are a corporation, you will use  
your best efforts to prevent your employees and contractors from attempting to reverse compile,  
modify, translate or disassemble the Software in whole or in part. Any failure to comply with the above  
or any other terms and conditions contained herein will result in the automatic termination of this  
license and the reversion of the rights granted hereunder to CORINEX.  
4. Disclaimer of Warranty. The Software is provided AS IS“ without warranty of any kind. CORINEX  
and its suppliers disclaim and make no express or implied warranties and specifically disclaim warranties  
of merchantability, fitness for a particular purpose and non-infringement of third-party rights. The  
entire risk as to the quality and performance of the Software is with you. Neither CORINEX nor its  
suppliers warrant that the functions contained in the Software will meet your requirements or that the  
operation of the Software will be uninterrupted or error-free.  
5. Limitation of Liability. Corinex’s entire liability and your exclusive remedy under this EULA shall not  
exceed the price paid for the Software, if any. In no event shall CORINEX or its suppliers be liable to  
you for any consequential, special, incidental or indirect damages of any kind arising out of the use or  
inability to use the software, even if CORINEX or its supplier has been advised of the possibility of such  
damages, or any claim by a third party.  
6. Applicable Laws. This EULA will be governed by the laws of Canada, excluding its conflict of law  
provisions.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
End User License Agreement  
7. Export Laws. This EULA involves products and/or technical data that may be controlled under any  
applicable export control laws, and regulation, and may be subject to any approval required under such  
laws and regulations.  
8. Precedence. Except as set out above, where separate terms are provided by the software supplier,  
then, subject to this EULA, those terms also apply and prevail, to the extent of any inconsistency with  
this EULA.  
3
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Quick Start  
Quick Start  
Thank you for purchasing the Corinex Wireless G USB Mini Adapter. Please follow the steps below to suc-  
cessfully install the hardware and software.  
NOTE: Please don’t connect the Corinex Wireless G USB Mini Adapter to your PC before step 4.  
Step1  
Insert the included CD into your CD-ROM drive. The installer should start automatically. If it does not,  
please navigate to the root folder of the CD by clicking on My Computer and then on the Compact  
Disc icon, and execute the file setup.exe. The following screen will appear.  
Please wait until the InstallShield Wizard starts completely and the welcome screen appears.  
4
Proceed by clicking the Next button.  
Step 2  
On the next screen, you may select where to install the utility for configuration of the Corinex Wireless  
G USB Mini Adapter. If you are satisfied with the default setting, click Next. Otherwise, click Browse to  
select the path manually and confirm your choice by clicking Next.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Quick Start  
Step 3  
The installer will now install the drivers in your system and copy all the necessary files to the specified  
folder.  
5
Please wait until the files are copied. The following screen will appear.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Quick Start  
In Windows XP, shortly after this screen appears, you may encounter a system warning saying that the  
software has not passed Windows Logo testing. Please accept this warning by clicking Continue any-  
way.  
Finally, click Finish to close the installation wizard.  
Step 4  
Now you can connect the Corinex Wireless G USB Mini Adapter to your computer. Windows will detect a  
new device and start the installation. Please wait until the installation is finished. In Windows XP, during  
the installation, you will encounter a system warning saying that the software has not passed Windows  
Logo testing. Please accept this warning by clicking Continue anyway and proceed the installation.  
The Corinex Wireless G USB Mini Adapter is now ready to use. Please refer to the user guide for configura-  
tion and a detailed description of the functionality.  
6
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Contents  
Contents  
Copyright ........................................................................................................ 1  
End User License Agreement ...................................................................... 2  
Quick Start ................................................................................................... 4  
Contents ........................................................................................................ 7  
1. Introduction ................................................................................................... 8  
1.1 Overview ........................................................................................................ 8  
1.2 Package Contents ......................................................................................... 8  
1.3 Features .......................................................................................................... 8  
1.4 System Requirements ................................................................................... 8  
2. Using the Corinex Wireless G USB Mini Adapter ................................... 9  
2.1 Overview ....................................................................................................... 9  
2.2 Installation ..................................................................................................... 9  
3. Configuration ................................................................................................ 12  
3.1 Station Mode ............................................................................................... 13  
3.2 Access Point Mode .................................................................................... 24  
4. Troubleshooting ........................................................................................... 31  
5. Glossary ........................................................................................................ 32  
7
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Introduction  
1 Introduction  
1.1 Overview  
With a Corinex Wireless G USB Mini Adapter, you can enter the world of wireless  
communication and enjoy all the advantages of networking without cables. The  
Corinex Wireless G USB Mini Adapter is two devices in one, an 802.11g compliant  
network interface card and a fully featured wireless access point!  
The adapter allows you to connect to other wireless devices and allows you to  
create a wireless network. Wired and wireless networks can be interconnected  
with the Wireless G USB Mini Adapter, giving you all the benefits of your wired  
network to your wireless clients.  
1.2 Package Contents  
When you receive your Corinex Wireless G USB Mini Adapter, check to be sure that  
the package contains:  
Corinex Wireless G USB Mini Adapter  
• Installation CD with drivers and documentation  
• Printed Quick Start Guide  
8
1.3 Features  
• Supports Microsoft Windows 98SE, ME, 2000 and XP  
• Operating distance of up to 300 meters in free space  
• 54/48/36/24/18/12/11/9/6/5.5/2/1 Mbps selectable Data Rate  
• Supports USB 2.0 interface  
• Access Point or Station mode  
• 64/128/256-bit WEP (Wired Equivalent Privacy), TKIS and AES encryption  
• Open System, Shared Key, WPA, WPA PSK, WPA2 and WPA2 PSK  
Authentication  
• 2.400GHz ~ 2.4835GHz unlicensed ISM Frequency Band  
• Modulation Method:  
- IEEE 802.11b: DSSS (Direct Sequence Spread Spectrum)  
- IEEE 802.11g: OFDM (Orthogonal Frequency Division Multiplexing)  
• Easy operation and setup  
1.4 System Requirements  
• Windows 98SE / ME / 2000 / XP  
• One available USB 1.1 or 2.0 port  
Corinex Wireless G USB Mini Adapter  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using the Corinex Wireless G USB Mini Adapter  
2 Using the Corinex Wireless G USB Mini Adapter  
2.1 Overview  
Thank you for purchasing the Corinex Wireless G USB Mini Adapter!  
The Corinex Wireless G USB Mini Adapter is an easy-to-install wireless adapter,  
compliant with both 802.11b and 802.11g wireless standards, allowing your  
computer to communicate with other wireless networking devices or wireless  
networks. Additionally, it can act as a wireless access point, allowing wireless clients  
to connect to your computer, and furthermore, to any wired network to which your  
PC is connected.  
The Corinex Wireless G USB Mini Adapter supports both USB 1.1 and 2.0 standards.  
The only difference is the maximum data rate. When connected to a USB 1.1 port,  
the USB Mini Adapter behaves as an 802.11b client/access point, allowing data rates  
of up to 11 Mbps. When connected to a USB 2.0 port, it provides the full capabilities  
of an 802.11g wireless device, allowing speeds of up to 54 Mbps. The adapter comes  
with a convenient configuration utility, allowing fast and easy setup of all parameters  
and functions.  
9
2.2 Installation  
The Corinex Wireless G USB Mini Adapter requires installation of the drivers and  
the configuration utility in order to be detected by the operating system. Please  
follow the steps below in order to successfully install the Corinex Wireless G USB  
Mini Adapter drivers.  
NOTE: Please don’t connect the Corinex Wireless G USB Mini Adapter to your  
PC before step 4.  
Step1  
Insert the included CD into your CD-ROM drive. The installer should start  
automatically. If it does not, please navigate to the root folder of the CD by clicking  
on My Computer and then on the Compact Disc icon, and execute the file  
setup.exe. The following screen will appear.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Using the Corinex Wireless G USB Mini Adapter  
Please wait until the InstallShield Wizard starts completely and the welcome screen  
appears.  
10  
Proceed by clicking the Next button.  
Step 2  
On the next screen, you may select where to install the utility for configuration of  
the Corinex Wireless G USB Mini Adapter. If you are satisfied with the default setting,  
click Next. Otherwise, click Browse to select the path manually and confirm your  
choice by clicking Next.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Using the Corinex Wireless G USB Mini Adapter  
Step 3  
The installer will now install the drivers in your system and copy all the necessary  
files to the specified folder.  
Please wait until the files are copied. The following screen will appear.  
11  
In Windows XP, shortly after this screen appears, you may encounter a system warn-  
ing saying that the software has not passed Windows Logo testing. Please accept this  
warning by clicking Continue anyway.  
Finally, click Finish to close the installation wizard.  
Step 4  
Now you can connect the Corinex Wireless G USB Mini Adapter to your computer.  
Windows will detect a new device and start the installation. Please wait until the in-  
stallation is finished. In Windows XP, during the installation, you will encounter a sys-  
tem warning saying that the software has not passed Windows Logo testing. Please  
accept this warning by clicking Continue anyway and proceed the installation.  
Your Corinex Wireless G USB Mini Adapter is now ready to use. Please see the next  
chapter on how to set up your wireless network parameters.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
3 Configuration  
The Corinex Wireless G USB Mini Adapter comes with a configuration utility, which is  
installed together with the drivers. As soon as you plug the Corinex Wireless G USB  
Mini Adapter into the USB port on your PC, the utility will start and you will see its  
icon in the system tray.  
You can double-click on the icon at anytime to bring the configuration window to  
the foreground and check or change the settings.  
If the utility doesn’t start automatically after connecting the Corinex Wireless G USB  
Mini Adapter to your computer, you can start it manually from the Start menu. It can  
be found in the Programs folder of the Start menu, under the subfolder Corinex  
-> Corinex Wireless USB Mini Adapter.  
After starting the configuration utility, the following screen opens:  
12  
The Network Adapter field shows the name of the currently configured net-  
work adapter. By default, it shows the Corinex Wireless G USB Mini Adapter. It is  
not recommended to change the default name of the adapter.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
In the top right corner of the window, you can see the current operation mode of  
the Corinex Wireless G USB Mini Adapter. Both modes are described in the table  
below.  
Mode  
Description  
Station  
The Corinex Wireless G USB Mini Adapter works as a wireless  
client. It has to be connected to an access point in order to  
connect the computer to a network.  
Access Point  
The Corinex Wireless G USB Mini Adapter works as an access  
point and provides networking services for wireless clients.  
In this mode, you can bridge the wireless network with an-  
other network, for example with your Ethernet connection,  
so that the wireless clients are able to access the network.  
The configuration options and the look of the configuration utility depend on the  
operating mode. Please see the next chapters for detailed information on both  
modes.  
3.1 Station Mode  
13  
By default, the Corinex Wireless G USB Mini Adapter comes in the station mode and  
tries to find a wireless access point. It scans all channels for a response. As soon as  
it finds an access point, it displays its SSID and signal strength in the table Available  
Networks.  
You can scan for all available access points by clicking on the Refresh button. The  
Corinex Wireless G USB Mini Adapter scans all available channels and reports the re-  
sults in the Available Networks window.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
After an access point is selected from the list, its parameters are displayed in the  
Selected Network Information section, next to the list of access points. The fol-  
lowing information is displayed:  
Field  
Channel  
Type  
Description  
Displays the operating channel of the selected access point.  
Displays the type of network:  
Infrastructure – the clients communicate with each other using  
an access point. The access point can be connected to a wired  
network in order to provide connectivity to the internet, to  
shared items on a network, and printers.  
Ad-Hoc – the clients communicate with each other directly.  
Indicates type of encryption used by the access point.  
MAC address of the access point.  
Encrypt  
BSSID  
When you click on the Connect button, the Corinex Wireless G USB Mini Adapter  
will try to connect to the selected access point. After successful connection to the  
access point, the window changes to show information about the connection status.  
14  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Field  
Channel  
Type  
Description  
Channel being used for communication  
Type of connection, having the values Infrastructure or Ad-  
Hoc  
SSID  
Identification of the network  
Tx Rate  
Encrypt  
Link Status  
Maximum data rate  
Type of encryption used  
Shows the MAC address of the connected access point  
Signal Strength Signal strength, given as a percentage  
Link Quality  
Quality of the link between the Corinex Wireless USB Mini  
Adapter and the access point, given as a percentage of the cur-  
rent data rate  
Tx Frame  
Rx Frame  
Number of frames transmitted per second  
Number of frames received per second  
If you want to set up or adjust the network parameters manually, please click on the  
Network Options button. The following window will appear.  
15  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
This window is divided into four sections – General, Encryption, Profile and  
Other.  
3.1.1 General  
This section shows the general wireless settings of the current connection. If you  
want to change anything, click on the button Unlock. All fields, which can be  
changed, will be enabled. Please see the following table for explanations of the fields  
and their options.  
16  
Field  
Description  
Channel  
Current channel. This field cannot be changed if the Corinex Wireless  
G USB Mini Adapter operates in the infrastructure mode and is con-  
nected to an access point. Depending on the country, you may not  
be able to use all channels. Please see the section Other for details  
on the usage of channels.  
Tx Rate  
SSID  
Transmit data rate. This can be set to Auto, allowing the Corinex  
Wireless G USB Mini Adapter to negotiate the data rate automatically  
with the access point. If you prefer manual setting, you can select  
any rate from 1 Mbps up to 54 Mbps.  
Identification of the network. Only two devices which have the  
same SSID can communicate with each other. You can enable the  
checkbox “any”, and this will force the Corinex Wireless G USB Mini  
Adapter to connect to any access point it finds, choosing the best  
signal strength and link quality.  
Network  
Type  
Infrastructure – the clients communicate with each other using  
an access point. The access point can be connected to a wired net-  
work, in order to provide connectivity to the Internet, to shared  
items on a network, and printers.  
Ad-Hoc – the clients communicate directly with each other.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Field  
Encryption In infrastructure mode:  
Disable – the communication is not encrypted.  
Description  
WEP – the communication is encrypted using 64/128/256 bit WEP.  
TKIP – replaces WEP with a stronger encryption algorithm. The  
passwords change dynamically, and the change is synchronized be-  
tween the access point and the wireless client.  
AES – another encryption method, more secure than WEP.  
In ad-hoc mode:  
Enable WEP – encryption is enabled.  
Disable WEP – encryption is disabled.  
Authen-  
tication  
Mode  
The following authentication modes are available:  
Open System - the simplest authentication method. The client  
sends out a request and the access point authenticates it. There is  
no encryption.  
Shared Key – this method uses a WEP encrypted password for  
authentication. The client will be authenticated by the access point  
only if the passwords match.  
Auto – in this mode, the access point provides the method for au-  
thentication and the client uses the offered method, if available.  
17  
In the infrastructure mode, two more modes are available:  
WPA – uses a combination of Open System and 802.1x authentica-  
tion. First the wireless client authenticates with the access point,  
then performs user-level authentication with 802.1x.  
WPA PSK - a WPA pre-shared-key mode, which doesn’t require  
802.1x authentication. The authentication in this mode is based on  
shared secrets, stored both on the access point and on the wireless  
client.  
WPA2 and WPA2 PSK – second generation of the Wi-Fi Protect-  
ed Access based on the final IEEE 802.11i amendment to the 802.11  
standard.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
3.1.2 Encryption Options  
Wireless networks with only the default configuration are very vulnerable. Anyone  
with a wireless card can connect to your network and use its services if the network  
is not secure. The Corinex Wireless G USB Mini Adapter supports all common kinds  
of encryption algorithms.  
WEP Encryption Key  
If you have enabled WEP encryption, after clicking on WEP Encryption Key, you  
can change the WEP settings. The following window will appear.  
18  
Click Unlock to enable the fields to be changed. Please see the following table for  
details on each setting.  
Setting  
Description  
Key Length  
You can select 64, 128 or 256 bit en-  
cryption.  
Default Key ID  
Key Format  
Indicates which of the four keys will be  
used by default.  
You can choose whether you want to  
enter the WEP keys in hexadecimal (0-  
9, A-F) or ASCII format (characters,  
case sensitive).  
Key Value 1-4  
The four encryption keys. The keys are  
coded on-screen as asterisks (*).  
The key is provided via 802.1x authen- The WEP key will be acquired automat-  
tication  
ically from the server after successful  
802.1x authentication.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
The next table shows the required lengths of the keys, depending on the Key  
Length setting.  
Key Length  
64 bit  
Length in hexadecimal format  
10  
Length in ASCII format  
5
128 bit  
26  
58  
13  
29  
256 bit  
After setting all the parameters, please click Apply to save the settings and close  
the window by clicking the x button which is located in the top right corner of the  
window.  
WPA Encryption  
If you selected WPA for authentication, you can set the WPA parameters by clicking  
the WPA Encryption button. The following window will appear.  
19  
Click the Unlock button to enable editing of the WPA settings.  
Connect Information  
You can select the protocol used for authentication. Please see the following table  
for details on each choice.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Protocol  
Description  
TLS  
TLS authenticates the station with the access point by exchanging  
digital certificates. In EAP-TLS, certificates are used to provide  
authentication in both directions. The server presents a certifi-  
cate to the client, and, after validating the server’s certificate, the  
client presents a client certificate to the server. No username or  
password is required.  
PEAP  
PEAP authenticates wireless LAN clients using only server-side  
digital certificates by creating an encrypted SSL/TLS tunnel be-  
tween the client and the authentication server. The tunnel then  
protects the subsequent user authentication exchange. User-  
name and password are required.  
Pre-Shared Key  
In this section you can enter the WPA pre-shared key which will be used for authen-  
tication. This key must be between 8 and 64 characters long.  
Certificate  
From the list, you can select the digital certificate used for authentication with the  
server.  
20  
NOTE: If there are no certificates available, please contact your network  
administrator in order to get digital certificates needed to authenticate with  
the server.  
3.1.3 Profile  
For users who often change their wireless settings, profiles can be created with  
different connection and encryption settings so you don’t have to set everything  
manually every time you want to connect to a different access point or change the  
security settings.  
You can enter the name of the profile into the Profile Name field and click on the  
button Save Current. The new profile with the current wireless settings will be  
created and will appear in the list of profiles. If you want to load the saved profile,  
select it from the list and click on the button Load. If you want to delete a profile,  
select it from the list and click on Delete.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
3.1.4 Other  
If you want to modify the application’s settings or change the network settings for  
the Corinex Wireless G USB Mini Adapter, please click on Advanced. The following  
window will appear.  
21  
The advanced configuration contains the following sections.  
User Interface  
Here you can select the language of the configuration utility. You can choose be-  
tween English, German, Spanish, French, Swedish and Traditional Chinese.  
The changes are applied immediately.  
Country Roaming  
In some countries, not all channels can be used for wireless communication, due to  
frequency conflicts with military communications or other systems. This is defined  
by regulatory domains in the respective countries. In this section, you can select the  
region or country where you will be using the Corinex Wireless G USB Mini Adapter  
from the list. World Mode enables the first 11 channels, a more general setting  
which will be compatible with wireless regulatory requirements in most countries.  
Choose this setting if your country does not appear in the drop-down list. If your  
country does appear in the User select list, check the button and select your coun-  
try, which will ensure that you’re operating within the frequency range allowed in  
your country. The following table shows the available channels in certain countries.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Channel Center  
Identifier Frequency  
(MHz)  
Regulatory Domains  
North  
ETSI  
Japan (most of  
Europe)  
Israel France Mexico  
America  
1
2
2412  
2417  
2422  
2427  
2432  
2437  
2442  
2447  
2452  
2457  
2462  
2467  
2472  
2484  
3
4
5
6
7
8
9
10  
11  
12  
13  
14  
22  
Power Consumption Settings  
The Corinex Wireless G USB Mini Adapter draws its power from your computer, di-  
rectly through the USB port. If you’re using a laptop running on battery power, you  
may want to save energy by switching the Corinex Wireless G USB Mini Adapter to  
one of the power saving modes. The output power will decrease, but it will extend  
the running time of your battery. You can select between the following modes:  
Power consumption mode  
Description  
Continuous Access Mode (CAM)  
Consumes maximum power, provides  
maximum performance  
Maximum Power-Saving Mode  
Fast Power-Saving Mode  
Switches to power saving mode, pro-  
vides the least performance  
The Corinex Wireless G USB Mini Adapt-  
er will switch between the two above  
modes, depending on the amount of  
data sent or received.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Fragmentation Threshold  
In case of interference in the wireless channel, or weak signal, the Corinex Wireless  
G USB Mini Adapter can fragment frames to optimize performance. It will divide the  
frames into smaller pieces and send them separately to the destination device. Only  
data packets are fragmented - the broadcast and multicast packets are transmitted  
unchanged.  
The threshold value is the maximum size of an unfragmented packet. Any frame  
larger than that threshold will be fragmented. If there are no packet losses in the  
wireless media, the value should be unchanged. If you experience collisions, try to  
lower the threshold to approx. 1000 bytes. If the network performs well at this set-  
ting, you can try higher values until you find the optimal performance.  
The default value of the threshold is 2346 bytes.  
RTS / CTS Threshold  
The 802.11 standard includes the RTS/CTS (Request to Send/Clear to Send) func-  
tion to control access of the wireless stations to the wireless medium. If two wire-  
less stations are transmitting packets to the access point at the same time, the access  
point will not be able to handle both, and one of the stations will have to repeat the  
transmission.  
23  
If the RTS/CTS function is enabled, the station will initiate a handshake with the  
destination device (access point). After the access point finishes all pending opera-  
tions, it confirms that the station can send the packet. This improves performance  
by avoiding repeat transmissions of the same data.  
The threshold value is the maximum size of a packet which can be sent without ac-  
tivating the RTS/CTS handshake. Sending a packet with a size larger than the thresh-  
old value will activate the RTS/CTS handshake before transmission can begin.  
Since the RTS/CTS function is only initiated on the client side, these settings can  
be ignored while the Corinex Wireless G USB Mini Adapter is set to Access Point  
mode.  
By default, the RTS/CTS function is disabled – the threshold is set to 2347 bytes.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Information  
If you want to check the version number of the Corinex Wireless G USB Mini Adapt-  
er’s driver, version of the configuration utility or the MAC address of the Corinex  
Wireless G USB Mini Adapter, you can click the button Information, and a window  
with all this information will open.  
3.2 Access Point Mode  
The Corinex Wireless G USB Mini Adapter can operate in access point mode as well.  
An access point is a device which connects wireless devices together, and can op-  
tionally provide connection to a wired network in order to provide further services  
to wireless clients, such as Internet connection or file sharing.  
24  
If you want to switch your Corinex Wireless G USB Mini Adapter to access point  
mode, go to the main screen of the configuration utility and select Access Point  
from the Mode list in the upper right corner of the window. The Corinex Wireless G  
USB Mini Adapter will be switched to access point mode immediately and the win-  
dow will show the basic information as follows:  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
NOTE: In the picture shown above, the access point operates on channel  
11, its SSID is Corinex, it uses no encryption, and it transmits with maximum  
power. There is a station associated with the access point, at MAC address  
00:0F:66:96:40:04.  
In the section Connect Station List, you will see the MAC addresses of all wireless  
stations connected to your access point.  
For further configuration, please click on Options. The following window will ap-  
pear.  
25  
3.2.1 General Connection Settings  
In this section, after clicking on Unlock you can configure the basic connection set-  
tings for the access point. Please see the following table for details on each option.  
Setting  
Description  
Channel  
Operating channel of the access point.  
Network The following options are available:  
Mode Mixed Mode – both 802.11b and 802.11g compatible devices can  
connect to this access point.  
802.11b only – only 802.11b devices can connect to this access  
point.  
802.11g only - only 802.11g devices can connect to this access  
point.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Setting  
Description  
SSID  
This is the identification of your wireless access point.  
Hide SSID If you don’t want to announce the presence of your wireless access  
point to the world, click this checkbox.  
TX Power You can switch between four transmission power levels. Value 0  
means maximum output power, value 3 means minimum power. This  
setting will reduce the effective range of your access point.  
Click Apply to save your changes.  
3.2.2 WEP  
The communication between the access point and the wireless clients can be en-  
crypted with 64-bit, 128-bit or 256-bit strong WEP encryption. Selecting an option  
from the list, you can either disable WEP, or set one of the three WEP encryptions.  
To set-up parameters for WEP, click on WEP Key. The following window will ap-  
pear.  
26  
Click Unlock to enable changes to be made. Please see the following table for de-  
tails on each setting.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Setting  
Description  
Key Length You can select 64-, 128- or 256-bit encryption.  
Default Key Indicates, which of the four keys will be used by default.  
ID  
Key Format You can choose whether you want to enter the WEP keys in hexa-  
decimal (0-9, A-F) or ASCII format (characters, case sensitive).  
Key Value  
1-4  
The four encryption keys. Characters display as asterisks on-screen  
(*).  
The next table lists the required lengths of the different keys, depending on the Key  
Length setting.  
Key Length  
Length in hexa- Length in  
decimal format ASCII format  
64-bit  
10  
26  
58  
5
128-bit  
256-bit  
13  
29  
27  
After setting all the parameters, please click Apply to save the settings and close the  
window by clicking the x button located in the top right corner of the window.  
3.2.3 Authentication Mode  
For the authentication of wireless clients on the access point, you can select be-  
tween Open System and Shared Key authentication. Please see the following  
table for details:  
Authentication Description  
Type  
Open System  
The simplest authentication method. The client sends out a  
request and the access point authenticates it. There is no en-  
cryption.  
Shared Key  
This method uses a WEP-encrypted password for authentica-  
tion. The client is authenticated by the access point only if the  
passwords match.  
NOTE: For Shared Key authentication details, please see the description of  
the WEP settings above.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
3.2.4 Fragmentation Threshold  
In case of interference in the wireless channel, or weak coverage, the Corinex Wire-  
less G USB Mini Adapter can fragment frames to optimize performance. It will divide  
the frames into smaller pieces and send them separately to the recipient. Only data  
packets are fragmented, the broadcast and multicast packets are transmitted un-  
changed.  
The threshold value means the maximum size of an unfragmented packet. Any  
frame larger than that threshold will be fragmented. If there are no packet losses in  
the wireless media, the value should be unchanged. If you experience collisions, try  
to lower the threshold to approx. 1000 bytes. If the network performs well at this  
setting, you can try higher values until you find the optimal performance.  
The default value of the threshold is 2346 bytes.  
3.2.5 RTS/CTS  
The 802.11 standard includes the RTS/CTS (Request to Send/Clear to Send) func-  
tion to control access of the wireless stations to the wireless medium. If two wire-  
less stations are transmitting packets to the access point at the same time, the access  
point will not be able to handle both, and one of the stations will have to repeat the  
transmission.  
28  
If the RTS/CTS function is enabled, the station will initiate a handshake with the  
destination device (access point). After the access point finishes all pending opera-  
tions, it confirms that the station can send the packet. This improves performance  
by avoiding repeat transmissions of the same data.  
The threshold value is the maximum size of a packet which can be sent without ac-  
tivating the RTS/CTS handshake. Sending a packet with a size larger than the thresh-  
old value will activate the RTS/CTS handshake before transmission can begin.  
Since the RTS/CTS function is only initiated on the client side, these settings can  
be ignored while the Corinex Wireless G USB Mini Adapter is set to Access Point  
mode.  
By default, the RTS/CTS function is disabled– the threshold is set to 2347 bytes.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
3.2.6 Preamble  
If all wireless clients and access points in your wireless network support Short  
Preamble, then enabling it can enhance the performance. However, if any wireless  
device does not support Short Preamble, then it will not be able to communicate  
with your network. Long Preamble is the default setting and allows connection to  
all wireless devices.  
3.2.7 MAC Address Filter  
In the access point mode, you can either allow or block specific wireless clients from  
connecting to the access point. A typical example application of the MAC Address  
Filter would be to allow only your home wireless devices to connect to your access  
point and share the Internet connection. If you want to set up the MAC Address  
Filter, please click the Options button next to the MAC Address Filter label. The  
following window will appear.  
29  
Click Unlock to enable changes to be made.  
From the Filter Type list, you can select three options which are described in the  
table below.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Configuration  
Mode  
Description  
Disabled The MAC Address filter is disabled - all clients can access your net-  
work.  
Accept  
Only wireless clients at the specified MAC Addresses can access your  
network. No other wireless clients can connect to your access point  
Reject  
Wireless clients at the specified MAC addresses are blocked from ac-  
cessing your network. Any and all other wireless clients can connect.  
If you select the Accept or Reject mode, enter the MAC addresses you wish to  
allow or block. Each MAC address has to be entered as a 12 hexadecimal number  
without any delimiters (no commas, colons, spaces, etc.).  
After setting up the MAC Address Filter, please click on Apply and close the  
window.  
3.2.8 Bridge Adapter  
In access point mode, you may want to provide additional connection possibilities  
for the wireless clients. Because the Corinex Wireless G USB Mini Adapter doesn’t  
have an Ethernet port, and is connected directly to your PC, you may want to set up  
bridging between the wireless connection and some other network card.  
30  
For example, if your computer has an Ethernet connection providing Internet to  
your PC, you can bridge the wireless connection with your Ethernet card, so that  
wireless clients will get access to your Internet connection. In order to do this, se-  
lect your Ethernet card from the list of network adapters, as shown in the example  
below.  
The wireless clients will get full access to your Internet connection, they can use the  
services provided by DHCP servers in the wired network, and will gain access to  
shared resources and devices, such as network printers.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Troubleshooting  
4 Troubleshooting  
Problem  
Solution  
The computer doesn’t recog- Make sure the drivers have been installed from  
nize the Corinex Wireless G USB the CD. Please refer to this user guide in order  
Mini Adapter.  
to successfully install the Corinex Wireless G USB  
Mini Adapter with your system.  
The LED on the Corinex Wire- Make sure the Corinex Wireless G USB Mini  
less G USB Mini Adapter is off. Adapter is inserted properly into the USB port  
of your PC and that the drivers are correctly in-  
stalled.  
The LED is always on, not Make sure the drivers have been installed from  
blinking.  
the CD.  
The LED is blinking but the Make sure the Configuration Utility has been  
Corinex Wireless G USB Mini installed from the CD.  
Adapter icon does not appear  
in the system tray.  
I’m seeing very poor network Try selecting another channel for communica-  
31  
performance.  
tions or moving your device physically closer to  
the Access Point.  
I cannot connect to an access Make sure that you have set the network type  
point.  
to Infrastructure mode, you have the correct  
SSID, exactly the same as the SSID at the access  
point. If encryption is on at the access point, set  
the same password and other options on your  
Corinex Wireless G USB Mini Adapter.  
I can connect to the access Please check to see if encryption is on at the ac-  
point, but not to the Internet. cess point. Set your Corinex Wireless G USB Mini  
Adapter encryption settings exactly the same as  
those at the access point.  
I cannot connect directly to an- Make sure you have set your Corinex Wireless G  
other wireless device.  
USB Mini Adapter to Ad-Hoc mode and that you  
have correct SSID and other settings.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Glossary  
5 Glossary  
IEEE 802.11 Standard  
The IEEE 802.11 Wireless LAN standards subcommittee, which is formulating a  
standard for the industry.  
Access Point  
An internetworking device that seamlessly connects wired and wireless networks  
together.  
Ad Hoc  
An Ad Hoc wireless LAN is a group of computers, each with a WLAN (wireless local  
area network) adapter, connected as an independent wireless LAN. Ad Hoc wire-  
less LAN is applicable at a departmental scale for a branch or SOHO operation.  
BSSID  
A specific Ad Hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must  
be configured with the same BSSID.  
DHCP  
32  
Dynamic Host Configuration Protocol - a method in which IP addresses are assigned  
by the server dynamically to clients on the network. DHCP is used for Dynamic IP  
Addressing and requires a dedicated DHCP server on the network.  
Direct Sequence Spread Spectrum  
This is the method wireless cards use to transmit data over the frequency spectrum.  
The other method is frequency hopping. Direct sequence spreads the data over  
one frequency range (channel), while frequency hopping jumps from one narrow  
frequency band to another many times per second.  
ESSID  
An Infrastructure configuration could also support roaming capability for mobile  
workers. More than one BSS can be configured as an Extended Service Set (ESS).  
Users within an ESS could roam freely between BSSs while served as a continuous  
connection to the network wireless stations and Access Points within an ESS must  
be configured with the same ESSID and the same radio channel.  
Ethernet  
Ethernet is a 10/100Mbps network that runs over dedicated home/office wiring.  
Users must be wired to the network at all times to gain access.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Glossary  
IGateway  
A gateway is a hardware and software device that connects two dissimilar systems,  
such as a LAN and a mainframe. In Internet terminology, a gateway is another name  
for a router. Generally a gateway is used as a funnel for all traffic to the Internet.  
IEEE  
Institute of Electrical and Electronics Engineers  
Infrastructure  
An integrated wireless and wired LAN is called an Infrastructure configuration. Infra-  
structure is applicable to enterprise scale for wireless access to a central database,  
or wireless applications for mobile workers.  
ISM Band  
The FCC and their counterparts outside the U.S. have set aside bandwidth for un-  
licensed use in the so-called ISM (Industrial, Scientific and Medical) band. Spectrum  
in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This  
presents a truly revolutionary opportunity to place convenient high-speed wireless  
capabilities in the hands of users around the globe.  
33  
Local Area Network (LAN)  
A LAN is a group of computers, each equipped with the appropriate network  
adapter card connected by cable/air, that share applications, data, and peripherals.  
All connections are made via cable or wireless media, but a LAN does not use tel-  
ephone services. It typically spans a single building or campus.  
Network  
A network is a system of computers that is connected. Data, files, and messages can  
be transmitted over this network. Networks may be local or wide area networks.  
Protocol  
A protocol is a standardized set of rules that specify how communication is to take  
place, including the format, timing, sequencing and/ or error checking.  
Roaming  
In an infrastructure network, this is when a wireless PC moves out of range of the  
previously connected access point and connects to a newly connected access point.  
Throughout the network environment where access points are deployed, PCs can  
always be connected, regardless of where they are located.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Glossary  
SSID  
A Network ID unique to a network. Only clients and Access Points that share the  
same SSID are able to communicate with each other. This string is case-sensitive.  
Simple Network Management Protocol (SNMP)  
Simple Network Management Protocol is the network management protocol of  
TCP/IP. In SNMP, agents-which can be hardware as well as software-monitor the  
activity in the various devices on the network and report to the network console  
workstation. Control information about each device is maintained in a structure  
known as a management information block.  
Static IP Addressing  
A method of assigning IP addresses to clients on the network. In networks with  
Static IP address, the network administrator manually assigns an IP address to each  
computer. Once a Static IP address is assigned, a computer uses the same IP address  
every time it reboots and logs on to the network, unless it is manually changed.  
Temporal Key Integrity Protocol (TKIP)  
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE  
802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP,  
the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs.  
TKIP provides per-packet key mixing, a message integrity check and a re-keying  
mechanism, thus fixing the flaws of WEP.  
34  
Transmission Control Protocol / Internet Protocol (TCP/IP)  
TCP/IP is the protocol suite developed by the Advanced Research Projects Agency  
(ARPA). It is widely used in corporate Internet works, because of its superior design  
for WANs. TCP governs how packets are sequenced for transmission across the  
network. The term “TCP/IP” is often used generically to refer to the entire suite of  
related protocols.  
Transmit / Receive  
The wireless throughput in Bytes per second averaged over two seconds.  
Wi-Fi Alliance  
The Wi-Fi Alliance is a nonprofit international association formed in 1999 to  
certify interoperability of wireless Local Area Network products based on IEEE  
802.11 specification. The goal of the Wi-Fi Alliance’s members is to enhance the  
user experience through product interoperability. The organization was formerly  
known as WECA.  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  
Glossary  
Wi-Fi Protected Access (WPA)  
The Wi-Fi Alliance put together WPA as a data encryption method for 802.11 wire-  
less LANs. WPA is an industry-supported, pre-standard version of 802.11i, utilizing  
the Temporal Key Integrity Protocol (TKIP), which fixes the problems of WEP, in-  
cluding using dynamic keys.  
Wide Area Network (WAN)  
A WAN consists of multiple LANs that are tied together via telephone services and/  
or fiberoptic cabling. WANs may span a city, a state, a country, or even the world.  
Wired Equivalent Privacy (WEP)  
Now widely recognized as flawed, WEP is a data encryption method used to protect  
the transmission between 802.11 wireless clients and APs. However, it uses the  
same key among all communicating devices. WEP’s problems are well-known, in-  
cluding an insufficient key length and no automated method for distributing the keys.  
WEP can be easily cracked in a couple of hours with off-the-shelf tools.  
Wireless LAN (WLAN)  
A wireless LAN does not use cable to transmit signals, but rather uses radio or  
infrared to transmit packets through the air. Radio Frequency (RF) and infrared are  
commonly used types of wireless transmission. Most wireless LANs use spread  
spectrum technology. It offers limited bandwidth, usually under 11Mbps, and users  
share the bandwidth with other devices in the spectrum; however, users can oper-  
ate a spread spectrum device without licensing from.  
35  
Download from Www.Somanuals.coCm.oArlilnMeaxnuWalsirSeelaercshsAGndUDSoBwnMloaidn.i Adapter  

Creek Audio CD Player CD50 mk2 User Manual
Cub Cadet Lawn Mower 19A40002100 User Manual
EdgeStar Beverage Dispenser TWR481 User Manual
Edimax Technology Computer Drive EU 4230 User Manual
Elation Professional Work Light Opti RGB User Manual
Electro Voice Microphone 366 User Manual
Fisher Price Baby Toy 72334 User Manual
Fisher Price Baby Toy 77824 User Manual
Garland Oven RBA 24 User Manual
Garmin Computer Monitor 906 2000 00 User Manual