Edimax Technology Network Card EW 7126 User Manual

Wireless LAN PCI Card  
EW-7126  
User Manual  
Version: 2.0  
(June, 2003)  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Federal Communication Commission  
Interference Statement  
This equipment has been tested and found to comply with the limits for a  
Class B digital device, pursuant to Part 15 of FCC Rules. These limits are  
designed to provide reasonable protection against harmful interference in a  
residential installation. This equipment generates, uses, and can radiate radio  
frequency energy and, if not installed and used in accordance with the  
instructions, may cause harmful interference to radio communications.  
However, there is no guarantee that interference will not occur in a particular  
installation. If this equipment does cause harmful interference to radio or  
television reception, which can be determined by turning the equipment off  
and on, the user is encouraged to try to correct the interference by one or  
more of the following measures:  
1. Reorient or relocate the receiving antenna.  
2. Increase the separation between the equipment and receiver.  
3. Connect the equipment into an outlet on a circuit different from that to which the  
receiver is connected.  
4. Consult the dealer or an experienced radio technician for help.  
FCC Caution  
This equipment must be installed and operated in accordance with provided  
instructions and a minimum 20 cm spacing must be provided between  
computer mounted antenna and person’s body (excluding extremities of  
hands, wrist and feet) during wireless modes of operation.  
This device complies with Part 15 of the FCC Rules. Operation is subject to  
the following two conditions: (1) this device may not cause harmful  
interference, and (2) this device must accept any interference received,  
including interference that may cause undesired operation.  
Any changes or modifications not expressly approved by the party responsible  
for compliance could void the authority to operate equipment.  
Federal Communication Commission (FCC) Radiation Exposure Statement  
This equipment complies with FCC radiation exposure set forth for an  
uncontrolled environment. In order to avoid the possibility of exceeding the  
FCC radio frequency exposure limits, human proximity to the antenna shall  
not be less than 20cm (8 inches) during normal operation.  
The antenna(s) used for this transmitter must not be co-located or operating  
in conjunction with any other antenna or transmitter.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
R&TTE Compliance Statement  
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC  
OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on  
radio equipment and telecommunication terminal Equipment and the mutual  
recognition of their conformity (R&TTE)  
The R&TTE Directive repeals and replaces in the directive 98/13/EEC  
(Telecommunications Terminal Equipment and Satellite Earth Station  
Equipment) As of April 8, 2000.  
Safety  
This equipment is designed with the utmost care for the safety of those who  
install and use it. However, special attention must be paid to the dangers of  
electric shock and static electricity when working with electrical equipment. All  
guidelines of this and of the computer manufacture must therefore be allowed  
at all times to ensure the safe use of the equipment.  
EU Countries Intended for Use  
The ETSI version of this device is intended for home and office use in Austria,  
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy,  
Luxembourg, the Netherlands, Portugal, Spain, Sweden, and the United  
Kingdom.  
The ETSI version of this device is also authorized for use in EFTA member  
states: Iceland, Liechtenstein, Norway, and Switzerland.  
EU Countries Not intended for use  
None.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONTENTS  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1 Introduction  
Thank you for purchasing the Wireless LAN PCI Card. This card features the latest  
innovation wireless technology. IEEE 802.1x which request wireless stations to pass the  
authorization by entering a unique user name and password designated by the authorization  
server before connecting to the wireless devices such as Access Point or Router. TKIP  
(Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard) which are  
advanced WLAN security technology included in the IEEE 802.11i standard, and supports  
32-bit PCI interface which enables higher transmission performance. Furthermore, this card  
provides several kinds of power saving modes allowing user customizes the way of saving  
the power from his/her portable or handheld devices. This card is cost-effective, together  
with the versatile features, it is the best solution for you to build your wireless network.  
1.1 Features  
O
O
O
O
O
Complies with the IEEE 802.11b 2.4GHz (DSSS) standard.  
High data transfer rate - up to 11Mbps.  
Support 64/128-bit AES/TKIP/WEP Data Encryption function for high level of security.  
Supports IEEE 802.1x advanced WLAN Security.  
Supports peer-to-peer communication among any wireless users, no Access Point is  
required.  
O
O
O
Detachable antenna with long length cable provides convenience to locate the antenna.  
Automatic fallback increases data security and reliability.  
Supports the most popular operating system: Windows 98SE/Me/NT/2000/XP and Linux.  
1.2 Specifications  
O
O
O
O
O
O
O
O
Standards: IEEE 802.11b  
Bus Type: PCI V2.2/2.1  
Frequency Band: 2.4000~2.4835GHz (Industrial Scientific Medical Band)  
Modulation: CCK@11/5.5Mbps, DQPSK@2Mbps, DBPSK@1Mbps  
Radio Technology: Direct Sequence Spread Spectrum (DSSS)  
Data Rate: 11/5.5/2/1Mbps auto fallback  
Security: 64/128-bit AES/TKIP/WEP Data Encryption, IEEE 802.1x  
Antenna: External detachable dipole antenna (Cable Length: 94cm, Connector: RP-SMA  
connector. Please refer to Appendix A for detailed antenna specification.)  
O
O
O
O
O
O
O
Drivers: Windows 98SE/Me/NT/2000/XP and Linux  
LEDs: TX/RX, Link  
Transmit Power: 16dBm~18dBm  
Dimension: 19(H) x 135(W) x 121(D) mm  
Temperature: 32~131°F (0 ~55°C)  
Humidity: 5-95% (NonCondensing)  
Certification: FCC, CE, WHQL  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
1.3 Package Contents  
Before you begin the installation, please check the items of your package. The package  
should include the following items:  
O
O
O
O
One PCI Card  
One Antenna  
One Quick Guide  
One CD (Driver/Utility/Manual)  
If any of the above items is missing, contact your supplier as soon as possible.  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
2 Installation Procedure  
2.1 Windows 98SE/Me/2000  
Before you proceed with the installation, please notice following descriptions.  
Note1: The following installation was operated under Windows 2000. (Procedures will be the  
same for Windows 98SE/Me.)  
Note2: If you have installed the Wireless LAN PCI Card driver & utility before, please uninstall  
the old version first.  
2.1.1 Install the Driver  
1. Turn off your PC.  
2. Insert the card into the PCI slot of your PC, the system will automatically find the device  
and search for its driver.  
3. Please select the “Driver\Win2000” folder (select the folder based on your computer’s  
OS system) and the system will complete the driver installation automatically.  
2.1.2 Install the Utility  
1. Insert the CD into the CD-ROM device and execute the "Utility\setup.exe" program. The  
InstallShield Wizard box will appear, click "Next" to continue.  
2. Follow the instruction of the installation program. The program will install the software  
for this device directly.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3. Click "Finish" to complete the installation.  
4. When you complete the Utility installation, a shortcut named “Rtl8180“ will appear in the  
computer’s desktop and a new icon will display in the system tray at the bottom of the  
screen. Double click the shortcut or the icon and start using the WLAN PCI Card.  
In the Desktop  
In the system tray  
2.2 Windows XP  
The installation process in Windows XP is similar with the process in windows  
98SE/Me/2000. Please refer to the instructions described in section 2.1.  
Due to the Windows XP has built-in wireless network utility you may decide to use the  
system’s utility or the one provided by this card. It is strongly recommended to using the  
utility of this card.  
A. Using the Windows XP’s Utility  
Click the icon marked in red in the system tray and you may start using the Windows XP’s  
wireless utility.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
B. Using the Utility of this card  
1. Get into Windows XP’s Utility, click “Advanced“ button.  
2. On the “Wireless Networks“ tab in the “Wireless Network Connection Properties“ screen,  
clear the “Use Windows to configure my wireless network settings“ check box. If you  
want to enable the Windows XP built-in utility, select the check box again.  
3. Double click the shortcut or the icon in the system tray and start using the WLAN PCI Card.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Note: If you don’t disable the XP’s Utility, you can still see the link status and statistics during  
communication process from the card’s utility.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
3 Configuration Utility  
The Configuration Utility is a powerful application that helps you configure the Wireless LAN  
PCI Card and monitor the link status and the statistics during the communication process.  
This utility can be used to change the following configuration parameters when the device is  
active.  
3.1 Connect to the Wireless Network  
From the “Connect to Wireless Network” screen you are able to view available wireless  
networks within range of your computer and access to the network you intend to.  
Parameter  
Description  
Available Wireless Netowrks  
This list shows all available wireless network within range of your  
computer. If you want to connect to any network on the list, select  
the network and click “Connect” button.  
Network Key  
If the network is required for Wired Equivalent Privacy (WEP) key,  
type the key in the text box. The key should be 10 or 26  
hexadecimal characters according to the WEP mode setting (64-  
bit or 128-bit) of the network.  
Confirm Network Key  
Advanced Button  
Enter the same network key again to cofirm the key.  
To configure additional wireless network setting, review the link  
status and statistics or if you have difficulty connecting to a  
network, click “Advanced“ button.  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Parameter  
Description  
Connect Button  
Click the button to connect to the selected network.  
Cancel Button  
Click the button to cancel the wireless network connection.  
3.2 Configuration  
This screen is for you to make advanced setting in order to connect to an available network  
or create a new wireless network connection. You could also define the connection order  
here.  
Parameter  
Profile  
Description  
Display the profiles the card is connecting to. It also stores the  
profiles that the card ever connected to. If you want to change the  
connection to another profile, pull down the list and select the  
profile you intend to connect.  
Available Wireless Network(s) This list shows all available wireless network within range of your  
computer. You can double click the network listed in the table to  
do more configuration.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Parameter  
Description  
Available Wireless Network(s)  
Configure Button  
If you are unable to conect to an existing wireless network, click  
the network name and then click this button. The “Wireless  
Netowrk Properties“ will show up for you to configure the card and  
ensure the settings are correct.  
Refresh Button  
To update the list of available networks, click the  
“Refresh“ button.  
Available Profile(s)  
This list shows the preferred networks for the wireless connection.  
You can add, remove, edit the preferred networks or set one of  
the networks as the default connection.  
Add Button  
To configurate a new profile, click “Add“ button.  
Remove Button  
To remove a wireless network from the available profiles list, click  
the button.  
Set Default Button  
Signal Strength  
To designate a wireless network as the default network for the  
connection from the available profiles list, click the button.  
This bar shows the signal strength level. The higher percentage  
shown in the bar, the more radio signal been received by the  
card. This indicator helps to find the proper position of the  
wireless device for quality network operation.  
Signal Quality  
This bar indicates the quality of the link. The higher the  
percentage, the better the quality.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Parameter  
Description  
Network Name(SSID)  
The SSID (up to 32 printable ASCII characters) is the unique  
name identified in a WLAN. The ID prevents the unintentional  
merging of two co-located WLANs.  
Only the wireless devices with the same SSID can interconnect.  
Wireless Network Key(WEP)  
WEP is an authentication algorithm, which protects authorized  
Wireless LAN users against eavesdropping. The security setting  
must be the the same on the wireless stations within the network.  
Data Encryption(WEP  
Enabled)  
To enable the WEP function, select the check box.  
Network Authenticaton The wireless network supports two subtypes of network  
(Shared Mode)  
authentication services: Open System and Shared Key. Under  
Open System authentication, any wireless stations can request  
authentication. Under Shared Key authentication, only wirelss  
stations using a shared key (WEP Key) are allowed to  
authenticate mutually. This network authentication mode setting  
has to be consistent with the wireless network which the card  
intends to connect.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Parameter  
Description  
Wireless Network Key(WEP)  
Network Key  
If the network is required for Wired Equivalent Privacy (WEP) key,  
type the key in the text box. The key should be 10 or 26  
hexadecimal characters according to the WEP mode designated  
by the network.  
Note: The hexadecimal characters include the range of “A-F”, “a-  
f” and “0-9”, for example: “0123456aef“ or  
“01234567890123456789abcdef“.  
Confirmed Network Key  
Key Index(Advanced)  
Enter the same network key again to cofirm the key.  
Select one of the four keys to encrypt your data.  
Enable IEEE 802.1x  
IEEE 802.1x authentication provides enhanced security for  
authentication for this network wireless network. If the wireless network requries IEEE 802.1x  
authentication for accessing to the network, please select the  
check box.  
The “EAP-MD5 Authentication“ screen (see the screen above) will  
appear when you attempt to conenct the wireless network which  
requires for IEEE 802.1x authentication. Please enter the user  
name and password which your network administrator assigns to  
you.  
Note: This card only supports EAP-MD5 algorithm of the IEEE  
802.1x authentication method when running in Windows  
98SE/Me/2000/XP operating systems. Windows XP supports more  
algorithm of IEEE 802.1x such as EAP-TLS, please uses the  
Windows XP built-in Utility if you need to use the authentication  
method other than EAP-MD5.  
This is a comupter-to-  
In Computer-to-Comupter mode (Ad Hoc), wireless stations  
connect to each other directly, no Access Point is required. If the  
computer(ad hoc) network;  
wireless access points are not wireless network you selected is in Ad Hoc mode, select this  
used check box.  
3.3 Advanced Configuration  
This screen allows you to do some advanced configuration including Power Save Mode,  
Encryption Algorithm and some specific settings for the card.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Parameter  
Description  
Ad Hoc Default Channel  
Select the number of the radio channel used for the Ad Hoc  
networking. The channel of all the wireless stations in the Ad Hoc  
network should be the same. The parameter is not active in the  
infrastructure operation mode.  
Note: The Infrastructure operation mode requires the presence of  
an 802.11 Access Point. All communication is done via the  
Access Point.  
Encryption Algorithm  
The parameter is only active in the Ad Hoc operation mode. There  
are three kinds of encrypion algorithm supported by the card  
including WEP, TKIP and AES.  
WEP is an authentication algorithm, which protects authorized  
Wireless LAN users against eavesdropping. WEP has been found  
that it has some security problems. TKIP is a temporary quick-fix  
method defined in IEEE 802.11i standard to quickly overcome the  
inherent weaknesses in WEP security. AES has been developed  
to ensure the highest degree of security and authenticity for  
digital information and it is the most advanced solution defined by  
IEEE 802.11i for the security in the wireless network.  
The security setting must be the the same on the wireless stations  
within the network.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Parameter  
Description  
Preamble Mode  
The preamble defines the length of the CRC block for  
communication among the wireless stations. There are three  
mode including Long, Short and Auto. High network traffic areas  
should use the shorter preamble type. If “Auto“ mode is selected,  
the card will auto switch the preamble mode depending on the  
wireless stations which the card is connecting to.  
Note that the parameter is only active in the Ad Hoc operation  
mode.  
Show Icon in System Tray  
Radio Off  
Enable or disable the icon shown in the system tray.  
When the setting is checked, the wireless connection of the card  
will be disabled.  
Power Save  
CAM(Continuous Access Mode) – This card will always set  
in active mode.  
Max – Enable the card in the power saving mode when it is  
idle.  
Fast – Enable the card in the power saving mode when it is  
idle, but some compoents of the card is still alive. In this  
mode, the power consumption is larger than “Max“ mode.  
Rescan Button  
Click this button to scan the wireless network which the card is  
connecting to.  
3.4 Status  
This screen shows the information of manufacturer, driver version, settings of the wireless  
network the card is connecting to, linking time and link status. If you don’t ensure the status  
of the card and the network you are connecting, please go to the screen for more details.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.5 Statistics  
You can get the real time information about the packet transmission and receiving status  
during wireless communication from the screen. If you want to recount the statistics value,  
please click “Reset“ button.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3.6 About  
This screen displays the version and the designer of the Utility.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
4 Troubleshooting  
This chapter provides solutions to problems usually encountered during the installation and  
operation of the card.  
1. What is the IEEE 802.11b standard  
The IEEE 802.11b Wireless LAN standard subcommittee which formulates the  
standard for the industry. The objective is to enable wireless LAN hardware from  
different manufactures to communicate.  
2. What does IEEE 802.11 feature support?  
The product supports the following IEEE 802.11 functions:  
O
O
O
O
O
O
CSMA/CA plus Acknowledge Protocol  
Multi-Channel Roaming  
Automatic Rate Selection  
RTS/CTS Feature  
Fragmentation  
Power Management  
3. What is Ad-hoc?  
An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN  
adapter, Connected as an independent wireless LAN. Ad hoc wireless LAN is  
applicable at a departmental scale for a branch or SOHO operation.  
4. What is Infrastructure?  
An integrated wireless and wireless and wired LAN is called an Infrastructure  
configuration. Infrastructure is applicable to enterprise scale for wireless access to  
central database, or wireless application for mobile workers.  
5. What is BSS ID?  
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must  
be configured with the same BSS ID.  
6. What is WEP?  
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared  
key algorithm, as described in the IEEE 802 .11 standard.  
7. What is TKIP?  
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP  
security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i  
WLAN security standard, and the specification might be officially released by early  
2003.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
8. What is AES?  
AES (Advanced Encryption Standard), a chip-based security, has been developed to  
ensure the highest degree of security and authenticity for digital information, wherever  
and however communicated or stored, while making more efficient use of hardware  
and/or software than previous encryption standards. It is also included in IEEE 802.11i  
standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security  
until manufacturers implement AES at the hardware level.  
9. What is IEEE 802.1x?  
802.1x, an IEEE standard that provides an authentication framework for 802-based  
LANs. 802.1x will let wireless LANs scale by allowing centralized authentication of  
wireless users or stations. Based on the 802.1x framework, any wireless stations try to  
connect to the Access Point or Router should be authenticated by an Authentication  
Server.  
The Authentication Server identifies the wireless station by a set of user name and  
password, only wireless stations provide correct user name and password can connect  
to the Access Point or Router and access to the network.  
IEEE 802.1x  
Access Client  
RADIUS  
Client  
RADIUS  
Server  
3
1
Access Point  
2
4
Windows 2000 IAS  
(Internet Authentication  
Service)  
(1) Client requests to login the  
network.  
(3) Send username, password to  
RADIUS server.  
(4) Approve or deny user  
login to the LAN.  
(2) Login with username,  
password.  
10. Can Wireless products support printer sharing?  
Wireless products perform the same function as LAN products. Therefore, Wireless  
products can work with Netware, Windows 2000, or other LAN operating systems to  
support printer or file sharing.  
11. Would the information be intercepted while transmitting on air?  
WLAN features two-fold protection in security. On the hardware side, as with Direct  
Sequence Spread Spectrum technology, it has the inherent security feature of  
scrambling. On the software side, WLAN series offer the encryption function (WEP) to  
enhance security and Access Control. Users can set it up depending upon their needs.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
12. What is DSSSWhat is FHSSAnd what are their differences?  
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes  
frequency in a pattern that is known to both transmitter and receiver. Properly  
synchronized, the net effect is to maintain a single logical channel. To an unintended  
receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spread-  
spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This  
bit pattern is called a chip (or chipping code). The longer the chip is, the greater the  
probability that the original data can be recovered. Even if one or more bits in the chip  
are damaged during transmission, statistical techniques embedded in the radio can  
recover the original data without-the need for retransmission. To an unintended  
receiver, DSSS appears as low power wideband noise and is rejected (ignored) by  
most narrowband receivers.  
13. What is Spread Spectrum?  
Spread Spectrum technology is a wideband radio frequency technique developed by  
the military for use in reliable, secure, mission-critical communication systems. It is  
designed to trade off bandwidth efficiency for reliability, integrity, and security. In other  
words, more bandwidth is consumed than in the case of narrowband transmission, but  
the trade off produces a signal that is, in effect, louder and thus easier to detect,  
provided that the receiver knows the parameters of the spread-spectrum signal being  
broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal  
looks like background noise. There are two main alternatives, Direct Sequence Spread  
Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A Antenna Specification  
Part Number  
W111-094-D200  
Electrical Properties  
Frequency Range  
Impedance  
2.4~2.5GHz  
50 Ohms nominal  
2.0 (Max.)  
-10.0dB(Min.)  
0.5dBi  
V.S.W.R.  
Return Loss  
Max. Gain  
Polarization  
Admitted Power  
Electrical Wave  
Vertical  
1W  
1/4λ Dipole  
Mechanical Properties  
Connector  
Reverse SMA Plug Straight  
RG178 (94cm)  
T.P.R.  
Cable  
Antenna Body  
Operating Temperature  
-20~50°C  
-20~50°C  
Storage Temperature  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 

Edelbrock Automobile Parts 16211 MBN 640 User Manual
EdgeStar Air Conditioner AP410HS User Manual
Eiki CRT Television LC X71L User Manual
Elation Professional Work Light 700 CMY II User Manual
Electro Voice Speaker MB500 User Manual
Extron electronic Network Card 70 110 04 User Manual
Ferris Industries Automobile Accessories 5049751 User Manual
Fisher Price Doll H8273 User Manual
GBC Binding Machine COMBPRO1000 User Manual
GE Microwave Oven PVM2070SMSS User Manual