Résumé du contenu de la page N° 1
Skyr@cer USB 4001g
Skyr@cer USB 4001g
Full User Guide
Résumé du contenu de la page N° 2
Résumé du contenu de la page N° 3
CONTENTS 1.1 Features......................................................................................................................... 2 1.2 Specifications................................................................................................................ 2 1.3 Package Contents.......................................................................................................... 3 3.1 Site Survey........................................................................
Résumé du contenu de la page N° 4
1 Introduction Thank you for purchasing the 802.11g Wireless LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). It supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the
Résumé du contenu de la page N° 5
1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security. • Supports the most popular operating system: Windows 98SE/Me/2000/XP/2003 Server. • Supports USB 2.0/1.1/1.0 interface. • Portable and mini-s
Résumé du contenu de la page N° 6
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One CD (Driver/Utility/User’s Manual) 3
Résumé du contenu de la page N° 7
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/2003 Server.) Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver & utility before, please uninstall the old version first. A. Insert the Instal
Résumé du contenu de la page N° 8
C. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode. Or you can choose “Optimize for Wi-Fi mode” to let the adaptor run in standard wireless network. 5
Résumé du contenu de la page N° 9
D. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor E. Please click “Finish” to complete the installation. 6
Résumé du contenu de la page N° 10
3 Configuration Utility The Topcom Configuration Utility is a powerful application that helps you configure the USB adaptor and monitor the link status and the statistics during the communication process. When the adaptor is installed, the configuration utility will be displayed automatically. This adaptor will auto connect to wireless device which has better signal strength and no wireless security setting. The Topcom Configuration Utility appears as an icon on the system tray o
Résumé du contenu de la page N° 11
3.1 Site Survey When you open the Topcom Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list. Parameter Description Available Networks This
Résumé du contenu de la page N° 12
3.2 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting. Add/Delete/Edit Button Click the
Résumé du contenu de la page N° 13
3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adaptor and then only the device with the same SSID can interconnect to the adaptor. If you want to add the network n
Résumé du contenu de la page N° 14
Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode i
Résumé du contenu de la page N° 15
Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended. Fragment Threshold The value defines the maximum size of packets; any packet size larger than the value will be fragmented. If you have decreased this value and experience high packet erro
Résumé du contenu de la page N° 16
Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer. WPA – WPA provides a scheme of mutual auth
Résumé du contenu de la page N° 17
Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security. AES – AES has been developed to ensure the highest degree of security a
Résumé du contenu de la page N° 18
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do. When an AP acting as an authenticator detects a wireless stat
Résumé du contenu de la page N° 19
3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, including CHAP, MS-
Résumé du contenu de la page N° 20
Parameter Description Tunneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of @. The user’s home realm is optional and indicates the rout