An1020-25st Qig
An1020-25st Qig
An1020-25st Qig
Contents
1 Overview..........................................................................................................................................1 1.1 Product Introduction ............................................................................................................1 1.2 Package List .........................................................................................................................1 2 Installation .......................................................................................................................................1 2.1 Installation Guide .................................................................................................................1 2.2 Uninstall Software................................................................................................................5 2.2.1 Uninstall the driver software from your PC............................................................5 2.2.2 Uninstall the utility software from your PC ............................................................7 3 Configuration ..................................................................................................................................7 3.1 Configuration of Utility.........................................................................................................7 3.1.1 Profile ..........................................................................................................................8 3.1.2 Network .....................................................................................................................12 3.1.3 Advanced..................................................................................................................12 3.1.4 Statistics....................................................................................................................13 3.1.5 WPS ..........................................................................................................................14 3.1.6 Radio On/Off ............................................................................................................15 3.1.7 About .........................................................................................................................16
1 Overview
1.1 Product Introduction
Thank you for choosing the PTCL USB Adapter. The adapter is designed to provide a high-speed and unrivaled wireless performance for your computer. With a faster wireless connection, you can get a better Internet experience, such as downloading, gaming, video streaming and so on. The PTCL USB Adapter supporting IEEE 802.11b/g 2.4GHz radio operation. The PTCLs auto-sensing capability allows high packet transfer rate of up to 54Mbps for maximum throughput. Additionally, the PTCL USB Adapter has good capability on anti-jamming and supports WEP,TKIP, AES WPA and WPA2 encryption to prevent outside intrusion and protect your personal information from being exposed. Featuring high performance transmission rates, simple installation and adaptability, as well as strong security, the PTCL USB Adapter is the perfect solution for small office and home needs. System Requirements System configuration recommended is as follows: Windows XP/2000/vista/win7 Standard USB 2.0 port 64MB system memory or larger 300MHz processor or higher
2 Installation
This chapter mainly describes how to install PTCL driver and Utility. The procedure is illustrated by the example of Windows XP.
Step 2: To continue, the following Figure 2-1-2 will appear within seconds. Click Next to continue.
Step 3: Then youll see the screen as follow, you can choose what to be installed
Step 4: As next screen, you can select the configuration tool here.
i. If you want to install the PTCL Utility, please select the PTCL Configuration Tool and click Next. ii. If you only want to use the Microsoft Zero Configuration Tool to configure the wireless
3
connection, please select Microsoft Zero Configuration Tool and click Next. Step 5: After that, you will see the next screen as below. Click Install to continue.
Note: While files are copying, a warning box about Windows Logo testing may pop up, please click Continue Anyway button to continue the installation Step 7: After the files have been successfully copied, the screen in Figure 2-1-7 will appear. Click the Finish button to finish the wizard.
After installing the driver successfully, you should see an icon color) appear in your system tray.
Figure 2-2-1-1
Figure 2-2-1-2
Step 3: Click on the Device Manager button, double-click Network Adapters, and then right-click 802.11 USB Wireless LAN Card USB Adapter. Figure 2-2-1-3 Step 4: Click Uninstall shown in above figure 2-2-1-3, the system will uninstall the driver software of the adapter from your PC.
Figure 2-2-1-3
Figure 2-2-2-1
Step 2: Following the Install Shield Wizard to uninstall the utility software from your PC.
3 Configuration
3.1 Configuration of Utility
PTCL Wireless USB Adapter can be configured by its utility for Windows 2000, Windows XP, Vista, Windows 7.This section will take the configuration in Windows XP for example and guide you to configure your wireless adapter for wireless connectivity with trustable data security encryption features. The configuration steps in Windows 2000 & XP & Vista & Win7 are similar. For the configurations in Windows XP, please refer to the instructions in Windows XP. Note: If your OS is Windows XP, you can use Windows XP to configure the wireless network settings. (To use this function, you must upgrade the OS with sp2).
Is the Utility running? After the Adapter's driver and utility has been installed, the adapters tray icon will
appear in your system tray. It means the utility is running on your system. If the utility does not run, you can run the utility by clicking: Start> All Programs> PTCL Wireless> PTCL Wireless Utility. If the icon still does not appear, the driver or utility may be installed incorrectly or the adapter is unplugged, please try again. Meaning of icon in different color: : Indicates the connected and signal strength is good. : Indicates the connected and signal strength is normal. : Indicates that it is not yet connected. : Indicates that a wireless NIC can not be detected. : Indicates the connection and signal strength is weak.
If you want to use Windows XP to configure wireless network settings, just right-click the icon at the bottom of the screen, and click Use Zero Configuration as Configuration utility to switch the utility.
3.1.1 Profile
Click the Profile tab of the utility and the Profile screen will appear as Figure 3-1-1-1. The Profile screen provides tools to: Add a Profile Edit a profile Delete a profile Import a profile Export a profile Activate a profile
Figure 3-1-1-1
1. To Add a new profile: Click the Add button on the Profile tab, the Profile configuration screen will appear as shown in Figure 3-1-1-2. Enter the Profile Name and choose the SSID from the pull-down list, then click OK to add it.
Figure 3-1-1-2
Profile Name - Identifies the configuration profile. This name must be unique. Profile names are not case-sensitive. SSID - The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. RTS Threshold - Here you can specify the RTS (Request to Send) Threshold. The default value is 2347. Fragmentation Threshold - This value is the maximum size determining whether packets will be fragmented. Setting the Fragmentation Threshold too low may result in poor network performance since excessive packages. 2346 is the default setting and is recommended. 2. To edit a profile: Highlight the desired profile name on Profile List, and click the Edit button, the Profile configuration screen will appear shown in Figure 3-1-1-3.
Figure 3-1-1-3
System Config: Here you can change the Profile Name and SSID. Auth.\Encry.: Click the Auth.\Encry., you can skip to the following screen.
10
Figure 3-1-1-4
Authentication You can choose the Authentication. 802.1x It enables when Authentication Type is setting to WPA. Encryption Displays which encryption type that the driver is using. When you select Open System, Shared-Key System as Network Authentication, there are two options: WEP and None. If you select WPA-PSK as Network Authentication, there are TKIP and AES options instead of WEP and Disabled. Wep Key Key #1, Key #2, Key #3, Key #4, the Key groups. You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F) or 5 ASCII characters for 64-bit (also called 40bits) encryption. You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-F) or 13 ASCII characters for 128-bit (also called 104bits) encryption. 3. To delete a profile: Highlight the desired profile name on Profile List, and click the Delete button. 4. To Import a profile: click the Import button and select the profile you want to import 5. To Export a profile: click the Export button and select a location you want to Export 6. To switch to another profile: Highlight the desired profile name on Profile List, and click the Activate button.
11
3.1.2 Network
Click the Network tab of the Utility and the Network screen with many available wireless network choices will appear as Figure 3-1-2-1.
Figure 3-1-2-1
Rescan: Click the Rescan button to refresh the list at any time. Add to Profile: Highlight an SSID and click the Add to Profile button to add the network to the profile. The continued steps are similar to add a new profile, please refer to the 3.1.1 Profile: To Add a new profile. Connect: Highlight an SSID and click the Connect button to connect to an available network without adding it to the profile.. 300MHz processor or higher
3.1.3 Advanced
Click the Advanced tab of the Utility and then you can choose the wireless mode on the following screen.
Figure 3-1-3-1
12
Wireless mode: Select wireless mode. Wireless Protection: Users can choose from Auto, On, and Off. (This is not supported by 802.11n adapters.) a. Auto: STA will dynamically change as AP announcement b. On: The frames are always sent with protection. c. Off: The frames are always sent without protection. TX Rate: Manually select the transfer rate. The default setting is auto. (802.11n wireless cards do not allow the user to select the TX Rate.) Enable TX Burst: PTCL 's proprietary frame burst mode. Enable TCP Window Size: Optimise the TCP window size to allow for greater throughput. Fast Roaming at-: enables fast roaming, which is set by the transmit power. Select Your Country Region Code: There are eight countries to choose from in the country channel list. (11A ListBox only shows for 5G adapter.) Show Authentication Status Dialog: When you connect to an AP with authentication, choose whether show the "Authentication Status Dialog" or not. The Authentication Status Dialog displays the processes during 802.1x authentication. Enable CCX (Cisco Compatible Extensions): Choose whether Cisco Compatible Extensions are supported or not. a. LEAP turn on CCKM. b. Enable Radio Measurement: can measure the channel every 0~2000 milliseconds
3.1.4 Statistics
Click the Statistics tab of the Utility and you will see the following screen displaying the receiving and transmitting statistical information. Click the Reset Counter button to reset the count of the statistics information.
Figure 3-1-4-1
13
Figure 3-1-4-2
3.1.5 WPS
Click the WPS tab of the Utility and you can configure the WPS function to joint an existing network quickly in the following screen.
Figure 3-1-5-1
If the wireless Access Point supports Wi-Fi Protected Setup (WPS), you can establish a wireless connection between this card and the Access Point device using either Push Button Configuration (PBC) method or PIN method. It is recommended that you choose the simplest method that your AP device supports. Note: To build a successful connection by WPS, you should also do the corresponding configuration of the Access Point for WPS function meanwhile.
14
I. PBC Method If your Access Point is equipped with a push-button for Wi-Fi Protected Setup, you can connect the adapter to the Access Point by PBC method. Please click the PBC button on the screen as Figure 3-1-5-1 and press the push button on your Access Point device to build the connection. II. PIN Method If your Access Point supports Wi-Fi Protected Setup (WPS) and the PIN method, you can add the adapter to the network by the following two ways: 1) Enter a PIN from my Access Point Choose the Config Mode as Registrar and enter the PIN of AP into the field under the Pin Code as Figure 3-1-5-1 shown. And then click PIN button to start the wireless connection without doing any configuration for AP. Note: The default PIN code of the AP always can be found in its label or User Guide. 2) Enter the PIN into my Access Point Choose the Config Mode as Enrollee and click the PIN button on the screen as Figure 3-1-5-2. Meanwhile, enter the PIN code of the adapter into the configuration utility of the AP. For the detailed instructions of the AP configuration, please refer to the User Guide of the AP.
Figure 3-1-5-2
Note: The PIN code of the adapter is displayed on the WPS configuration screen as Figure 3-1-5-2 (the default PIN code for this adapter is 47246119 as Figure 3-1-5-2 shown)
15
turn to red
3.1.7 About
Click the About tab of the Utility and you will see the following screen with some information about this adapter.
Figure 3-1-7-1
16