Sie sind auf Seite 1von 35

150M Wireless-N Mini USB Adapter

Model No. iB-WUA150NM

User Manual
Ver.: 1.0.0

FCC STATEMENT

This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to pro-vide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not in-stalled and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.

Consult the dealer or an experienced radio/ TV technician for help.

This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:

This device may not cause harmful interference.

This device must accept any interference received, including interference that may
cause undesired operation.

Any changes or modifications not expressly approved by the party responsible for compliance
could void the users authority to operate the equipment.

CE Mark Warning

This is a class B product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.

CONTENTS
Package Contents ................................................................................................... 1
Overview of the Product .............................................................................................................. 2
Product Features ......................................................................................................................... 2
Hardware Installation

............................................................................................................. 2

Software Installation .................................................................................................................... 3


Software Installation for Windows XP .......................................................................................... 3
Software Installation for Windows 7/8 .......................................................................................... 6
Wireless Network Connection under Windows 7 and 8 ................................................................ 9

iBall Baton Wireless Utility................................................................................... 11


WPS

........................................................................................................... 22

Configuration ........................................................................................................ 27
General Status ............................................................................................................. 28
Profile Management ..................................................................................................... 29

Appendix A: Specifications .................................................................................. 30


Appendix B: Glossary .......................................................................................... 31
Appendix C: Contact Information....26

Package Contents
The following items should be found in your package:

iB-WUA150NM 150M Wireless-N Mini USB Adapter

Quick Installation Guide

One Resource CD for iB-WUA150NM , including:

Wireless Utility and Drivers


User Guide

Conventions:
The Adapter mentioned in this User Guide stands for iBall Baton iB-WUA150NM
150M Wireless-N Mini USB Adapter Adapter without any explanations.

Note:
Make sure that the package contains the above items. If any of the listed items are damaged or
missing, please contact with your distributor.

Introduction
Thank you for choosing the iB-WUA150NM 150M Wireless-N Mini USB Adapter

Overview of the Product


iBall Baton 150M Wireless-N Mini USB Adapter

Adapter complies with IEEE 802.11n wireless

standards.

Product Features

Nano Wireless-N USB Adapter

Enhanced 150Mbps Wireless data transmission rate

With 64 / 128-bit WEP, WPA & WPA2-PSK Wireless Security

Infrastructure & Ad-Hoc Operation mode

USB 2.0 High speed interface

Bundled utility helps simple configuration & easy monitoring

Hardware Installation
Please insert the USB Adapter into the USB port of your computer / Laptop

There are two ways to install the Adapter:


Plug the Adapter directly to the USB port on your computer.
Connect the Adapter and your computer through the USB cable attached in package.
The LED will light up when the Adapter is installed successfully and the PC is on.

Software Installation
Overview
The Adapters Setup Wizard will guide you through the Installation process. The Setup Wizard will
install the Wireless Utility and drivers.
When you install the hardware before installing the software, the system will prompt Found New
Hardware Wizard. Click Cancel, and run the Setup Wizard program on the CD-ROM.
The Setup steps for Windows operation Systems are very similar. The User Guide takes the
Windows XP for example to explain the installation.

Software Installation for Windows XP


Insert the Resource CD into your CD-ROM drive, and open the folder with the same name as your
product. Then double-click Setup.exe in the proper folder to start the installation, and Figure 0-1
will appear. You can click Cancel to end the installation in the screen. Otherwise, the installation
will continue.

Figure 0-1

Click Next in the screen below (shown in Figure 0-2) to continue, you can click Cancel to
end the installation.

Figure 0-2

After that, the next screen will appear Select which option you want to Install to
continue.

Figure 0-3

Click Install in the screen below to continue.

Figure 2-4

In the next screen, the files will be copied as the next screen shows (shown in Figure
0-5). To end the Installation, click Cancel.

Figure 0-5

Click the Finish button to complete the installation.

Figure 0-7

Software Installation for Windows 7/8


The Setup steps for Windows 7 and Windows 8 are very similar. The User Guide takes Windows
Vista for example to explain the installation.

Click I accept and click Next in the screen below to continue, you can click Cancel to end the

Figure 0-7

After that, the next screen will appear. Select which option you want to install to continue.

Figure 0-8

After that, the files will be copied as the next screen shown (shown in Figure 0-). To end the
Installation, click Cancel.

Figure 0-9

Figure 0-10

Note:
During the installation, the system will warn about Windows Security testing, please click Install
this driver software anyway to continue the installation

Figure 0-11

Click the Finish button to complete the installation

Figure 0-12

Wireless Network Connection under Windows 7 and 8

Click the wireless connection in the lower right corner of the computers desktop to view the
available wireless networks. Select the wireless network you wish to connect and click
Connect or double click the wireless network to connect. If you dont find the specified one,
please click the refresh icon in the upper right corner to update the list.

If the wireless network you are connecting is encrypted, youll be prompted to enter the key.

Click Ok after you enter the correct key.

3. It shows Connected after successfully connected. You can disconnect it, view its
status or modify the wireless network properties by right click the wireless network

iBall Baton Wireless Utility


When you are installing the driver, select Install driver and IBall Baton WLAN Config Tool and the
adapter driver and client utility will be installed. All functions of this adapter can be configured via
IBall Batons utility interface (in the following text it is abbreviated as UI).
Select Start-All Programs -IBall Baton Wireless- IBall Baton Wireless Utility, or click the
IBall Baton Wireless Utility shortcut on your PCs desktop to start the UI.

Station mode (Client Mode)


Station mode (Client Mode) Overview

It is a common solution to use the wireless network adapter as a client to receive signals.
Main interface for station mode

The function buttons on the top (From L to R) are respectively Site Survey, Link
Information, Profile, Advanced, About, Help, and MiniSize. While the left column
displays Turn On/Off RF, Security /No security, and Signal status.

3.1.1 Available Networks


The Available Networks screen displays currently scanned wireless signals and you can click
one to connect the signal. Select one and you may view the APs MAC address, wireless mode
(B/G/N), authentication type, and encryption type, or WPS authentication and signal strength.
Before you connect to a wireless network, please click the Rescan button to update the
wireless network list and select the one you wish to connect, then click the Connect icon.

For the networks that are not encrypted, you can directly click Connect. However, for
the encrypted wireless networks,a Profile dialog will pop up and you must select the
corresponding authentication type and encryption type,and then click the Next button to
input the correct key.Please note that this type of connection will not create a profile ,thus
next time connect to this network you still need to select it manually.

The detailed explanations about the authentication and encryption are as follows:
WEPSupports 10/26-bit Hex characters and 5/13-bit ASCII.

WPA-PSKSupports 8-63-bit ASCII and 8-64-bit Hex characters.


WPA2-PSKSupports 8-63-bit ASCII and 8-64-bit Hex characters.
WPA-PSK/WPA2-PSKSupports 8-63-bit ASCII and 8-64 -bit hex characters.
NOTE:
The Hex characters consist of numbers 0~9 and letters a-f.
ASCII characters consist of any letters and characters.
3.1.2 Link Information
After successfully connected to one wireless network, you can view its detailed
information by clicking the Link Information on the main interface.

Link Status screen displays the detailed information of the connected AP including its
SSID,MAC address, authentication type, encryption type, network type and channel.

2. Throughput screen displays the signal strength of each of the wireless adapters
antennas and the link quality.

3.Statistics screen is used to count the total Rx and Tx data packets, including
transmitted,retransmitted and fail to receive ACK after all retries.You can click the Reset
Counter button to clear the count.

3.1.3 Profile Settings


Except the above common connection type, you can also connect to the wireless
network by adding a profile on the Profile Settingsscreen.The Profile Settings screen is
used to save the wireless network parameters. When the adapter is successfully connected
to a network, the profile name of this network will automatically be added here, which helps
the adapter to quickly connect to the wireless network next time. However, theres one
exception that when you have set the hidden SSID,namely the SSID can not be
scanned,then you must manually connect by adding the profile name.The main interface is
as shown below.

Add: create a new profile


Delete: delete the existing profile
Edit: modify the existing profile
Add WPS Profile: WPS setting requires that the connecting wireless device
support WPS function. WPS helps you to fulfill wireless encryption fast as well as secure your
wireless network. For detailed setting steps, refer to appendix2.
There are two network types for your option when clicking the Add button to add wireless
adapter connection: Infrastructure and Ad-Hoc.

Infrastructure is an application mode that integrates the wired and wireless LAN
architectures. It is different from Ad-Hoc in that in this mode the computer installed with the
wireless network adapter has to fulfill the wireless communication via AP or wireless router. It
can be devided into two modes:wireless AP + wireless network adapter and wireless router
+ wireless network adapter.
Ad-Hoc is a special wireless mobile network application mode. All nodes in the network
are equal.Usually it is used to share resources by connecting the opposing computer s
wireless adapter.
1. Infrastructure Profile Management
When you are connecting the wireless adapter to an AP or a wireless router, please
select the Infrastructure mode.
Click the Addbutton and select the network type as
Infrastructure,and enter the profile name and SSID or you can find the SSID you wish
to connect from the drop-down list.

Click the next button to select the authentication type and encryption type such as WPA
PSK and AES, and then input the key and click next.

After a profile is successfully added, the profile name can be seen on the profile list,you
can edit , import or export the profile,click Active to finish the connection,now you can also
view the detailed connection status on the Link Informationscreen.

NOTE:
If the SSID broadcast function of the wireless router or AP you wish to connect is disabled, then
the wireless adapter can not scan the SSID, thus you need to connect by creating the
corresponding profile.
2.Ad-Hoc Profile management
Using the Ad-hoc mode to establish a wireless network requires that each computer
should be equipped with a wireless network adapter. By connecting these wireless adapters,
computers are able to share the resources. The detailed setting steps are as follows:
1Firstly youll have to allocate a static IP to each wireless adapter to be connected in
Ad-hoc mode.
a.Right click My Network Places on your computers desktop and select Properties.

b.Right click Wireless Network Connection, and select Properties

c.Select Internet Protocol(TCP/IP)and click Properties.

d. Please enter the IP address and subnet mask, and make sure this IP address is not
used by other devices in the network.For example: if your wireless adapters IP address is
192.168.0.1then set other wireless adapters IP addresses within the range of 192.168.0.2
-192.168.0.254.Click Ok to save the settings.

2) Create a new Ad-hoc profile


Click the Add button and enter the network name in the SSID field to identify the
wireless network, and select Ad-hoc as the network type and then select the channel.

Click the Next button to select the authentication type and encryption type and then
input the correct key and click Next.

After a profile is successfully added,the profile can be seen on the profile list ,select it
and click the Active icon on the lower right corner.

And then search for the wireless network on other clients. Double click the wireless
network you have configured and youll be prompted for the key .After entering the key, click
Connect.

3.1.4 About
This screen mainly displays the version information of the UIs different programs as
well as Best IT World (India) Private Limited copyright statement.

3.1.5 Help
To know more about kindly refer the User Manual

3.2.1 Config AP
This screen is used to set the APs general parameters including SSID, wireless mode,
channel, authentication type and encryption type, as shown in the picture below.

Here the authentication type is set as Open and the encryption type Not Use.

3.2.2 AP Mode under Windows 7 and 8


1. Under Windows 7, wireless adapters are allowed to work in both Station and AP
modes. Here, the wireless adapter acts not only as a client, but also an AP to send wireless
signal, which equals to an amplifier. Right click the UI icon on the lower right corner of the
computer desktop and select Switch to Station Mode.

You can change the SSID on the Config AP screen and control the number of the connected
clients by modifying the max number of peers. AP mode has only one encryption method
which is WPA2-AES by default and cannot be modified.

Appendix 2: How to Set WPS


WPS setting supports two modes :PBC and PIN. The detailed setting steps are as
follows:
1.Wireless Connection in PBC Mode
1.1 Enable the routers WPS-PBC feature.
If your router provides WPS button, just press and hold it for about 1 second, then the
WPS LED will be flashing for about 2 minutes, which indicates the routers WPS feature has
been enabled. Otherwise, you can also log on to the routers web-based utility to enable the
PBC mode in WPS settings screen(For detailed settings,please refer to your routers user
guide).

1.2 Perform PBC connection on the UI of the wireless adapter


1) On the main interface of iBall Batons UI, click Profile SettingsAdd WPS Profile.

2) On the Profile List screen, select Push-Button Configuration(PBC) and then click
the Next button, select Start PBC two minutes after the router enables the WPS function.
The connection is established when the negotiating process finishes.

Start PBC:

Negotiating process:

A profile forms automatically after the connection is successfully established.

1.3 Using the wireless adapters WPS button to perform PBC connection.
If your wireless adapter provides a WPS button,you may use the button to perform PBC
connection.
a).Run the adapters UI and switch to STATION mode
b).Two minutes after the routers WPS-PBC is enabled,press the adapters WPS button
to connect in PBC mode.
c).You may view the PBC connection process on the UIs PBC screen.
2. Wireless Connections in PIN Mode

On the Add WPS Profile screen, select PIN as the WPS Method. You may select the
wireless AP to be connected in WPS mode on the WPS AP drop-down List,or select Auto
and then click the next button.

4.1 Enrollee Mode


The PIN code field lists the adapters current PIN code, when you select Enrollee as
the Config Mode, you need to copy this PIN code and input it in the PIN code field of the
routers WPS setting screen.

Here we take iBall Baton as an example. First enter its WPS configuration
screen,enable WPS settings and select PIN for WPS mode and then input 18686791 in the
PIN code field,and then click the Save button. When the WPS indicator of the Router
starts flashing,it indicates that WPS feature is enabled.

Click the next button on the Profile List screen and click Start PIN to start the PIN code
negotiation.

4.2 Registrar Mode


On the Add WPS Profile screen, select the SSID of the AP that need to negotiate in
WPS mode instead of selectingAuto.Then selectPIN as the WPS method and click the
next button to display the folowing screen:

Select Registrar as the config mode and enter the routers PIN code,such as
35475088 that displays on the routers WPS screen in section 2.1, in the PIN code field here.

Now you can view the SSID ,authenticaiton type,and encrytion type that need to be
negotiated by the WPS in registrar mode.These values can be modified but we recommend
using the default.Here we use the defaut setting

and then click the next buton.

You can view the negotiation key on the screen below ,but you are not recommended to
modify it,just click the next buton.

Then click Start PIN on the screen below to perform WPS connection.

Configuration
150M Wireless-N Mini USB Adapter iB-WUA150NM can be configured by Wireless Utility. This
chapter describes how to configure your 150M Wireless-N Mini USB Adapter

for wireless

connectivity on your Wireless Local Area Network (WLAN) and use the data security encryption
features.
After installing the Adapter, the Adapters tray icon

will appear in your system tray. It appears

at the bottom of the screen, and shows the signal strength using color and the received signal
strength indication (RSSI).
If the icon is gray, there is no connection.

If the icon is red, there is poor signal strength.


If the icon is yellow, there is poor signal strength.
If the icon is green, there is good signal strength.
If the icon is green, there is excellent signal strength.
Double-click the icon and the 150M Wireless-N Mini USB Adapter

Adapter will run. You can

also run the utility by clicking the Start > Programs > iBall Baton Wireless > iBall Baton
wireless Utility. The utility provides integrated and easy tool to:

Display current status information

Edit and add configuration profiles

Display current statistics information

The sections below take Windows XP for example to introduce these above capabilities.

General Status
Choose the tab General as shown in Figure 0-1, the left filed displays the type of the adapter, the
right field displays the status about the connection, including Status, Speed, Type, SSID, Signal
Strength, Link Quality and other IP information.

Figure 0-1

Signal Strength - This shows the strength of the wireless signal.

Link Quality - This shows the quality of the wireless connection.

ReNew IP - Click the button to get the IP address from the AP.

Show Tray Icon - Select the option to display the icon

Disable Adapter - If you select the option, the adapter cant work.

Radio Off - If you select the option, the wireless function will be ineffective.

Windows Zero Config - Select the option, you can use the Windows Zero Config function.

Click Close to close the screen.

on the bottom of the desktop.

Profile Management
Click the tab Profile as shown in Figure 0-2 to add, remove, edit, duplicate or set default for a
profile.

Figure 0-2

Appendix A: Specifications
Normal
Interface

USB 2.0 Interface

Standards

IEEE802.11n; IEEE802.11g; IEEE802.11b;

Operating System

Windows XP, Windows Vista, Windows 7 & Windows 8

Radio Data Rate

11b1/2/5.5/11Mbps
11g6/9/12/18/24/36/48/54Mbps
11nUp to 150Mbps for receiver

Modulation

11b:CCK,QPSK,BPSK;
11g:OFDM;
11n: QPSK,BPSK,16-QAM,64-QAM

Media Access Protocol

CSMA/CA with ACK

Data Security

WPA/WPA2; 64/128-bit WEP; TKIP/AES

Frequency

2.4 ~ 2.4835GHz

Spread Spectrum

Direct Sequence Spread Spectrum (DSSS)

Safety & Emissions

FCC, CE
Environmental and Physical

Operating Temp.

0~40 (32~104)

Storage Temp.

-40~70 (-40~158)

Humidity

10%~95% RH, Non-condensing

Appendix B: Glossary

802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to
as Wi-Fi networks.

802.11g - specification for wireless networking at 54 Mbps using direct-sequence


spread-spectrum (DSSS) technology, using OFDM modulation and operating in the
unlicensed radio spectrum at 2.4GHz, and backward compatibility with IEEE 802.11b devices,
and WEP encryption for security.

Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless N USB
Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers
operate on a peer-to-peer basis, communicating directly with each other without the use of an
access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or
as peer-to-peer mode, and is useful at a departmental scale or SOHO operation.

DSSS (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all
data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits
in the chip are damaged during transmission, statistical techniques embedded in the receiver
can recover the original data without the need of retransmission. To an unintended receiver,
DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband
receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS
signal is recognized as the only valid signal, and interference is inherently rejected (ignored).

FHSS (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops) the
carrier frequency of a conventional carrier several times per second according to a
pseudo-random set of channels. Because a fixed frequency is not used, and only the
transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.

Infrastructure Network - An infrastructure network is a group of computers or other devices,


each with a Wireless N USB Adapter, connected as an 802.11 wireless LAN. In infrastructure
mode, the wireless devices communicate with each other and to a wired network by first
going through an access point. An infrastructure wireless network connected to a wired
network is referred to as a Basic Service Set (BSS). A set of two or more BSS in a single
network is referred to as an Extended Service Set (ESS). Infrastructure mode is useful at a
corporation scale, or when it is necessary to connect the wired and wireless networks.

Spread Spectrum - Spread Spectrum technology is a wideband radio frequency technique


developed by the military for use in reliable, secure, mission-critical communications systems.
It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other
words, more bandwidth is consumed than in the case of narrowband transmission, but the
trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the
receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is
not tuned to the right frequency, a spread-spectrum signal looks like background noise.
There are two main alternatives, DSSS and FHSS.

SSID - A Service Set Identification is a thirty-two character (maximum) alphanumeric key


identifying a wireless local area network. For the wireless devices in a network to
communicate with each other, all devices must be configured with the same SSID. This is
typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in
the wireless Access Point and to the wireless network name. See also Wireless Network
Name and ESSID.

WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard.

Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless
Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards
group promoting interoperability among 802.11b devices.

WLAN (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.

WPA (Wi-Fi Protected Access) - A wireless security protocol use TKIP (Temporal Key
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.

Appendix C: Contact Information


For any help on iBall products, please contact support.baton@iball.co.in
www.iBall.co.in | www.iBallBaton.com

COPYRIGHT & TRADEMARKS


Specifications are subject to change without notice. iBall Baton is a registered trademark of Best
IT World (India) Pvt. Ltd. Other brands and product names are trademarks or registered
trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from Best IT
World (India) Pvt. Ltd. All rights reserved

Das könnte Ihnen auch gefallen