Beruflich Dokumente
Kultur Dokumente
User Manual
Ver.: 1.0.0
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to pro-vide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not in-stalled and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
This device must accept any interference received, including interference that may
cause undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance
could void the users authority to operate the equipment.
CE Mark Warning
This is a class B product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
CONTENTS
Package Contents ................................................................................................... 1
Overview of the Product .............................................................................................................. 2
Product Features ......................................................................................................................... 2
Hardware Installation
............................................................................................................. 2
........................................................................................................... 22
Configuration ........................................................................................................ 27
General Status ............................................................................................................. 28
Profile Management ..................................................................................................... 29
Package Contents
The following items should be found in your package:
Conventions:
The Adapter mentioned in this User Guide stands for iBall Baton iB-WUA150NM
150M Wireless-N Mini USB Adapter Adapter without any explanations.
Note:
Make sure that the package contains the above items. If any of the listed items are damaged or
missing, please contact with your distributor.
Introduction
Thank you for choosing the iB-WUA150NM 150M Wireless-N Mini USB Adapter
standards.
Product Features
Hardware Installation
Please insert the USB Adapter into the USB port of your computer / Laptop
Software Installation
Overview
The Adapters Setup Wizard will guide you through the Installation process. The Setup Wizard will
install the Wireless Utility and drivers.
When you install the hardware before installing the software, the system will prompt Found New
Hardware Wizard. Click Cancel, and run the Setup Wizard program on the CD-ROM.
The Setup steps for Windows operation Systems are very similar. The User Guide takes the
Windows XP for example to explain the installation.
Figure 0-1
Click Next in the screen below (shown in Figure 0-2) to continue, you can click Cancel to
end the installation.
Figure 0-2
After that, the next screen will appear Select which option you want to Install to
continue.
Figure 0-3
Figure 2-4
In the next screen, the files will be copied as the next screen shows (shown in Figure
0-5). To end the Installation, click Cancel.
Figure 0-5
Figure 0-7
Click I accept and click Next in the screen below to continue, you can click Cancel to end the
Figure 0-7
After that, the next screen will appear. Select which option you want to install to continue.
Figure 0-8
After that, the files will be copied as the next screen shown (shown in Figure 0-). To end the
Installation, click Cancel.
Figure 0-9
Figure 0-10
Note:
During the installation, the system will warn about Windows Security testing, please click Install
this driver software anyway to continue the installation
Figure 0-11
Figure 0-12
Click the wireless connection in the lower right corner of the computers desktop to view the
available wireless networks. Select the wireless network you wish to connect and click
Connect or double click the wireless network to connect. If you dont find the specified one,
please click the refresh icon in the upper right corner to update the list.
If the wireless network you are connecting is encrypted, youll be prompted to enter the key.
3. It shows Connected after successfully connected. You can disconnect it, view its
status or modify the wireless network properties by right click the wireless network
It is a common solution to use the wireless network adapter as a client to receive signals.
Main interface for station mode
The function buttons on the top (From L to R) are respectively Site Survey, Link
Information, Profile, Advanced, About, Help, and MiniSize. While the left column
displays Turn On/Off RF, Security /No security, and Signal status.
For the networks that are not encrypted, you can directly click Connect. However, for
the encrypted wireless networks,a Profile dialog will pop up and you must select the
corresponding authentication type and encryption type,and then click the Next button to
input the correct key.Please note that this type of connection will not create a profile ,thus
next time connect to this network you still need to select it manually.
The detailed explanations about the authentication and encryption are as follows:
WEPSupports 10/26-bit Hex characters and 5/13-bit ASCII.
Link Status screen displays the detailed information of the connected AP including its
SSID,MAC address, authentication type, encryption type, network type and channel.
2. Throughput screen displays the signal strength of each of the wireless adapters
antennas and the link quality.
3.Statistics screen is used to count the total Rx and Tx data packets, including
transmitted,retransmitted and fail to receive ACK after all retries.You can click the Reset
Counter button to clear the count.
Infrastructure is an application mode that integrates the wired and wireless LAN
architectures. It is different from Ad-Hoc in that in this mode the computer installed with the
wireless network adapter has to fulfill the wireless communication via AP or wireless router. It
can be devided into two modes:wireless AP + wireless network adapter and wireless router
+ wireless network adapter.
Ad-Hoc is a special wireless mobile network application mode. All nodes in the network
are equal.Usually it is used to share resources by connecting the opposing computer s
wireless adapter.
1. Infrastructure Profile Management
When you are connecting the wireless adapter to an AP or a wireless router, please
select the Infrastructure mode.
Click the Addbutton and select the network type as
Infrastructure,and enter the profile name and SSID or you can find the SSID you wish
to connect from the drop-down list.
Click the next button to select the authentication type and encryption type such as WPA
PSK and AES, and then input the key and click next.
After a profile is successfully added, the profile name can be seen on the profile list,you
can edit , import or export the profile,click Active to finish the connection,now you can also
view the detailed connection status on the Link Informationscreen.
NOTE:
If the SSID broadcast function of the wireless router or AP you wish to connect is disabled, then
the wireless adapter can not scan the SSID, thus you need to connect by creating the
corresponding profile.
2.Ad-Hoc Profile management
Using the Ad-hoc mode to establish a wireless network requires that each computer
should be equipped with a wireless network adapter. By connecting these wireless adapters,
computers are able to share the resources. The detailed setting steps are as follows:
1Firstly youll have to allocate a static IP to each wireless adapter to be connected in
Ad-hoc mode.
a.Right click My Network Places on your computers desktop and select Properties.
d. Please enter the IP address and subnet mask, and make sure this IP address is not
used by other devices in the network.For example: if your wireless adapters IP address is
192.168.0.1then set other wireless adapters IP addresses within the range of 192.168.0.2
-192.168.0.254.Click Ok to save the settings.
Click the Next button to select the authentication type and encryption type and then
input the correct key and click Next.
After a profile is successfully added,the profile can be seen on the profile list ,select it
and click the Active icon on the lower right corner.
And then search for the wireless network on other clients. Double click the wireless
network you have configured and youll be prompted for the key .After entering the key, click
Connect.
3.1.4 About
This screen mainly displays the version information of the UIs different programs as
well as Best IT World (India) Private Limited copyright statement.
3.1.5 Help
To know more about kindly refer the User Manual
3.2.1 Config AP
This screen is used to set the APs general parameters including SSID, wireless mode,
channel, authentication type and encryption type, as shown in the picture below.
Here the authentication type is set as Open and the encryption type Not Use.
You can change the SSID on the Config AP screen and control the number of the connected
clients by modifying the max number of peers. AP mode has only one encryption method
which is WPA2-AES by default and cannot be modified.
2) On the Profile List screen, select Push-Button Configuration(PBC) and then click
the Next button, select Start PBC two minutes after the router enables the WPS function.
The connection is established when the negotiating process finishes.
Start PBC:
Negotiating process:
1.3 Using the wireless adapters WPS button to perform PBC connection.
If your wireless adapter provides a WPS button,you may use the button to perform PBC
connection.
a).Run the adapters UI and switch to STATION mode
b).Two minutes after the routers WPS-PBC is enabled,press the adapters WPS button
to connect in PBC mode.
c).You may view the PBC connection process on the UIs PBC screen.
2. Wireless Connections in PIN Mode
On the Add WPS Profile screen, select PIN as the WPS Method. You may select the
wireless AP to be connected in WPS mode on the WPS AP drop-down List,or select Auto
and then click the next button.
Here we take iBall Baton as an example. First enter its WPS configuration
screen,enable WPS settings and select PIN for WPS mode and then input 18686791 in the
PIN code field,and then click the Save button. When the WPS indicator of the Router
starts flashing,it indicates that WPS feature is enabled.
Click the next button on the Profile List screen and click Start PIN to start the PIN code
negotiation.
Select Registrar as the config mode and enter the routers PIN code,such as
35475088 that displays on the routers WPS screen in section 2.1, in the PIN code field here.
Now you can view the SSID ,authenticaiton type,and encrytion type that need to be
negotiated by the WPS in registrar mode.These values can be modified but we recommend
using the default.Here we use the defaut setting
You can view the negotiation key on the screen below ,but you are not recommended to
modify it,just click the next buton.
Then click Start PIN on the screen below to perform WPS connection.
Configuration
150M Wireless-N Mini USB Adapter iB-WUA150NM can be configured by Wireless Utility. This
chapter describes how to configure your 150M Wireless-N Mini USB Adapter
for wireless
connectivity on your Wireless Local Area Network (WLAN) and use the data security encryption
features.
After installing the Adapter, the Adapters tray icon
at the bottom of the screen, and shows the signal strength using color and the received signal
strength indication (RSSI).
If the icon is gray, there is no connection.
also run the utility by clicking the Start > Programs > iBall Baton Wireless > iBall Baton
wireless Utility. The utility provides integrated and easy tool to:
The sections below take Windows XP for example to introduce these above capabilities.
General Status
Choose the tab General as shown in Figure 0-1, the left filed displays the type of the adapter, the
right field displays the status about the connection, including Status, Speed, Type, SSID, Signal
Strength, Link Quality and other IP information.
Figure 0-1
ReNew IP - Click the button to get the IP address from the AP.
Disable Adapter - If you select the option, the adapter cant work.
Radio Off - If you select the option, the wireless function will be ineffective.
Windows Zero Config - Select the option, you can use the Windows Zero Config function.
Profile Management
Click the tab Profile as shown in Figure 0-2 to add, remove, edit, duplicate or set default for a
profile.
Figure 0-2
Appendix A: Specifications
Normal
Interface
Standards
Operating System
11b1/2/5.5/11Mbps
11g6/9/12/18/24/36/48/54Mbps
11nUp to 150Mbps for receiver
Modulation
11b:CCK,QPSK,BPSK;
11g:OFDM;
11n: QPSK,BPSK,16-QAM,64-QAM
Data Security
Frequency
2.4 ~ 2.4835GHz
Spread Spectrum
FCC, CE
Environmental and Physical
Operating Temp.
0~40 (32~104)
Storage Temp.
-40~70 (-40~158)
Humidity
Appendix B: Glossary
802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to
as Wi-Fi networks.
Ad-hoc Network - An ad-hoc network is a group of computers, each with a Wireless N USB
Adapter, connected as an independent 802.11 wireless LAN. Ad-hoc wireless computers
operate on a peer-to-peer basis, communicating directly with each other without the use of an
access point. Ad-hoc mode is also referred to as an Independent Basic Service Set (IBSS) or
as peer-to-peer mode, and is useful at a departmental scale or SOHO operation.
DSSS (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all
data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits
in the chip are damaged during transmission, statistical techniques embedded in the receiver
can recover the original data without the need of retransmission. To an unintended receiver,
DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband
receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS
signal is recognized as the only valid signal, and interference is inherently rejected (ignored).
FHSS (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops) the
carrier frequency of a conventional carrier several times per second according to a
pseudo-random set of channels. Because a fixed frequency is not used, and only the
transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.
WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard.
Wi-Fi - A trade name for the 802.11b wireless networking standard, given by the Wireless
Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards
group promoting interoperability among 802.11b devices.
WLAN (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
WPA (Wi-Fi Protected Access) - A wireless security protocol use TKIP (Temporal Key
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.