CompUSA 333626 Operation manual

54 Mbps Wireless G
Mini USB Adapter
SKU: 333626
Rev. 051216

2
FCC and CE Radiation Norm
FCC
This equipment has been tested and found to comply with limits for Class B digital device pursuant
to Part 15 of Federal Communications Commission (FCC) rules.
CE
This equipment has been tested and found to comply with the limits of the European Council
Directive on the approximation of the law of the member states relating to electromagnetic
compatibility (89/336/EEC) according to EN 55022 Class B.
FCC and CE Compliance Statement
These limits are designed to provide reasonable protection against frequency interference in
residential installation. This equipment generates, uses and can radiate radio frequency energy,
and if not installed or used in accordance with the instructions, may cause harmful interference to
radio communication. However, there is no guarantee that interference will not occur in television
reception, which can be determined by turning the equipment off and on. The user is encouraged
to try and correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna
Increase the separation between the equipment and the receiver
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected to.
CAUTION!
The Federal Communications Commission warns the user that changes or modifications to the
unit not expressly approved by the party responsible for compliance could void the user’s authority
to operate the equipment.

3
PACKAGE CONTENTS:
-54Mbps Wireless G Mini USB Adapter
-USB Extension Cable
-Driver CD
-Quick Installation Guide
SYSTEM REQUIREMENTS:
-Windows®98SE, ME, 2000, XP
-An Available USB Port
-CD-ROM Drive (for driver installation)
SYSTEM SPECIFICATIONS:
-Complies with Both IEEE 802.11b & IEEE 802.11g
-High Speed Data Transfer Rates Up To 54Mbps
-Supports Peer-To-Peer Communications Among Any Wireless Users, No Access Point
Required
-Supports 64/128bit WEP, WPA and AES Functions
-Compliant with Both USB 2.0 and USB 1.1 Standards

4
Driver Installation
Before you start the driver installation, please read the following carefully:
1. Do not install your Mini USB Adapter into your computer before you have installed the
enclosed driver and utility software CD.
2. The following installation was performed under Windows®XP and the screenshots are for
demonstration purposes only. However, the installation procedures are similar for all
Windows®operating systems.
3. If you have previously installed an older version of the driver and/or utility software for your
Mini USB Adapter, please uninstall the older version prior to this installation to avoid any
system conflicts.
For All Windows®Operating Systems
To install the driver and utility software for your Mini USB Adapter, please follow the instructions
below:
1. Turn on your computer.
2. Place the driver CD into the CD-ROM drive of your computer.
3. Click “Start”, then “Run…”, then type “D:\Setup.exe” in the dialog box (NOTE: “D:\”
represents the drive letter assigned to the optical drive you are using. If Dis not the letter
assigned to your optical drive, replace Dwith the appropriate drive letter.), and then click
“OK”.
4. Read the license agreement carefully, click “Yes” to accept the agreement and continue the
installation.
5. In Windows®XP, there is a “Windows Zero Configuration Tool” for you to setup your Mini
USB Adapter. You can choose to configure your Mini USB Adapter through the “Windows
Zero Configuration Tool” or the “Ralink Configuration Tool”. However, it is
recommended to choose the “Ralink Configuration Tool”. Click “Next” to continue.

5
6. If you would like your Mini USB Adapter to operate at a high performance choose the
“Optimize for performance” to enable the Tx Burst mode. If you would like your Mini USB
Adapter to run in standard wireless network you can choose “Optimize for Wi-Fi mode”.
After you have made your selection, click “Next” to start the installation.
7. During the installation, your computer may ask you to plug your Mini USB Adapter into your
computer. If this occurs, plug your Mini USB Adapter into an available USB port on your
computer to complete the installation.
NOTE: If your computer did not ask you to plug your Mini USB Adapter in during the installation,
please plug it into an available USB port on your computer after the installation is complete.
8. Click “Finish” to complete the installation.
9. Restart your computer and your new Mini USB Adapter will be ready for use.

6
Utility Configuration
The Ralink Wireless Utility is a powerful application that helps you configure your Mini USB
Adapter and monitor the link and network communication statistics.
When your Mini USB Adapter is installed, the Wireless Utility will be displayed automatically. Your
Mini USB Adapter will automatically connect to the wireless network with the best signal strength
and no wireless security setting.
TIP: If you are not able to find your network, please click the “Rescan” button to scan again; or,
access the “Profile” section to add a specific network manually. (To create a profile for your
network, please refer to the Profile section of this manual).
1. The Ralink Wireless Utility icon will appear on the system tray on your desktop while your
Mini USB Adapter is plugged in. To access the utility, double-click on the icon to access the
option menu.
2. In Windows®XP, there is a “Windows Zero Configuration Tool” for you to setup wireless
networks with Windows®configuration. If you want to use this tool (for advanced users),
right-click the icon located in the system tray and select “Use Zero Configuration as
Configuration utility”. (You can switch back to the Ralink Wireless Utility settings using the
same method).

7
Site Survey
When you open the Ralink Wireless Utility, the system will scan all the channels to find all the
access points/stations within the accessible range of your Mini USB Adapter and automatically
connect to the wireless device with the highest signal strength. From the “Site Survey”, all the
networks nearby will be listed. You can change the connection to other networks or add one of the
available networks to your profile list.
Parameter Description
Available Networks This list shows all available wireless networks within range of your Mini USB Adapter. It
also displays the information of the networks including the SSID, BSSID, Signal Strength,
Channel, Encryption Method, Authentication and Network Type. If you want to connect to
any network on the list, double-click the item on the list, and your Mini USB Adapter will
automatically connect to the selected network.
Rescan Button Click this button to collect the new information of all the wireless networks nearby.
Connect Button Click this button to connect to the selected network.
Add to Profile Button Click this button to add the selected network to your “Profile” list.
Available Networks

8
Profile
The “Profile List” is for you to manage the network(s) you use frequently. You can add, delete,
edit, and activate profile(s) in this section.
Parameter Description
Profile List The profile list display all the profiles and the relative settings of the profiles including
Profile Name, SSID, Channel, etc.
A green check mark sign indicates the activated profile can establish a successful
connection.
A red check mark sign indicates the activated profile can not establish a successful
connection.
Add Click this button to open the “Add Profile” dialog box and add a new profile.
Delete/Edit Button Click these buttons to delete or edit the selected profile.
Activate Button Click “Activate” to connect to the selected profile. When a profile is activated, your Mini
USB Adapter will try to connect to the corresponding network.

9
Configuring the Profile
To add a new profile (or edit an existing profile), please follow the instructions below:
Parameter Description
Profile Name Define a recognizable profile name for you to identify different networks.
SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN.
This ID prevents unintentional merging of two co-located WLANs.
You may specify a SSID for your Mini USB Adapter and only devices with the same SSID
can interconnect with your Mini USB Adapter. To add an available network to the profile
list, click the down arrow on the right side of the “SSID” input box and select one from the
list, or type the SSID into the field.
PSM (Power Saving
Mode) The power saving function is only available when the network type is “Infrastructure”.
CAM (Constantly Awake Mode) – Your Mini USB Adapter will always be in active mode.
PSM (Power Saving Mode) – Enable your Mini USB Adapter in the power saving mode
when it is idle.
Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point.
All communication is done via the Access Point or Router.
Ad-Hoc – Select this mode if you want to connect to another wireless station in the
Wireless LAN network without going through an Access Point or Router.
TX Power If you want to lower the transmit power of your Mini USB Adapter to conserve system
power, you can select the lower percentages from the list. Please note that by lowering the
TX Power, it will weaken the signal strength and the coverage range.

10
Parameter Description
Ad Hoc Wireless Mode When your Mini USB Adapter is set toAd Hoc (Peer to Peer Mode), you can designate the
wireless connection mode for theAd Hoc network.
802.11 B only – Your adapter will be compatible with 802.11b wireless stations ONLY. If
there are only 802.11b wireless stations in the network, you can set your Mini USB
Adapter to this mode.
802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your
network, it is recommended to set your Mini USB Adapter to this mode. (This mode is the
default setting.)
802.11 G only – Your adapter will be compatible with 802.11g wireless stations ONLY. If
there are only 802.11g wireless stations in the network, you can set your Mini USB
Adapter to this mode.
Preamble The preamble defines the length of the CRC block for communication among wireless
devices. This option is only active in the Ad Hoc mode.
There are two modes including Auto and Long Preamble. If “Auto” mode is selected, your
Mini USB Adapter will auto switch the preamble mode depending on the wireless network
that your Mini USB Adapter is connecting to.
RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than
this threshold, an RTS is not sent and the packet is transmitted directly to the wireless
network. Select a setting within a range of 0 to 2347 bytes. (It is recommended to keep the
default settings).
Fragment Threshold This value defines the maximum size of packets; any packet size larger than this value will
be fragmented. If you have decreased this value and experience high packet error rates,
you can increase it again, but it will likely decrease overall network performance. Select a
setting within a range of 256 to 2346 bytes. (It is recommended to keep the default
settings).
Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel
used on your network. The channel setting of your Mini USB Adapter is REQUIRED to be
the same as the network you are connecting to.

11
Authentication and Security
Parameter Description
Authentication Type Authentication settings have to be consistent with the wireless network that your Mini
USB Adapter is connecting to.
Open – No authentication is needed among the wireless network.
Shared – Only wireless devices using a shared key (WEP Key identified) are allowed to
connect to the network.
LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP
protocols. Cisco controls the ability of other vendors to implement this protocol, so it should
be selected for use only when limited vendor choice for client, access-point, and server
products is not a concern. The user name and password for your computer is required.
WPA – WPA provides a scheme of mutual authentication using either IEEE
802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK)
technology. It provides a high level of assurance to enterprises, small businesses and
home users that data will remain protected and that only authorized users may access
their networks. For enterprises that have already deployed IEEE 802.1x authentication,
WPA offers the advantage of leveraging existing authentication databases and
infrastructure.
WPA-PSK – It is a special mode designed for home and small business users who do not
have access to network authentication servers. In this mode, known as Pre-Shared Key,
the user manually enters the starting password in their access point or gateway, as well as
in each wireless station in the network. WPA-PSK takes over automatically from that point,
keeping unauthorized users that don't have the matching password from joining the
network, while encrypting the data traveling between authorized devices.

12
WPA2 – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. It
also includes a new advanced encryption mechanism using the Advanced Encryption
Standard (AES). AES is required for the corporate user or government user. The
difference between WPA and WPA2 is that WPA2 provides data encryption via the AES. In
contrast, WPA uses Temporal Key Integrity Protocol (TKIP).
WPA2-PSK – WPA2-PSK is also for home and small business. The difference between
WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption via the AES. In
contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP).
802.1x Setting When you have set the Authentication Type to Open, Shared, WPA or WPA2, you can
also enable the IEEE 802.1x setting to use the authentication server or certification server
to authenticate client users. (Please refer to the 802.1x Specification section in this
manual for details).
Encryption Mode None – Disable the encryption mode.
WEP – Enable the WEP Data Encryption. When the item is selected, you have to set the
WEP Encryption keys in order for it to work properly.
TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000
packets (a packet is a kind of message transmitted over a network). This ensures much
greater security than the standard WEP security.
AES – AES has been developed to ensure the highest degree of security and authenticity
for digital information and it is the most advanced solution defined by IEEE 802.11i for
security in wireless networks.
NOTE: All devices in the network should use the same encryption method to establish
communication.
WPA Pre-Shared Key The WPA-PSK key can be from 8 to 64 characters and can be letters or numbers. This
same key must be used on all of the wireless stations in the network.
WEP Key
(Key1 ~ Key4) The WEP keys are used to encrypt data transmitted in the wireless network. There are two
types of key length: 64-bit and 128-bit. Use the radio buttons to select the appropriate
encryption key (Key 1 - Key 4) to match your wireless router or network.
Fill the text box by following the rules below:
64-bit – Input 10-digit Hex values (in the “A-F”, “a-f” and “0-9” range) or 5-digit ASCII
characters (including “a-z” and “0-9”) as the encryption keys. For example: “0123456aef"
or “test1”.
128-bit – Input 26-digit Hex values (in the “A-F”, “a-f” and “0-9” range) or 13-digit ASCII
characters (including “a-z” and “0-9”) as the encryption keys. For example:
“01234567890123456789abcdef" or “administrator”.

13
802.1x Specification
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a
network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol
(EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point
Protocol (PPP) support as many internet service providers and enterprises do.
When an Access Point acting as an authenticator detects a wireless station on the LAN, it sends an EAP-Request for
the user's identity. (EAP, or the Extensible Authentication Protocol, is an authentication protocol that runs before
network layer protocols transmit data over the link). In turn, the device responds with its identity, and the AP relays this
identity to an authentication server, which is typically an external RADIUS server.
Using 802.1x: Certification
Parameter Description
Authentication Type These settings have to be consistent with the wireless network that your Mini USB
Adapter is connecting to. Supported EAP authentication protocols are as followed:
PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a
stand-alone authentication protocol to be used within an encrypted tunnel. TTLS
supports any protocol within its tunnel, including CHAP, MS-CHAP, MS-CHAPv2, PAP
and EAP-MD5. PEAP specifies that an EAP-compliant authentication protocol must be
used; this adapter supports EAP-MSCHAP v2, EAP-TLS/Smart Card and Generic Token
Card. The client certificate is optional for the authentication.
Session Resumption For session resumption, there are 5 status options you can choose from. They are
“Disabled”, “Reauthentication”, “Roaming”, “SameSsid” and “Always”.

14
Identity Enter a name as the identity for the server.
Password Enter a password as the identity for the server.
Use Client Certificate A client certificate is required for TLS, and is optional for TTLS and PEAP. This forces a
client certificate to be selected from the appropriate Windows®Certificate Store and
made available to the RADIUS server for certification.
Tunneled Authentication:
Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the
encrypted tunnel.
Identity This is the protected user EAP Identity used for authentication. The identity specified
may contain up to 63 ASCII characters, is case sensitive and takes the form of a
Network Access Identifier, consisting of <name of the user>@<user’s home realm>. The
user’s home realm is optional and indicates the routing domain.
Password The password used for authentication. It may contain up to 63 ASCII characters and is
case sensitive.

15
Using 802.1x: CA Server
Parameter Description
Use Certificate Chain When an EAP authentication type such as TLS, TTLS or PEAP is selected, a certification
is required to tell the client what server credentials to accept from the authentication server
in order to verify the server. You have to enable this function.
Certificate Issuer Choose the server from the list to issue the certificate. If “Any Trusted CA” is selected, any
CA included in the list (provided by the Microsoft Certificate Store) is permitted.
Allow Intermediate
Certificates A server designates an issuer as a trusted root authority by placing the issuer's self-signed
certificate, which contains the issuer's public key, into the trusted root certification authority
certificate store of the host computer. Intermediate or subordinate certification authorities
are trusted only if they have a valid certification path from a trusted root certification
authority.
Server Name Enter the authentication server name.
Server Name Must
Match Exactly When selected, the server name must match the server name found on the certificate
exactly.
Domain Name Must End
In Specified Name When selected, the server name field identifies a domain. The certificate must use a server
name belonging to this domain or to one of its sub-domains (e.g. zeelans.com, where the
server is blueberry.zeelans.com) but it may be any name used in the certificate name field.

16
Link Status
You can view all the information pertaining to the network you are connected to under the “Link
Status” option.
Parameter Description
Status Display the SSID and MAC ID of the network your Mini USB Adapter is connecting to.
Extra Info Display the link status.
Channel Display the number of the radio channel and the frequency used for the network.
Link Speed (Mbps) Display the transmission and reception rate of the network. The maximum transmission
rate is 54Mbps.
Throughput (Kbps) Display the speed of data transmitted and received.
Link Quality This bar indicates the quality of the link. The higher the percentage, the better the quality.
dBm If you want to know the signal strength in the unit of dBm, select this check box.
Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the
more radio signal has been received by your Mini USB Adapter. This indicator helps to find
the proper position of the wireless device for quality network operation.
Noise Level Display the noise level in the wireless environment. The higher percentage shown in the
bar, the higher the noise level is.

17
Statistics
This section enables you to view the statistic information of the connection including transmit
statistics and receive statistics. To reset the counter, click “Reset Counter”.
Advanced
This option enables you to configure more advanced settings, for example: wireless mode,
protection mode, etc.
Parameter Description
Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your
network, it is recommended to set your Mini USB Adapter to this mode. (This mode is the
default setting).
802.11 B only – This adapter will be compatible with 802.11b wireless stations ONLY. If
there are only 802.11b wireless stations in the network, you can set your Mini USB
Adapter to this mode.
802.11 G only – This adapter will be compatible with 802.11g wireless stations ONLY. If
there are only 802.11g wireless stations in the network, you can set your Mini USB
Adapter to this mode.

18
Select Your Country
Region Code The available channels differ for different countries. For example: USA (FCC) is channel 1-
11, Europe (ETSI) is channel 1-13. You must adjust the channel setting to comply with the
regulations of the country you are in.
B/G Protection If you have a mix of 802.11b and 802.11g wireless stations in the network, it is
recommended to enable this protection mechanism. This mechanism can decrease the
rate of data collision between 802.11b and 802.11g wireless stations. When this protection
mode is enabled, the throughput of your Mini USB Adapter will be slightly lower.
Auto – The protection mode will be configured automatically based on the status of the
network.
On – Always enable the protection mode.
Off – Always disable the protection mode.
Tx Rate There are several options including Auto/1/2/5.5/11/6/9/12/18/24/36/48/54Mbps for you to
select. When “Auto” is selected, the device will choose the most suitable transmission rate
automatically. The higher data rate you designated in the network, the shorter distance is
allowed between your Mini USB Adapter and the wireless stations.
When the wireless mode is “802.11 B only”, the maximum data rate is 11Mbps (11b) so
that there are only “Auto/1/2/5.5/11Mbps” options you can select.
Tx BURST Tx Burst enables your Mini USB Adapter to deliver better throughput in the same period
and environment.
Enable TCP Window
Size The TCP Window is the amount of data a sender can send on a particular connection
before it gets an acknowledgment back from the receiver that it has received a portion of it.
When the Router or AP your Mini USB Adapter is connecting to have set up the TCP
Window, you can enable the parameter to meet the data size for the Router or AP
connection. The larger TCP Window the better the performance.
Fast Roaming at -
70dBm When you want to fast roam to a network nearby without interrupting the wireless
connection, especially when your Mini USB Adapter is applied to a multimedia application
or a voice call, you can enable this parameter. Your Mini USB Adapter will fast roam to the
nearest network when the signal strength falls below the value you have set up.
Turn Off RF Button If you want to turn off the radio of your Mini USB Adapter temporarily, click this button. To
turn on the radio, click this button again.
CCX 2.0 CCX 2.0 (Cisco Compatible Extensions) is developed by Cisco for the radio monitoring
and fast roaming.
LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new
access point by performing a complete LEAP authentication, including communication with
the main RADIUS server.
When you configure your wireless LAN for fast re-association, however, LEAP-enabled
client devices roam from one access point to another without involving the main server.

19
Using Cisco Centralized Key Management (CCKM), an access point configured to provide
Wireless Domain Services (WDS) takes the place of the RADIUS server and authenticates
the client so quickly that there is no perceptible delay in voice or other time-sensitive
applications.
Enable Radio
Measurement When this parameter is enabled, the Cisco AP can run the radio monitoring through the
associated CCX-compliant clients to continuously monitor the WLAN radio environment
and discover any new AP’s that are transmitting beacons.
Non-Serving Channel
Measurements The CiscoAP can perform monitoring measurements through the CCX-compliant clients
on the non-serving channels when this parameter is enabled.
Limit xxx milliseconds
(0-2000)
It limits the channel measurement time. The default value is 250 milliseconds.
About
By choosing this option, you can click the hyperlink to connect to the website for more information on the wireless
chipset vendor and review basic information about the Utilities such as the driver, utility and EEPROM Version. The
MAC Address of your Mini USB Adapter is displayed here as well.
Turbo Mode
Your Mini USB Adapter supports specific ways to increase the data transfer rate at a time; compress the data and
decrease the waiting time to send the next data to the Routers or AP’s, this feature (known as Turbo Mode) enables
higher throughput than IEEE 802.11g standard (up to 54Mbps).
When your Mini USB Adapter is connecting to the Routers or AP’s with the proprietary Turbo Mode feature, the Turbo
Mode will be enabled automatically without any configuration.

20
Glossary
This chapter provides solutions to problems usually encountered during the installation and
operation of your Mini USB Adapter.
1. What is the IEEE 802.11g standard?
802.11g is the new IEEE standard for high-speed wireless LAN communications that provides up to 54
Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN
technology for the home, office, and public networks.
802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.11a for the 5
GHz frequency band and applies it in the same 2.4 GHz frequency band as IEEE 802.11b. The 802.11g
standard requires backward compatibility with 802.11b.
The standard specifically calls for:
•A new physical layer for the 802.11 Medium Access Control (MAC) in the 2.4 GHz frequency
band, known as the extended rate PHY (ERP). The ERP adds OFDM as a mandatory new
coding scheme for 6, 12, and 24 Mbps (mandatory speeds), and 18, 36, 48, and 54 Mbps
(optional speeds). The ERP includes the modulation schemes found in 802.11b including CCK
for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps.
•A protection mechanism called RTS/CTS that governs how 802.11g devices and 802.11b
devices interoperate.
2. What is the IEEE 802.11b standard?
The IEEE 802.11b Wireless LAN standard subcommittee formulates the standard for the industry. The
objective is to enable wireless LAN hardware from different manufactures to communicate.
3. What does IEEE 802.11 feature support?
The product supports the following IEEE 802.11 functions:
•CSMA/CA plus Acknowledge Protocol
•Multi-Channel Roaming
•Automatic Rate Selection
•RTS/CTS Feature
•Fragmentation
•Power Management
4. What is Ad-hoc?
An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter,
connected as an independent wireless LAN. Ad-hoc wireless LAN is applicable at a departmental scale
for a branch or SOHO operation.
5. What is Infrastructure?
An integrated wireless and wired LAN is called an Infrastructure configuration. Infrastructure is
applicable to enterprise scale for wireless access to central database, or wireless application for mobile
workers.
6. What is BSS ID?
A specific Ad-hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured
with the same BSS ID.
7. What is WEP?
WEP (Wired Equivalent Privacy) is a data privacy mechanism based on a 40 bit shared key algorithm,
as described in the IEEE 802 .11 standard.
Table of contents