Rosewill RNX-N180PCE user manual 2400.0-2483.5 MHz, Country, Restriction, Reason/remark

Page 2
Wireless N Adapter RNX-N180PCe

Wireless N Adapter RNX-N180PCe

User Manual

 

 

 

FCC STATEMENT

This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to pro-vide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not in-stalled and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/ TV technician for help.

This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:

1)This device may not cause harmful interference.

2)This device must accept any interference received, including interference that may cause undesired operation.

Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.

FCC RF Radiation Exposure Statement

This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter.

“To comply with FCC RF exposure compliance requirements, this grant is applicable to only Mobile Configurations. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.”

CE Mark Warning

This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.

National Restrictions

2400.0-2483.5 MHz

Country

Restriction

 

 

Bulgaria

 

 

 

France

Outdoor use limited to 10 mW

 

e.i.r.p. within the band 2454-2483.5

 

MHz

 

 

Italy

 

 

 

Reason/remark

General authorization required for outdoor use and public service Military Radiolocation use. Refarming of the 2.4 GHz band has been ongoing in recent years to allow current relaxed regulation. Full implementation planned 2012

If used outside of own premises, general authorization is

2

Image 2
Contents Wireless N Adapter RNX-N180PCe User ManualCountry Wireless N Adapter RNX-N180PCe2400.0-2483.5 MHz RestrictionWireless N Adapter RNX-N180PCe Table of Content 1.1 Overview of the Product Package ContentChapter 1 Overview Easy Installation, enhanced Wireless Security1.4 LED Status 1.2 Features1.3 System Requirement LED IndicationsStandard 1.5 Product SpecificationTransmit Power InterfaceChapter 2 Installation Guide 2.1 Hardware Installation2.2 Software Installation for Windows OS 5. Click Next 6. Click Install to start installing 7. Follow the InstallShield Wizard steps, and click Finish when done 8. Now your PC or notebook will restart automaticallyWireless N Adapter RNX-N180PCe 3.1 Connecting with Microsoft Zero Configuration tool Win XP Chapter 3 Wireless Connection Guide3.2 Connecting with Window 3.3 Connecting with Wireless LAN Utility 3.3.1 Step 1 Search Available Network 3.3.2 Step 2 Select and Add to ProfileAfter click “Add to Profile”, you will see the next window “Wireless Network Properties” popup with your current wireless signal’s setting. RNX-N180PCe will detect the current setting of your SSID. So after the “Wireless Network Properties” popup, all you need to do is to enter the password of your SSID and click OK to continute Chapter 4 Utility Configuration - Win XP’s Station Mode 4.1 GeneralOthers 4.1.1 ProfileNetwork Address  Create a new Infrastructure mode profile Create a new ad-hoc mode profile created a profile 4.1.1.3 Edit4.1.1.2 Remove Select a profile which you want to copy and then click Duplicate 4.1.1.4 DuplicateModify the profile information according to your demand 4.1.1.5 Set default Import the new profile name in the popup window blank4.2 Available Network Double-click the network to which you wish to connect4.3 Status 4.4 Statistics 4.5 Wi-Fi Protect Setup 4.5.1 Method 1 PIN Input Config PINWPS config page 2. Click Pin Input ConfigPIN2. Click Start PBC on the AP-Router WPS config page 4.5.2 Method 2 Push Button1. Click Push Button ConfigPBC on Wi-Fi Protect Setup page Remark Chapter 5 Configuration - Win XP’s Access Point Mode 5.1 General Profile name 5.2 Advanced Network authentication  Network name SSID Beacon Interval 5.3 Statistics Set defaults  DTIM period5.4 ICS It display receive and transmit informationWireless N Adapter RNX-N180PCe User ManualPage multiple clients associated to it Glossary Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the receiver can recover the original data without the need of retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers. However, to an intended receiver i.e. another wireless LAN endpoint, the DSSS signal is recognized as the only valid signal, and interference is inherently rejected ignored  WEP - Wired Equivalent Privacy - A data privacy mechanism based on a 64-bit or 128-bit or 152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX hexadecimal - using characters 0-9, A-F or ASCII American Standard Code for Information Interchange - alphanumeric characters format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily