Table of Contents BT-302USB Bluetooth 3.
Copyright & Disclaimer Copyright & Disclaimer No part of this publication may be reproduced in any form or by any means, whether electronic, mechanical, photocopying, or recording without the written consent of OvisLink Corp. OvisLink Corp. has made the best effort to ensure the accuracy of the information in this user’s guide. However, we are not liable for the inaccuracies or errors in this guide. Please use with caution.
Copyright & Disclaimer Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Copyright & Disclaimer Federal Communication Commission (FCC) Radiation Exposure Statement This EUT is compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C.
Table of Contents Table of Contents 1. Introduction ........................................................................................................1 1.1. System Requirements ........................................................................... 2 1.2. Package Contents................................................................................. 2 1.3. Hardware Installation ............................................................................ 3 2. Software Installation............
1. Introduction 1 1. Introduction Thank you for purchasing the AirLive BT-302USB Bluetooth 3.0 Mini USB Dongle. This ultra-compact USB adapter supports the latest Bluetooth 3.0 standard and lets you connect your desktop computer or notebook computer to mobile phone, PDA, notebooks, printers or headsets. This handy and mini adapter allows you to create your Personal Area Network (PAN) instantly. You will soon be able to enjoy these additional features by following the instruction in this manual.
1. Introduction 1.1. System Requirements y USB 2.0 port & CD-ROM drive y Windows XP/Vista/7 or Mac OS X 10.5/10.6 y At least 30MB of available disk space Note: this device may not be able to work with USB 1.1 port 1.2.
1. Introduction 1.3. Hardware Installation y USB Connector y Link/Activity LED (Blue) LED Mode Status Link/ Steady ON Connect to a USB port with power Activity Flash Transferring data Off Adapter un-plugged With the computer switched on, insert the BT-302USB adapter into an empty USB 2.0 port.
2. Software Installation 2 2. Software Installation BEFORE INSTALLATION Please remove any previous version of Widcomm Bluetooth software existing in your system. The remove procedures are as follows: 1. Click Start/Settings, and then select Control Panel 2. In the Control Panel window, double click Add/Remove programs icon 3. Find out the item Widcomm Bluetooth Software x.x.x.
2. Software Installation Insert the enclosed software CD in the CDROM drive and click “Install Driver & Utility” from the autorun screen. If the autorun screen did not appear, run the “Setup.exe” program in the “Driver” folder. 1. The system will detect and install the Microsoft Net Framework automatically.
2. Software Installation 2. When the first of the Bluetooth Setup screen displays, click “Next” to continue. On any of the screens where they appear, click “Back” to return to a previous screen; click “Cancel” to exit the wizard.
2. Software Installation 3. The Widcomm Bluetooth Software version will appear, click “Next” to continue.
2. Software Installation 4. License Agreement screen appears, select “I accept the term in the license agreement” and click “Next.
2. Software Installation 5. Click “Change” to appoint the destination of utility installation, or click “Next” to continue with default destination.
2. Software Installation 6. When the next screen displays, click “Install” to begin the installation.
2. Software Installation 7. Please wait while the install procedure is running.
2. Software Installation 8. When you see this message, please follow the on-screen instruction and insert the AirLive BT-302USB into the USB port and click “OK” to continue. 9. Click “Finish” to complete the driver installation process. It is recommended to restart your computer once the driver/utility installation is complete.
2. Software Installation 10. After the installation, a Bluetooth icon appears in the desktop menu, presenting the status of the BT-302USB adapter. To begin configuring the Bluetooth connection, right-click on the icon and select your prefer choice from the pop-up menu.
2. Software Installation 2.1. Configuration Utility The configuration utility is a powerful application that helps you configure you Bluetooth adapter with other Bluetooth embedded devices. The utility appears as an icon in the system tray and on the desktop of Windows. You can open it by right-click the icon in the system tray and an options menu displays.
2.
2. Software Installation Bluetooth Configuration: The Bluetooth Configuration Panel provides access to settings for Bluetooth services, client applications, hardware, security, discovery, accessibility, default paths, event notification and other Bluetooth related items.
2. Software Installation Bluetooth Devices: Quick access to the Bluetooth devices which were connected before.
2. Software Installation Start/Stop the Bluetooth Device: Start or Stop the Bluetooth service on this computer. If you select “Stop the Bluetooth Device,” all connection will be cut-off and the Bluetooth adapter will be disabled.
2. Software Installation 2.2. Bluetooth Configuration - General General Configuration Settings The settings on the General tab of the Bluetooth Configuration Panel determine the information that is displayed to the remote devices. Computer name: enter a unique name to identify this computer to other Bluetooth devices nearby; this field cannot be left blank. Computer type: select either Desktop or Laptop from the shortcut menu to set the type of icon remote devices will use to represent this computer.
2. Software Installation 2.3. Bluetooth Configuration - Accessibility The Accessibility tab of the Bluetooth Configuration Panel lets you specify whether remote devices may access this computer, which remote devices have access, and whether an audio warning is played when a Personal Identification Number (PIN code) is required. Allow other devices to discover this computer Select “Let other Bluetooth devices discover this computer” to permit remote Bluetooth devices to find and report this computer.
2. Software Installation Bluetooth Headsets Enable “Control Skype calls using a hands-free device” allows you to talk on skype via Bluetooth headsets. Notification When a remote device connects to a service, there are three ways to setup the notification.
2. Software Installation 2.4. Bluetooth Configuration – PIM Interface The PIM Synchronization Application is used to synchronize the Personal Information Manager (PIM) database of this computer with the PIM database of a remote Bluetooth device. Check or uncheck “Allow Bluetooth devices to send you PIM items such as business cards, calendar items, e-mail messages and notes” to enable/disable this function. The default setting is enabled.
2. Software Installation The supported PIMs are listed below: y Microsoft Outlook y Microsoft Outlook Express y Lotus Notes The supported data types are listed below: y Business cards y Calendar items y Email (with or without attachments) y Notes Check or uncheck “Include attachments with e-mail that is sent or received by this computer” to enable/disable this function. The default setting is enabled.
2. Software Installation 2.5. Bluetooth Configuration - Share Bluetooth Exchange Settings Check or uncheck “Devices can browse, send and receive pictures, music and files” to enable/disable this function. The default setting is enabled. The default Bluetooth exchange folder is as listed below, you may change the location by click the “Browse” button. My Documents\Bluetooth Exchange Folder This is the highest-level directory on this computer to which a remote Bluetooth device has access.
2. Software Installation Printer Settings Sharing your printer with remote Bluetooth devices by check or uncheck “Allow remote device to use the printer connected to your computer” to enable/disable this function. The default setting is enabled. Dial Up Networking The Bluetooth Dial-up Networking application allows this computer to use a modem that is physically connected to a remote device to access the Internet, log on to a remote network.
2. Software Installation 2.6. Bluetooth Configuration – Communications Port The Bluetooth Serial Port application allows this computer to establish a wireless serial connection with a remote Bluetooth device. The applications on both this computer and the remote device must be configured to send and receive data to and from the respective communications port (COM port) assigned to the Bluetooth serial port.
2. Software Installation 2.7. Bluetooth Configuration – Networking The Bluetooth Network Access service makes it possible for a remote Bluetooth device to access a Local Area Network that is physically attached to this computer or allows a remote device to become part of an ad hoc network provided by this computer.
2. Software Installation Select the type of service to offer remote devices: y y y Do not allow network connections to this computer Allow other devices to create a private network with this computer Allow other devices to access the Internet/LAN through this computer 2.8.
3. Specifications 3 3. Specifications Standards • Bluetooh v3.0 (backward compatible with v1.1/1.2/2.0/2.1) General • Interface: USB 2.0, type A • Chipset: Broadcom • Frequency band: 2.4000 – 2.480 GHz •Spread Spectrum: 79 Channel; FHSS (Frequency Hopping Spread Spectrum) • Transfer Rates: 3Mbps • Power Class: Class 2 • Receiving Sensitivity: -80dBm at 0.
4. Wireless Network Glossary 4 4. Wireless Network Glossary The wireless network glossary contains explanation or information about common terms used in wireless networking products. Some of information in this glossary might be outdated, please use with caution. 802.11a An IEEE specification for wireless networking that operates in the 5 GHz frequency range (5.15 GHz to 5.850 GHz) with a maximum of 54Mbps data transfer rate. The 5GHz frequency band is not as crowded as the 2.4GHz band.
4. Wireless Network Glossary 802.11g A standard provides a throughput up to 54 Mbps using OFDM technology. It also operates in the 2.4GHz frequency band as 802.11b. 802.11g devices are backward compatible with 802.11b devices. 802.11h This IEEE standard define the TPC (transmission power control) and DFS (dynamic frequency selection) required to operate WiFi devices in 5GHz for EU. 802.11i The IEEE standard for wireless security, 802.
4. Wireless Network Glossary 802.1d STP Spanning Tree Protocol. It is an algorithm to prevent network from forming. The STP protocol allows net work to provide a redundant link in the event of a link failure. It is advise to turn on this option for multi-link bridge network. 802.1Q Tag VLAN In 802.1Q VLAN, the VLAN information is written into the Ethernet packet itself. Each packet carries a VLAN ID (called Tag) as it traveled across the network.
4. Wireless Network Glossary Access Point (AP) The central hub of a wireless LAN network. Access Points have one or more Ethernet ports that can connect devices (such as Internet connection) for sharing. Multi-function Access Point can also function as an Ethernet client, wireless bridge, or repeat signals from other AP. Access Points typically have more wireless functions comparing to wireless routers. ACK Timeout Acknowledgement Timeout Windows.
4. Wireless Network Glossary Bridge A product that connects 2 different networks that uses the same protocol. Wireless bridges are commonly used to link network across remote buildings. For wireless application, there are 2 types of Bridges. WDS Bridge can be used in Point-to-Point or Point-to-Multipoint topology. Bridge Infrastructure works with AP mode to form a star topology. Cable and Connector Loss During wireless design and deployment, it is important to factor in the cable and connector loss.
4. Wireless Network Glossary DDNS Dynamic Domain Name System. An algorithm that allows the use of dynamic IP address for hosting Internet Server. A DDNS service provides each user account with a domain name. A router with DDNS capability has a built-in DDNS client that updates the IP address information to DDNS service provider whenever there is a change. Therefore, users can build website or other Internet servers even if they don't have fixed IP connection. DHCP Dynamic Hosting Configuration Protocol.
4. Wireless Network Glossary DoS Attack Denial of Service. A type of network attack that floods the network with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. Encryption Encoding data to prevent it from being read by unauthorized people. The common wireless encryption schemes are WEP, WPA, and WPA2. ESSID (SSID) The identification name of an 802.11 wireless network.
4. Wireless Network Glossary Fragment Threshold Frame Size larger than this will be divided into smaller fragment. If there are interferences in your area, lower this value can improve the performance. If there are not, keep this parameter at higher value. The default size is 2346. You can try 1500, 1000, or 500 when there are interference around your network. Full Duplex The ability of a networking device to receive and transmit data simultaneously.
4. Wireless Network Glossary Infrastructure Mode A wireless network that is built around one or more access points to provide wireless clients access to wired LAN / Internet service. The opposite of Infrastructure mode is Ad-hoc mode. IP address IP (Internet Protocol) is a layer-3 network protocol that is the basis of all Internet communication. An IP address is 32-bit number that identifies each sender or receiver of information that is sent across the Internet.
4. Wireless Network Glossary Mbps (Megabits per Second) One million bits per second; a unit of measurement for data transmission MESH Mesh is an outdoor wireless technology that uses Spanning Tree Protocol (STP) and Wireless Distribution system to achieve self-forming, self-healing, and self-configuring outdoor network. MESH network are able to take the shortest path to a destination that does not have to be in the line of site.
4. Wireless Network Glossary POE (Power over Ethernet) A standard to deliver both power and data through one single Ethernet cable (UTP/STP). It allows network device to be installed far away from power ource. A PoE system typically compose of 2 main component: DC Injector (Base Unit) and Splitter(Terminal Unit). The DC injector combines the power and data, and the splitter separates the data and power back. A PoE Access Point or CPE has the splitter built-in to the device. The IEEE 802.
4. Wireless Network Glossary Preamble Type Preamble are sent with each wireless packet transmit for transmission status. Use the long preamble type for better compatibility. Use the short preamble type for better performance Rate Control Ethernet switches' function to control the upstream and downstream speed of an individual port. Rate Control management uses "Flow Control" to limit the speed of a port. Therefore, the Ethernet adapter must also have the flow control enabled.
4. Wireless Network Glossary Router An IP sharing router is a device that allows multiple PCs to share one single broadband connection using NAT technology. A wireless router is a device that combines the functions of wireless Access Point and the IP sharing router. RSSI Receiver Sensitivity Index. RSSI is a value to show the Receiver Sensitivity of the remote wireless device. In general, remote APs with stronger signal will display higher RSSI values.
4. Wireless Network Glossary SSH Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSL Secure Sockets Layer.
4. Wireless Network Glossary TCP A layer-4 protocol used along with the IP to send data between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the packets that a message is divided into for efficient routing through the Internet. Turbo A Turbo A is an Atheros proprietary turbo mode to increase speed over standard 802.11a mode. It uses channel binding technology to increase speed.
4. Wireless Network Glossary Upload To send a file to the Internet or network device. URL (Uniform Resource Locator) The address of a file located on the Internet. VPN (Virtual Private Network) A type of technology designed to increase the security of information transferred over the Internet. VPN creates a private encrypted tunnel from the end user's computer, through the local wireless network, through the Internet, all the way to the corporate network.
4. Wireless Network Glossary WPA (Wi-Fi Protected Access) It is an encryption standard proposed by WiFi for advance protection by utilizing a password key (TKIP) or certificate. It is more secure than WEP encryption. The WPA-PSK utilizes pre-share key for encryption/authentication. WPA2 (Wi-Fi Protected Access 2) WPA2 is also known as 802.11i. It improves on the WPA security with CCMP and AES encryption. The WPA2 is backward compatible with WPA.
4. Wireless Network Glossary WLAN (Wireless Local Area Network) A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. The most popular standard for WLAN is the 802.11 standards. WMM (Wi-Fi Multimedia) WMM is a standard to prioritize traffic for multimedia applications. The WMM prioritize traffic\ on Voice-over-IP (VoIP), audio, video, and streaming media as well as traditional IP data over the AP.