Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector
- Den Namen des Produzenten und das Produktionsjahr des Geräts Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Efficient Networks finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Efficient Networks 802.11g Turbo WLAN USB Adapter with RP-SMA Connector widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    8 8 0 0 2 2 . . 1 1 1 1 g g T T u u r r b b o o W W L L A A N N U U S S B B A A d d a a p p t t e e r r w w / / R R P P - - S S M M A A C C o o n n n n e e c c t t o o r r User Manual V ersion: 1.2 (May , 2007)[...]

  • Seite 2

    COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No part of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the prio[...]

  • Seite 3

    Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can ra[...]

  • Seite 4

    Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with USB port on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with subs tantially similar physical dimensions, construction, and electrical[...]

  • Seite 5

    CONTENTS 1 INTRODUCT ION ............................................................................. 1 1.1 Features ................................................................................................................... ...... 2 1.2 Specifications ........................................................................................[...]

  • Seite 6

    1 1 Introduction Thank you for purchasing the 802.11 g Turbo Wirele ss LAN USB Adapter with Reverse SMA Conne ctor. This USB adapter is designed with a Reverse SM A connector to accommodate attachable antenna, providing user the flexibility to change with suitabl e an tenna in different environments. It also desig ned to comply with IEEE 802.11g Wi[...]

  • Seite 7

    2 1.1 Features • Works with both IEEE 802. 11b and IEEE 802.11g products. • High-speed transfer data rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports WMM (IEEE 802.11e QoS standard) function to meet the multi-media data bandwidth requirement. • Supports 64/1[...]

  • Seite 8

    3 1.3 Package Contents Before you begin the inst a llation, please check the ite ms of your p ackage. The p ackage shoul d include the following items: • One USB Adapter • One External Antenna • One USB 2.0 Extension Cable (100 cm) • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact yo[...]

  • Seite 9

    4 2 Installation Procedure Before you proceed with the inst all ation, please notice following descriptio ns. Note1: Please do not connect the network adapte r with your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures ar e similar for Windows 98SE/Me/2000/2003[...]

  • Seite 10

    5 C. In Windows XP , there is a “Windows Zero Configur ati on T ool” for you to setup the wireless adapter . Y ou can choose to configure the adapter through the Wind ows Zero Configuration T ool or the Ralink Configuration T ool for the adapter . It is recommended to choose the Ralink Configuration T ool since it provides more function. Click [...]

  • Seite 11

    6 NOTE: In Windows V ist a, the following window will appear wh en you insert network adapter into computer , please ignore it and wait. It will disappear af ter driver inst allation is complete. F. Please click “Finish” to complete the installation.[...]

  • Seite 12

    7 3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adapter and monitor the link status and the statis tics during the communi cation process. When the adapter is installed, t he configuration utility will be displayed automatically. This adapter will auto connect to wireless device[...]

  • Seite 13

    8 Second W ay A. Right-click the icon and select “V iew Available Wirel e ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable th e utility for the adapter .[...]

  • Seite 14

    9 Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link status and statistics from the configuration utility of the adapter. 3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations within the acce ssi[...]

  • Seite 15

    10 3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activ[...]

  • Seite 16

    11 3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the uni ntentional merging of two co-located WLANs. Y ou may specify a S[...]

  • Seite 17

    12 Parameter Description Network T ype Infrastructure – This operation mode re quire s the presence of an 802.1 1 Access Point. All communication is done via the Access Point or Router . Ad-Hoc – Select this mode if you want to conne ct to anothe r wireless st ations in the Wireless LAN network without throug h an Access Point or Router . TX Po[...]

  • Seite 18

    13 3.2.1.2 Authentication and Security Parameter Description Authentication T ype This setting has to be cons istent with the wirele ss networks that the adapter intends to connect. Open – No authentication is needed among the wi reless network. Shared – Only wireless de v ices using a shared key (WEP Key identified) are allowed to connecting e[...]

  • Seite 19

    14 Parameter Description WP A-PSK – It is a special mode de signed for home and sm all business users who do n ot have access to network authenticatio n servers. In this mode, known as Pre-S hared Key , the user manually enters the st arting pa sswo rd in their access point or gateway , as well as in each wirel ess st ation in the network. WP A-P[...]

  • Seite 20

    15 Parameter Description AES – AES has been developed to ensu re the highest degree of security and authenticity for digit al information and it is the most advanced solution defined by IEEE 802.1 1i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication. WP A P[...]

  • Seite 21

    16 The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are those pro vided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Po[...]

  • Seite 22

    17 3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a dapter has supporte d are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that t[...]

  • Seite 23

    18 3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentic ation type such as TLS, TTLS or PEAP is selected and requi re d a certification to tell the client what server credentials to accept from the authenticat ion serve r in order to verify the server , you have to enable this function. Certificate Iss[...]

  • Seite 24

    19 3.3 Link Status From the “Link Status” option, you can view all t he inf ormatio n of the network you are connect ing to. Parameter Description S tatus Display the SSID and MAC ID of the network the adapter is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the n[...]

  • Seite 25

    20 Parameter Description Noise Level Display the noise level in the wireless e nvironment. 3.4 Statistics This option enables you to view the statistic informat ion of the con nectio n including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure m[...]

  • Seite 26

    21 Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to set the adapter to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adapter can be compatible with both 802.1 1g and 802.1 1b wireless st ations. If there are only[...]

  • Seite 27

    22 Parameter Description Tx Rate There are several options inclu ding Auto/1/2/5.5/1 1/6/9/12/18/24/36/48/54Mbps for you to select. When the “Auto” is selected, the device will ch oose the most suitable transmissi on rate automatically . The higher dat a rate you designated in the network, the shorter dist ance is allowed betwe en the adapter a[...]

  • Seite 28

    23 Parameter Description LEAP T urn on CCKM During normal operatio n, LEAP-enabled client devices mutually authenticate with a new access p oint by perfo rming a complete LEAP authen tication, incl uding communication with the main RADIUS server . When you configure your wirel ess LAN for fast re-associatio n, however , LEAP-enabled client devic es[...]

  • Seite 29

    24 Parameter Description WMM Enable Check on this item and click “Apply ” to enable WMM function, and then further you can configure WMM Power Save and Dire ct Link Setup function. WMM – Power Save Enable Check on this item to enable WMM Power Save function. Click “Setting” to further configure WMM Power Save setting, which includes: AC_B[...]

  • Seite 30

    25 3.8 Turbo Mode This adapter supports spe cific ways to increa se t he data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the Routers or APs, this feature (known as Turb o Mode) enables higher throughput than IE EE 802.11g standard (Up to 54Mbps). When the adapter is conn ecting to the Routers o[...]

  • Seite 31

    26 Parameter Description Rescan Click this button to scan for WPS-enabled access p oin t (perform a site survey) Information Select a found WPS-e nabled access poi nt first, then click ‘Information’ button. Detailed informatio n about sele cted access point will be displayed in a popup window . Pin Code The WPS Pin Code of this network adapter [...]

  • Seite 32

    27 3.10 SoftAP This adapter can run as a wirel ess AP. The relative configurations of the AP including channel, SSID, MAC Address Filtering and so on are described a s follows. Right click the Ralink Conf iguration Utility icon on the system tray of Windows and select “Swit ch to AP Mode” to turn on SoftAP function. 3.10.1 Config The Config pag[...]

  • Seite 33

    28 Parameter Description Wireless Mode Selects the wireless m ode support s by the AP . 802.1 1 B/G Mixed – The AP works in 1 1b+g mixed mode. 802.1 1 B Only – The AP works in 1 1b mode. 802.1 1 G Only – The AP works in 1 1g mode. TX Rate There are several options inclu ding Auto/1/2/5.5/1 1/6/9/12/18/24/36/48/54Mbps for you to select. When t[...]

  • Seite 34

    29 Parameter Description B/G Protection If you have a mix of 802.1 1 b and 802.1 1g wireless clients in the network, it is recommended to enable th e protection mechanism. This mechanism can decre ase the rate of dat a collision between 802.1 1b and 802.1 1g wireless clients. When the protection mode is enabled, the throughput of the AP will be a l[...]

  • Seite 35

    30 Parameter Description Default Click to use with default value. Apply Click to apply the setting change. 3.10.1.1 Auth. Vs. Security This option enables you to configure the authenticat io n mode and encryption algorithm u sed within the AP. Parameter Description Authentication T ype There are four types of authentication mode supporte d. Open ?[...]

  • Seite 36

    31 Parameter Description Encryption T ype Not Use - Disable the encryption mode. WEP - Enabl e the WEP Dat a Encryption. When the item is selected, you have to continue setting the WEP Key . TKIP - TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p acket is a kin d of message transmitted over a network.) This[...]

  • Seite 37

    32 3.10.2 Access Control The Access Control page enables you t o configure the access cont rol policy used within the AP. Parameter Description Access Policy Disable – Disable the MAC Address filtering function. Allow All – Only the wireless adapters with the MAC Address listed in Access List can co nnect to the AP . Reject All – The wirel es[...]

  • Seite 38

    33 3.10.3 Mac Table The Mac Table page displ a ys the detail information of the wireless adapters connected to the AP. Parameter Description MAC Address The MAC Address of the wireless adap ters connected to the AP . AID The Association ID of current connection . Power Saving Mode The supporting st atus of Power Saving Mode of the wireless adapter [...]

  • Seite 39

    34 3.10.4 Event Log The Event Log page displays all the event time and message. You may clear the table by clicking “Clear”. 3.10.5 Statistics The Statistics page displays the statistic information of the AP including tran smit statistics and receive statistics. You may reset the count ers by clicki ng “Re set Counters”.[...]

  • Seite 40

    35 3.10.6 About The About page displays the basic information abo ut the Utility, including Driver, Utility and EEPROM Version. The MAC Address of the adapter is di splaye d in the screen as well.[...]

  • Seite 41

    36 4 Glossary This chapter provides solutions to pro blems us ually encountered during the inst allation and operatio n of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly becoming[...]

  • Seite 42

    37 6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi re d Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix met[...]

  • Seite 43

    38 13. What is Spread S pectrum ? S pread S pectrum technolo gy is a wideband radio frequen cy technique developed by the milit ary for use in reliable, secure, missi on-critical communication system s. It is designed to trade of f bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than [...]