MicroNet Technology SP907NL Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung MicroNet Technology SP907NL an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von MicroNet Technology SP907NL, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung MicroNet Technology SP907NL die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung MicroNet Technology SP907NL. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung MicroNet Technology SP907NL sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts MicroNet Technology SP907NL
- Den Namen des Produzenten und das Produktionsjahr des Geräts MicroNet Technology SP907NL
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts MicroNet Technology SP907NL
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von MicroNet Technology SP907NL zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von MicroNet Technology SP907NL und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service MicroNet Technology finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von MicroNet Technology SP907NL zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts MicroNet Technology SP907NL, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von MicroNet Technology SP907NL widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    User ’ s Manual 1 1n W ireless LAN USB Adapter Model No.: SP907NL http://www.micronet.info[...]

  • Seite 2

    Table of Contents Chapter 1 Introduction ................................................................................. 1 1.1 Package C ontents .......................................................................................... 1 1.2 Key Features .............................................................................................[...]

  • Seite 3

    4.6 Statistic s ...................................................................................................... 40 4.7 About ........................................................................................................... 41 Chapter 5 Troubleshooting ....................................................................... 43 Chapte[...]

  • Seite 4

    1 Chapter 1 Introduction Micronet SP907NL, 11N Wireless LAN USB Adapter, delivers next generation high speed at a more economical and affordable pr ice tag. It is easily implemented for medium-sized business to allow imm ediate access to high speed wireless experience. It is compliant with IEEE 802.11n and backward compatible with IEEE 802.11b/g. T[...]

  • Seite 5

    2 y WPS configuration for easier c onnection between adapter and AP/router. Enable connection via pushing a butt on or entering an 8-digit code. y Support the commonly available interface USB 2.0 to allow convenient installation. 1.3 Safety Information In order to keep the safety of users, please read through the following safety instructions: y Th[...]

  • Seite 6

    3 1.5 Specifications Standards IEEE802.11b/ 802.11g / 802.11n Interface USB 2.0/1.1 Frequency Band 2.4000 ~ 2.4835GHz Data Rate z 11b: 1/2/5.5/11Mbps z 11g: 6/9/12/24/36/48/54Mbps z 11n (20MHz): MCS0-7 (up to 72Mbps) z 11n (40MHz): MCS0-7 (up to 150Mbps) Output Power z 11n: 14dBm ± 1.5dBm z 11g: 14dBm ± 1.5dBm z 11b: 17dBm ± 1.5dBm Security z WE[...]

  • Seite 7

    4 Chapter 2 Tour of Product 2.1 USB Adapter 1. USB Connector: insert this side of the device into an available USB slot. 2. Connector Cab: for protecting device when not in use. 3. WPS button: located on the bottom side of the device for activating WPS pairing mode. 4. Link/Activity LED: indicate device is in use or traffic activity is evident. 2.1[...]

  • Seite 8

    5 Chapter 3 Configuration 3.1 Drivers Installation Step 1. Gently insert the USB adapter into an available USB slot. The following message will appear, please press <Cancel> . Step 2. Insert driver CD into the CD/DVD ROM drive of the computer, and execute ‘Setup.exe’ program in ‘Utility’ folder. Read through the License Agreement and [...]

  • Seite 9

    6 Step 3. It is recommended to select ‘Install driver and Ralink WALN Utility’ for first-time installation. Otherwise select second option to update existing drivers. Step 4. The following windows will appear, pleas e press on ‘Install’ to start the process.[...]

  • Seite 10

    7 Step 5. Click <Finish> to complete the driver installation process. 3.2 Operating Configuration Utility After installation is complete, wireless configuration utility will be shown as an icon at the lower-right corner of the windows desktop. Click on the icon using right mouse key and select <Launch Config Utilities>.[...]

  • Seite 11

    8 Step 1. Configuration utility will scan for available wireless access points automatically. Please select an access point to connect, and click <Connect> . If the AP you wish to connect is not in the list, please press <Rescan> to renew the interface. Some function includes more information, and can not be fitted in setup area. In thi[...]

  • Seite 12

    9 3.2.1 Scan for Other Wireless Devices There are two kinds of wireless connec tion mode: Infrastr ucture and Ad-Hoc. Infrastructure mode is used by wirel ess access points, which is able to establish wireless connection for you and other wireless/wired network clients. Ad-Hoc mode is also know as ‘point-to- point’ mode, and in this mode, wirel[...]

  • Seite 13

    10 y If the wireless device uses encryption, the user must know its encryption key in order to connect. Please launch utility and it will scan for wireless access points near by: Parameter Description SSID The SSID of the wireless access point or wirele ss d e vice selected by user will be displa yed here. When the SSID of access point or wireless [...]

  • Seite 14

    11 If users cannot see the access point, please click ‘Rescan’ button to scan for access point again, until t he one preferred is displayed on the interface. Users may have to click ‘Rescan’ for more than two times before the access point wish to connect appears. If user still cannot see the access point after clicking ‘Rescan’ for more[...]

  • Seite 15

    12 Step 1. Click the wireless access point or network device to connect, it will be highlighted, then click on ‘Connect’. If the access point selected does not use encryption, it will connect to this device within one minute. If the access poi nt selected uses encryption, please proceed to step 3. Step 2. If the wireless access point does not h[...]

  • Seite 16

    13 Step 4. Please ask the owner of the wirele ss access point for the security information, and input the correct key here and then click on ‘OK’. By checking ‘Show Password’ box, the encryption key inputted here will be display ed. Authentication type will be selected by t he access point automatically, pleas e do not change it. However, i[...]

  • Seite 17

    14 3.2.3 Add Access Point to Profile If users connect to some specific wireless access point frequently, they can add their information to the profile. Just lik e the telephone direct ory, the profile saves all information of access points, and user can recall them anytime. User can add an access point in the ‘Network’ t ab to profile, or input[...]

  • Seite 18

    15 Parameter Description Profile Name User can give this profile a name. Every profile need s a unique name. SSID Please input the SSID of this access point. If user selected a n access point from the list, and SSID is not hidden, it will be filled automatically. However, user can modify the SSID if necessary. Network Typ e Please select the networ[...]

  • Seite 19

    16 Parameter Description Authentication Select the authentication type of the wireless access point or wireless device in this field. When use rs are ad ding a profile from an existing access point or wireless device, authentication type will be selected automatically. Encryption Select the encryption type of the wireless access poin t or wireless [...]

  • Seite 20

    17 Parameter Description EAP Method Select ‘802.1x EAP method’ from dropdown menu. Please ask the administrator of the access point for the correc t EAP method. Tunnel Authentication Select 802.1x tunnel authentic ation type from dropdown menu. Please ask the administrator of the acce ss point for correct tunnel authentication met hod. Thi s pu[...]

  • Seite 21

    18 3.2.4 Using Windows Zero Configuration Windows XP and Vista has a built-in wirel ess network configuration utility, called ‘Windows Zero Configuration’ (WZC). Users can also use WZC to configure the wireles s network parameter. Step 1. Right-click on configurati on utility icon and select <Use Zero Configuration as Conf iguration utility&[...]

  • Seite 22

    19 Step 3. Click <Network Connections> . Step 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’. Step 5. All wireless access points within prox i[...]

  • Seite 23

    20 to the access point. Otherwise, users c an press refresh butt on to rescan access points. Select the access point if it’s shown, then click <Connect> . Step 6. If the wireless access point uses encryption, users will have to input the correct WEP passphrase or WPA pre-shar ed key. Ensure both the AP and PC is set with the same WEP passph[...]

  • Seite 24

    21 3.2.5 Profile Management If users need to connect to different wireless access points at different time, they can store the connection parameters (e ncryption, passphrase, security etc, etc.) as a profile for every access poin t. Click the ‘Profile’ menu and all profiles will be listed in ‘Profile Li st’. Users can select a pr ofile from[...]

  • Seite 25

    22 Add a Profile If users want to create new profile, click ‘Profile’ menu, then press ‘Add’ button. The interface will prompt the user to input detailed information of access point. Edit a Profile[...]

  • Seite 26

    23 If users have added a profile before, and th ey wish to change the content of the profile, they can use this function. Please select a profile from the list, and then click on ‘Edit’ button. The interface will provide contents of selected profile for editing. Click on ‘OK’ to save changes, or click ‘Cancel’ to discard changes. Delete[...]

  • Seite 27

    24 Activate a Profile When users want to connect to a specific wireless device in the profile list, they can select it and click ‘Activate’ button to establish connection.[...]

  • Seite 28

    25 When a profile is selected and cl ick on ‘Activate’ button, an icon will be displayed in front of the profile to show that the connection has failed. When the connection is successfully established, an icon will be displayed. 3.2.6 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users.[...]

  • Seite 29

    26 Enable CCX Enable Cisco Compatible eXtensi o ns. CCX is a wireless feature developed by Cisco used to imp rove the wi reless performance with CCX compatible wirel ess devices. Check this box if the users need to conne ct to CCX -compatible wireless devices. When CCX is en able d, the following setup items will become available: ¾ Turn on CCKM: [...]

  • Seite 30

    27 3.2.8 WMM Setting This wireless network card provides WM M (Wi-Fi Multimedia) function, which can improve the performance of certain network applications, like audio/video streaming, network telephony (VoIP), and others. When the users enable the WMM function of this network card, they ca n define the priority of different kinds of data to give [...]

  • Seite 31

    28 3.2.9 WPS Configuration Wi-Fi Protected Setup (WPS) is the la test wireless network technology, which makes wireless network setup become very simple. The user doesn’t have to configure the wireless access point and setup data encryption when devices support WPS. This wireless network card is compatible with WPS. To use this function, the wire[...]

  • Seite 32

    29 All access points with WPS function enabled will be displayed her e. Please make sure the access point users wish to connect is displayed. If not, please click ‘Rescan’ few more times. The user can also click ‘Information’ button to see the detailed information about selected access point. Step 3. Start PBC pairing procedure at access po[...]

  • Seite 33

    30 Users can click ‘PBC’ button few more times to try again. When an access point is connected, users can click ‘Disconnect’ to disconnect your wireless network card from a connected access point. Users can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. WPS Setup – PIN The PIN c[...]

  • Seite 34

    31 Parameter Description WPS associate IE Check this box to send the association reque st with WPS IE during WPS setup. WPS probe IE Check this box to send the WPS probe request with WPS IE during WPS setup. Auto When in PIN mode, wireless a c ce ss point to be connected will be selected automatically if this box is checked. 3.2.10 Radio On/Off Use[...]

  • Seite 35

    32 3.2.11 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless network card.[...]

  • Seite 36

    33 Chapter 4 Soft-AP Function Besides becoming a wireless client of other wireless access points, this wireless card can also act as a wireless service provider. Users can switch this wireless card’s operating mode to ‘AP’ to simulate the function of a real wireless access point by software and ev en sharing the internet connection. Please fo[...]

  • Seite 37

    34 If the computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’. If your computer does not have another network card with In ternet connection, please click ‘Not enable ICS’. After clicking on ‘Enable ICS’ or ‘Not enable ICS’, the user will see the ba[...]

  • Seite 38

    35 Parameter Description SSID Please input the SSID (the name used to identify this wireless access point) in this field. Up to 32 numeri cal characters can be accepted here excepting spa c e. Channel Please select the wireless cha nnel to use for the environment. The number of channels availabl e here will vary depending on the setting of ‘Count[...]

  • Seite 39

    36 Country Region Code Please select the country code of the co untry or regio n. Available options are 0-7, wh ich will affect the available wireless chan nels: 0: FCC (US, Canada, and other countrie s uses FCC radio communication stand ards) 1: ETSI (Europe) 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISERAL (Channel 3 to 9) 7: ISERAL (Channel 5[...]

  • Seite 40

    37 Parameter Description Authentication Type Please select a wireless authenticatio n type to use. Available options are ‘Open’, ‘Share d’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If users wa nt to disable wireless data encryption, please select ‘Ope n’. Encryption Ty pe Please select an encryption mode. The available [...]

  • Seite 41

    38 WEP Key Please input the WEP encryption key in this field when ‘WEP’ is selected. There are 2 types of WEP key: Hex (number 0 to 9, and ASCII characters A to F) and ASCII (all alphanumerical characters plus symbol s). Please sel ect the type of WEP key first, and then input the WEP key according to the type of WEP key select ed. If users wan[...]

  • Seite 42

    39 Parameter Description Access Policy Select the policy type of your access rule. ¾ Disable: Allow any wireless client with p rop er authentication settings to connect to this access poin t. ¾ Allow All: Only allow wire less client s with MAC address listed here to connect to this access point. ¾ Reject All: Reject wirele ss clients with MA C a[...]

  • Seite 43

    40 Parameter Description MAC Address Displays the MAC address of this wireless client. AID The serial number of this wireless connection. Power Saving Mode Displays the capability of pow er-saving function of this wireless client. Status Displays additional information of this wireless Conn ection, like current wireless operating mod e and data tra[...]

  • Seite 44

    41 4.7 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless access point.[...]

  • Seite 45

    42[...]

  • Seite 46

    43 Chapter 5 Troubleshooting If users encounter any problem when using th is wireless network card, consult this section for possible solutions. Before calli ng the dealer of purchase for help, please check this troubleshooting table, the solu tion towards the problem could be very simple. Scenario Solution I can’t find any wireless access point [...]

  • Seite 47

    44 Chapter 6 Glossary 1. What is the I EEE 802.11g standard? 802.11g is the new IEEE standard for hi gh-speed wireless LAN communications that provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LA N technology for the home, office and public networks. 802.11g defines the use of the same OF[...]

  • Seite 48

    45 z RTS/CTS Feature z Fragmentation z Power Management 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers with their own Wireless LAN Card connecting as an independent wire less LAN. Ad hoc wireless LAN is applicable at a departmental scale fo r a branch or SOHO operation. 5. What is Infrastructure? An integrated wireless[...]

  • Seite 49

    46 9. What is AES? AES (Advanced Encryption Standard), a ch ip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, while making more efficient use of har dware and/or software than previous encryption standards. It is also included in IEEE 802.11i standar d. Compare with AES, TKIP is[...]

  • Seite 50

    47 13. What is Spread Spectrum? Spread Spectrum technology is a wi deband radio frequency technique developed by the military for use in reliable, secu re, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more b andwidth is consumed than in the case of[...]

  • Seite 51

    48 16. What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devic es using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability. 17. What is STBC? STBC stands for Space-Time Block Coding, which [...]