TRENDnet Wireless N Gaming Adapter Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung TRENDnet Wireless N Gaming Adapter an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von TRENDnet Wireless N Gaming Adapter, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung TRENDnet Wireless N Gaming Adapter die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung TRENDnet Wireless N Gaming Adapter. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung TRENDnet Wireless N Gaming Adapter sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts TRENDnet Wireless N Gaming Adapter
- Den Namen des Produzenten und das Produktionsjahr des Geräts TRENDnet Wireless N Gaming Adapter
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts TRENDnet Wireless N Gaming Adapter
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von TRENDnet Wireless N Gaming Adapter zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von TRENDnet Wireless N Gaming Adapter und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service TRENDnet finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von TRENDnet Wireless N Gaming Adapter zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts TRENDnet Wireless N Gaming Adapter, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von TRENDnet Wireless N Gaming Adapter widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    - 1 -[...]

  • Seite 2

    S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FC C Rules. These limits are designed to provide reasonable protection against harmful interference in a re sidential installation. This equipment generates uses and can radiate radio frequency energy and, if not i[...]

  • Seite 3

    - 3 - firmware setting is not accessible by the end user . European Union Notice: Radio products with the CE marking comply wit h the R&TTE Dir ective (1999/5/EC), the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC ) issued by the Commission of the European Community. Compliance with these directives implies co nformity to [...]

  • Seite 4

    Table of Contents T able of Contents .............................................................................................................................. ........ 4  1.  Getting Started with the TEW - 647GA ................................................................................................ 6  1.1.  Package Content[...]

  • Seite 5

    C .............................................................................................................................. ............................. 42  D .............................................................................................................................. ............................. 42  E ................[...]

  • Seite 6

    1. Getting Started with the TEW-647GA Congratulations on purchasing the TEW -647GA! Th is manual provides information for setting up and configuring the TEW -647GA. This manual is intended for both home users and professionals. 1.1. Package Content s z TEW-647GA Wireless N Gaming Adapter z CD-ROM (User ’s Guide) z Multi-Language Quick Installatio[...]

  • Seite 7

    2. Introduction The TEW -647GA Wireless N Gaming Adapter is an high-performance, supports high-speed wireless networking at home, at wo rk or in public places. This bridge is also back comp atible with 802.1 1g or 1 1b devices. This means that you do not need to change your entire network to maintain connectivity . Y ou may sacrifice some of 1 1n?[...]

  • Seite 8

    3. Hardware Overview 3.1. LED Indications 8[...]

  • Seite 9

    3.2. Rear Panel 3.3 T op View 3.4 Bottom V iew 9[...]

  • Seite 10

    3.3 Inst allation Considerations The TEW-647GA Gaming Adapter allows you to access your network by using a wireles s connection from virtually any where within its oper ating range. Keep in mind that the number , thickness and location of walls, ceil ings, or other objects that the wireless signals must pass through, ma y limit the range. T ypical [...]

  • Seite 11

    3.4 Getting S t art 1. Insert Setup Wizard CD into your CD-ROM drive. 2. The Welcome screen appears on your monitor. Click Setup Wizard button. 3. Read the License Agreemen t, accept the terms and click Next to continue the installation. 11[...]

  • Seite 12

    4. Connect an Ethernet cable from the LAN port on your PC to the LAN port on the TEW-647GA, click Next to continue. 5. Plug in the power adapter and verify the Power & Ethernet LEDs are light. 12[...]

  • Seite 13

    6. The search window will detect the c onnected TEW -647GA on our pc and display information here. Click Configure to continue (default TEW -647GA IP Address is 192.168.10.1 10). 7. Enter the password for TEW-647GA the click Login . The default password is “blank”. 13[...]

  • Seite 14

    8. To change new password, please enter the new password below then click Change . Note: To continue without changing the password, please click on the Skip button 9. There are 2 options to configure this adapter, WPS (Wi-Fi Protected Setup) or Manual Setup. To setup with WPS method, continue to step 10 or to perform a Manual setup, please go to st[...]

  • Seite 15

    When selecting PBC method, once the Enable WPS is clicked, also press the WPS on your wireless router, t he devices would negotiate and connection automatically. When using the PIN Method , please enter the Device PIN num ber on your router and save it. Use Site Survey button to find the router you would like to connect then click Enable WPS , then[...]

  • Seite 16

    11. When the connection is made, it is recomme nded that you save or print your wireless settings with the Save or Print buttons. Click Apply to continue. 12. Disconnect the Ethernet cable from your PC to the destination game console. 16 13. Congratulations you hav e configured you TEW-647GA.[...]

  • Seite 17

    14. When using Manual Setup , you can select to receive an IP address dynamically from the router or to use an fix IP address that matches your network segment on TEW-647GA. Once you made the selection, click Next to continue. To use static IP, please make sure it matches your wireless network. Click Configure to continue. 17[...]

  • Seite 18

    15. Enter a SSID for TEW-647GA, click Next button. Note: Enter the SSID of the wireless router/a ccess point you would like to connect to. Select the wireless mode and the security m ode that your current wireless network is 18 using.[...]

  • Seite 19

    WEP Encryption 16. To use WEP security, select WEP and click Next button. Select 64-bit or 128-bit WEP key length, and enter your WEP key. For 64-bit encryption, enter 10 hexadecimal characters, For 128-bit encryption, enter 26 hexadecimal characters. Click Next to continue the setting. WPA-PSK/WPA2-PSK 17. To use WPA or WPA2 security, select WPA o[...]

  • Seite 20

    18. Confirm your new settings. It is recommended that you save or print your wireless settings with the Save or Print buttons. Once finished, click Apply to continue. 20 19. Disconnect the Ethernet cable from your PC to the destination game console.[...]

  • Seite 21

    20. Congratulations you hav e configured you TEW-647GA. 21[...]

  • Seite 22

    4. Using the Configuration Menu Whenever you want to configure your TEW - 647GA, you can access the Configuration Menu through your PC by opening the Web-browser and ty ping in the IP Address of the TEW - 647GA. The TEW -647GA ’ s default IP Address is http://192.168.10.1 10 ¾ Open the Web browser . ¾ T ype in the IP Address of the Bridge (http[...]

  • Seite 23

    4.1. Network 4.1.1 LAN Setting LAN Connection T ype Choose "S tatic IP (fixed IP)" if your router does not support DHCP or if for any other reason you need to assign a fixed address to the AP . In this case, you must also configure the following fields. IP Address The IP address of this gami ng adapter on the local area network. Assign an[...]

  • Seite 24

    4.2 Wireless 4.2.1 Profile Create a custom connection to a specific wirele ss network. Use this option to make custom profiles and store new profile for later use. Configure the setting to connect to a wireless net work, selection option for network type, SSID, and wireless security . The profile can be edited, deleted and made active from this opt[...]

  • Seite 25

    When adding an Profile, please make sure your information ma tches your existing wireless network. Security Mode Unless one of these encryption modes is selected, wireless transmission s to and from your wireless network can be easily intercepted and interpreted by unauthorized users. None No encryption. WEP (Open or Shared) 25 A method of encrypti[...]

  • Seite 26

    provided so you can enter a string that is easier to remember. The ASCII string is conv erted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Key Length Hex ASCII 64-bit 10 characters 5 characters 128-bit 26 characters 13 characters WPA-Personal or WPA2-[...]

  • Seite 27

    4.2.2 Site Survey Use the Site Survey tool to search for wireless networks around the TEW -647GA adapter . Click on the Scan button to search for wireless network to join. From this window , you can also add the selected network to your profile by clicking the Add Profile button. T o connect to the desire wireless network, click on the Connect butt[...]

  • Seite 28

    4.2.3 S t atistics V iew the current operating st atus of the TEW -647GA, see the T ransmit and Receive data. 28[...]

  • Seite 29

    4.2.4 Advance Use this setting to adjust the wireless environment. Wireless Modes 2.4GHz 802.1 1b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wirele ss g client to connect a nd access the TEW -647GA at 1 1Mbps for wireless b, at 54Mbps for wirele ss g and share access at the same time. Al[...]

  • Seite 30

    2.4GHz 802.1 1 n only – This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless n client devices to connect and access the TEW -647GA. Although the wireless n operates in the 2.4GHz frequency , this mode will only permit wireless n client devices to work and will exclude any other wireless mode and devices t[...]

  • Seite 31

    Using “Auto” option can increase throughput. Howe ver, it can also increa se error rate in some installations, due to increased sensit i vity to radio-frequency reflections . Select the option that works best for your installation. MCS Fix MCS rate for HT rate. (Auto, 0~32) The Modulation and Coding Scheme (MCS) is a value that determines the m[...]

  • Seite 32

    WMM Power Saving An option that allows wireless clients such as notebooks or Laptop s to save battery life by sending less transmission during idle times. Add a check mark to enable this option. PS Mode Used for specific application when using W MM Power Saving mode is enabled, use this feature to help with Quality of Service (Q oS) settings; these[...]

  • Seite 33

    4.2.6 WPS Y ou can setup security easily by choosing PIN or PBC method to do Wi -Fi Protected Setup. PIN Start or PBC Start Enable the WPS feature. 33[...]

  • Seite 34

    PIN Settings A PIN is a unique number that can be used to ad d to the rout er and use t hat as an au thentication key to join the existing wireless network. Client PIN Shows the current value of the adapter. Renew PIN Create a random number that is a valid PIN. This becomes the adapter’s PIN. You can then copy this PIN to the wireless router’s [...]

  • Seite 35

    4.2 Administrator 4.2.1 Management At this page, you can configure ad ministrator account and password. 35[...]

  • Seite 36

    4.2.2 Upload Firmware By assigning firmware location, you can upload firmware at this page. Once you have a firmware saved on your computer , use this option to browse for the file and then click Apply to upload the file into the adapter . 36[...]

  • Seite 37

    4.2.3 Setting Management Y ou can save system settings by exporting them to a configuration file, restore them by importing the file, or reset them to factory default. 37[...]

  • Seite 38

    Export Settings This option allows you to export and then save t he router's configuration to a file on your computer . Be sure to save the configur ation before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Default s This option restores all configuration[...]

  • Seite 39

    4.2.4 Stat u s Y ou can check system information and network configurations on this page. 39[...]

  • Seite 40

    Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP. Used to map MAC addre sses to IP add[...]

  • Seite 41

    To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA. An IP address that that a Windows computer will assign itself when it is configured to obtain an IP addre ss automatically but no DHCP se rver is available on the network B Backward Compa[...]

  • Seite 42

    C CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that reques ts data from a server Collision When do two devices on the same Ethernet net work try and transmit data at the exact same time. Cookie Information that is stored on the hard drive of your computer that holds your preferences to the site that [...]

  • Seite 43

    A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate: An electronic method of providing credentials [...]

  • Seite 44

    The most widely used technology for Local Area Networks. F File server A computer on a network that stores data so that the other comput ers on the network can all access it File sharing Allowing data from computer s on a network to be access ed by other computers on the network with different levels of access rights Firewall A device that protects[...]

  • Seite 45

    GUI Graphical user interface H Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being tr ansmitted from one AP to another Host Computer on a network HTTP Hypertext Transfer [...]

  • Seite 46

    IIS Internet Information Server is a WEB serv er and FTP server provided by Microsoft Infrastructure In terms of a wireless network, this is w hen wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP /IP to allow for resources to be accessed from computers around the world Internet[...]

  • Seite 47

    IPX Internetwork Packet Exchange is a network ing protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create pr ograms and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it [...]

  • Seite 48

    L2TP Layer 2 Tunneling Protocol M MAC address A unique hardware ID assigned to every Et hernet adapter by the manufacturer. Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connecti on to a straight-through cable MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB[...]

  • Seite 49

    NAT Network Address Translation allows many private IP addresses to connect to the Internet, or another network , through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communica tion protocol. This is an updated version of NetBIOS NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP add[...]

  • Seite 50

    Open Systems Interconnection is the refer ence model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing tabl e are sent to all the other APs in the network as opposed to sending the entire routing tabl[...]

  • Seite 51

    PPPoE Point-to-Point Protocol over Ethernet is us ed to connect multiple co mputers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Au[...]

  • Seite 52

    RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication betwe en computers and other related devices RSA Algorithm used for encrypt ion and authentication S Server A computer on a network that provides servic es and resources to other computers on the network Session key An encryption and decryptio[...]

  • Seite 53

    Small Office/Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that m onitors outgoing and incoming traffi c to make sure that only valid responses to o[...]

  • Seite 54

    Throughput The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between y ou computer and specific destination U UDP User Datagram Protocol Unicast Communication between a singl e sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and c onfi[...]

  • Seite 55

    VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN VoIP Voice over IP W Wake on LAN Allows you to power up a computer though it's Network Interface Card WAN Wide Area Network WCN Windows Conne[...]

  • Seite 56

    Wi-Fi Protected Access An updated version of security for wireless ne tworks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connect ed to, which may be the Internet itself, or a regional or corporate network Wireless ISP A company that provides a broadband Inter net connection over a wireles[...]

  • Seite 57

    Specifications Ha rdwa re  Standards  IEEE  802.11b,  IEEE  802.11g  and  IEEE  802.11n  (dr aft  2.0)  LED  Indicator  WPS,  WLAN,  LAN ,  Po w er  Powe r  Consumption  Standby  mode:  160mA  (max)  ;  Tra n s m i t  mode  :  210mA  (max)  Supported  OS ?[...]

  • Seite 58

    Limited Warranty TRENDnet  war rants  its  products  ag ainst  def ects  in  material  and  workmanship,  under  normal  use  and  service,  for  the  fo llowing  lengths  of  time  from  the  da te  of  purchase.    TEW ‐ 647GA  –  3 [...]

  • Seite 59

     W ARRANTIES  EX CLUSIVE :  IF  THE  TRENDNET  PRODUCT  DOES  NO T  OPE RA TE  AS  W ARRANTED  ABOVE,  THE  CUST OMER’S  SOLE  REMED Y  SHALL  BE,  AT  TRENDNET ’S  OPTION,  REP AIR  OR  REPL ACE.  THE  FOREG OIN G  W ARRANTIES  AND  REMEDIES  ARE  EX C[...]

  • Seite 60

    60[...]