Zoom 4410B Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Zoom 4410B an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Zoom 4410B, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Zoom 4410B die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Zoom 4410B. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Zoom 4410B sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Zoom 4410B
- Den Namen des Produzenten und das Produktionsjahr des Geräts Zoom 4410B
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Zoom 4410B
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Zoom 4410B zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Zoom 4410B und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Zoom finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Zoom 4410B zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Zoom 4410B, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Zoom 4410B widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Wi r e l e s s- G USB Adapter USER GUIDE[...]

  • Seite 2

    Wireless-G USB Adapter 2[...]

  • Seite 3

    Contents 3 Contents Overview .................................................................. 4 1. Installation Instructions ...................................... 5 Installing and Connecti ng the Adapter .................... 6 The Adapter LED .................................................... 9 2. Setting S ecurity ............................[...]

  • Seite 4

    Wireless-G USB Adapter 4 Overview The chapters in this User Guide descri be how to: • Install the Zoom Wireless-G USB adapter on a Wind ows ® PC • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wirele ss-G USB configuration software Chapters 1 and 2 cover the basi cs – wha[...]

  • Seite 5

    Chapter 1: Installation Instructio ns 5 1 Installation Instructions This chapter provides sim ple instructions for installing the Wireless-G USB adapter on a Windows PC. If you ha ve already installed the adapter on a comput er (usi ng the separate Quick Start guide), you can ski p this chapter and begin with Chapter 2: Setting Security. What’s i[...]

  • Seite 6

    Installing and Connecting the Adapter Important! Install the software BEFORE you plug the Wireless- G USB adapter into your computer. 1 Insert the Wireless-G USB CD into the CD or DV D drive. The CD should start automati cally. Windows Vista: If the AutoPlay dialog box appears, click Run Setup.exe . If a message appears sayi ng An unidentified prog[...]

  • Seite 7

    Windows Vista: If a message tells you that Wind ows can't verify the publisher of the driver software, select Install this driver soft ware anyway . 5 At the prompt, click Finish and remove the CD. If the Zoom installation menu remains on scree n, click Exit . 6 Shut down the computer. 7 Plug in the USB Adapter and turn your computer back on. [...]

  • Seite 8

    2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless net works. 3 Highlight the network you want and cli ck Join . If the network you select has security configured, you must enable and configure securi ty on your computer before you can connect. See Chapter 2, Settin g Security . 4 If you join a wirele[...]

  • Seite 9

    Chapter 1: Installation Instructio ns 9 The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless net work. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.[...]

  • Seite 10

    2 Setting Security We strongly recommen d security, although you do not need to use it to get your wireless connection wo rking. Important! You must first enable secu rity on the the wireless access point. You then enable secu rity on the adapter using the same configuration that you used for the access poi nt. For example, if the wireless access p[...]

  • Seite 11

    This option requires you to enter an encryption key sh ared by the access point. • WEP ( W ired E quivalent P rivacy) Both the Open and Shared Authentication modes require WEP security. The most recent assessments of WEP advise choosing Open rathe r than Shared. If the devices in your network do not support WPA2-PSK or WPA-PSK, select Open with W[...]

  • Seite 12

    2 The Zoom Wireless-G USB configuration software open s to display the configuration paramete rs: 3 Make sure that the desired wirele ss network is displa yed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Net w ork Typ e is correct. There are two types of wireless networks: Infrastruct[...]

  • Seite 13

    Chapter 2: Setting Security 13 • In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings . 4 Select the Enable Security check box to open the Security Configuration window. For configuratio n instructions, consult this table: To configure Go to page WPA2-PSK 14 WPA-PSK 15 WEP 15 [...]

  • Seite 14

    WP A2-PSK (Pre-Shared Key) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2- PSK . 2 At Encryption Mode , accept the default: AES ( A dvanced E ncryption S tandard). 3 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a[...]

  • Seite 15

    WP A - PSK (Pre - Shared Key) If all of the wireless devices in your network DO NOT supp ort the recommended WPA2-PSK, select WPA-PSK. 1 In the Privacy Configuration window, click the Authentication Mode drop-down a rrow and select WPA- PSK . 2 At Encryption Mode , accept the default: TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the Pre-shared[...]

  • Seite 16

    That’s it! You have configured WPA-PSK security for your wireless connection, and you’re rea dy to use the Internet. WEP (W ired Equivalent Privacy) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select Open (recommend ed) or Shared : The USB Adapter automatically select s WEP as the Encryption Mode. [...]

  • Seite 17

    Chapter 2: Setting Security 17 • Hexadecimal digits if an access point, router, or some adapters are not Zoo m products b c d In the Key Length drop-down lis t, select 128 bits , 64 bits , or 256 bits . Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could di minish network performance. In the Key Index drop-d[...]

  • Seite 18

    6 Click the Close box to exit the configuration software. That’s it! You have configured W EP secu rity for your wi reless connection, and you’re ready to use the Internet. WP A2 Select WPA2 if: • you are linking to a corporat e network that use s a RADIUS ( R emote A uthentication D ial- I n U ser S ervice) authe ntication server • all of [...]

  • Seite 19

    1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2 . 2 At Encryption Mode , accept the default AES ( A dvanced E ncryption S tandard) 3 In the IEEE 802.1X Authentica tion area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentic[...]

  • Seite 20

    • TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication e xtensions: PAP ( P assword A uthentication P roto col) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s ve rsion of CHAP). MS-CHAPV2 (the default). • SIM ( S ubscriber I dentity M odule). A SIM card stores t he key[...]

  • Seite 21

    2 Accept the default Authentication Mode : TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With I EEE 802.1X authentication, each wireless device (client) sends a sig nal to the wireless access point, which in turn s[...]

  • Seite 22

    • PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handsh ake Authentication Protocol. GTC • TLS ( T ransport L ayer S e curity). There are no authentication extension options with TL[...]

  • Seite 23

    Certificate (WP A2 and WP A) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security o f the network. If you are linking to a corporate network that uses an authentication server and you have con figured WPA2 or[...]

  • Seite 24

    W iFi™ Protected Setup (WPS) If your access point supports W iFi P rotected S etup (WPS), this protocol can greatly simplify t he process of configuring WPA2- PSK or WPA-PSK security. To access WPS, on the Configuration tab, click the WPS button to open the WPS Config screen: 1 If you are like most users, you will want to join a wireless network [...]

  • Seite 25

    Chapter 2: Setting Security 25 a You can select the Push Button option if your access point has a hardware Secure Setup o r similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton. The acce ss point will begin accepting WPS connections. Now, [...]

  • Seite 26

    Wireless-G USB Adapter 26 Changing your Security Setting If the type of security on your wireless network cha nges, you need to modify your securit y settings. On the Configuration tab, click the Con figure Security button to select a different security option and enter the required information.[...]

  • Seite 27

    3 Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the si gnal stren gth of your network connection, scan available net works, and specify advanced settings. This chapter tells you whe n and how to use each of these options. Creating Profiles A profile is a collection of settings needed for a par[...]

  • Seite 28

    3 In the Configuration area, enter the following setting s: • SSID – Enter the network name. In the example above, the SSID is Home . • Network Ty pe – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop -down list, select the channel used by the other device(s) in the network. If you are setting up the first comput[...]

  • Seite 29

    • Enable Security – Select this check box to open the Security Configuration window. Note: If you are se tting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, cli ck OK to return to the Configuration tab. 4 In the Configuration area, click the Apply button to save the sett[...]

  • Seite 30

    Monitoring Link Status The Status area on the Configuration tab displays in formation about your wireless connection: • State : In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC addre ss used by computers in the network. • Current Ch[...]

  • Seite 31

    Using Site Survey and Re s ca n Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network nam es ( ESSIDs) so you can connect to a network • Identify the MAC add ress (BSSID) of your wireless access point or wireless router • Che ck the channel difference bet ween your network a nd oth[...]

  • Seite 32

    32 Wireless-G USB Adapter The information displayed on the Site Surv ey tab is as follows: • ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network. The ESSID is a code attached to[...]

  • Seite 33

    Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode : • Power Save Enabled : When you select this option, the Wireless-G USB adapter immediately signals the acce ss point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter. Note: The [...]

  • Seite 34

    Appendix A TCP/IP Settings By default, Windows is set for dynamic addre ssing (DHCP). Generally, this is the correct se tting for an Infrastructure network, but needs to be changed if you are usi ng an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the sectio[...]

  • Seite 35

    c In the Network Connec tions window, double-clic k the Wireless Network Connection option: d In the Wireless Net work Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings 35[...]

  • Seite 36

    e In the Wireless Net work Connection Properties dialog box, highlight the version of TCP/IP (Transmi ssion Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below. If you're not sure wh[...]

  • Seite 37

    c Enter 255.255.255.0 for Subnet ma sk . The Subnet mask should be the same for each comp uter in your ad hoc netw ork. d Enter 10.0.0.5 for De fault gateway and Preferred DNS server . (This is the IP address of the first computer that was set up in your ad hoc network.) T he Default Gateway and Preferred DNS server should be the same for each comp[...]

  • Seite 38

    38 Wireless-G USB Adapter c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure net work. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. a From the desktop, click the Start button, sele ct Control Panel , and then click Net work Co[...]

  • Seite 39

    Appendix A: TCP/IP Settings 39 Gateway and Preferred DNS server should be the same for each computer in your ad ho c network. e Click OK twice. That’s it! You have set static IP addressing for a Wi ndows XP computer in an ad hoc net work. 3 For Infrastructure Networks : To verify your DHCP settings, complete the following: a Ensure that Obtain an[...]

  • Seite 40

    40 Wireless-G USB Adapter 2 Complete the following steps to set stati c IP addressing: a In the Internet Protocol (TCP/IP) Properties dial og box, ensure that Obtain an IP address automatically is not selected. Then make sure the butto ns labeled Use the following IP address and Use the follo w ing DNS server addresses are selected. b If this is th[...]

  • Seite 41

    Appendix B: Troubleshooting 41 Appendix B Troubleshooting ¾ If your Zoom Wireless-G USB ad apter is not working properly, try these suggestions . • Make sure the adapter is secu rely connected to the computer, either dire ctly or through its USB extender cable. • Perform a power cycle – take the follo wing steps in the order given: 1. Turn o[...]

  • Seite 42

    42 Wireless-G USB Adapter as these settings for the other devices in your wirele ss network. 2 Then click the Security tab and check t he settings to make sure that the adapter is configured for the same security system as the other devices in your wireless net work. Make sure that your secu rity key is the same – remember that the keys are case-[...]

  • Seite 43

    Appendix C: Zoom Technical Support Services 43 Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenie nt, professional support responsive to our cu stomers’ needs and ca pabilities. If you find yourself unable to get your Zoom product to operate, and yo[...]

  • Seite 44

    44 Wireless-G USB Adapter World Wide Web Zoom’s Web page lets you send em ail for assistance, registe r on-line, access product re views and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Produ ct. To access Zoom’s Web page, please log onto your local Internet Se[...]

  • Seite 45

    Appendix C: Zoom Technical Support Services 45 Contact Zoom by Email You can email Zoom with any tech supp ort questions you might have and one of our Technical Supp ort Engineers will respond by email within 2 business days. You ma y request personal assistance via email at www.zoom.com/techmail . When emailing Zoom, be sure to include the followi[...]

  • Seite 46

    46 Wireless-G USB Adapter Return of Defective Units Please contact your local distributor or reselle r for Factory Authorized Repair or Replacem ent of your In-Warranty Defective Product . If you are unable to reach you r distributor, you can contact the Zoom Facto r y Customer Service by calling: US: (617) 753-00 23 UK: 0870 720 0090 Please note t[...]

  • Seite 47

    Appendix D: Regulato ry Information 47 Appendix D Regulatory Information U.S. FCC Part 15 Emissions Stateme nt This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protec tion against harmful interference in a residentia[...]

  • Seite 48

    48 Wireless-G USB Adapter Countries of Operation & C onditions of Use in the European Co mmunity This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must [...]

  • Seite 49

    Declaration of Conformit y Declaration of Conformity Overensstemmelseserklæring Déclaration de conformité Conformiteitsverklaring v an de EU Konformitätserklärung Δήλωση Συμμόρφωσης Dichiarazione di conformità Deklaracja zgodno ś ci Declaração de Conformidade Declaración de conformidad Konformitetsdeklaration Cam k ế t [...]

  • Seite 50

    0888-A 27478 ©2008 NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that [...]