Advantek Networks AWN-MIMO-54RA manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Advantek Networks AWN-MIMO-54RA. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Advantek Networks AWN-MIMO-54RA ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Advantek Networks AWN-MIMO-54RA décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Advantek Networks AWN-MIMO-54RA devrait contenir:
- informations sur les caractéristiques techniques du dispositif Advantek Networks AWN-MIMO-54RA
- nom du fabricant et année de fabrication Advantek Networks AWN-MIMO-54RA
- instructions d'utilisation, de réglage et d’entretien de l'équipement Advantek Networks AWN-MIMO-54RA
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Advantek Networks AWN-MIMO-54RA ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Advantek Networks AWN-MIMO-54RA et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Advantek Networks en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Advantek Networks AWN-MIMO-54RA, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Advantek Networks AWN-MIMO-54RA, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Advantek Networks AWN-MIMO-54RA. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    802.11g, 54Mbps MIMO PCI Wireless Adapter User’s Manual Model # AWN-MIMO-54RA[...]

  • Page 2

    1 FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to pr ovide reasonable protection against harmful in terference in a residential installation. This equ ipment generates, uses, and can radiate radio frequency energy and, if [...]

  • Page 3

    2 Revi sion Hist or y R e v i s i o n H i s t o r y V 1 . 1 S e c o n d r e l e a s e All brand and product names mentioned in this manual are trademarks and/ or registered trademarks of their respectiv e holders.[...]

  • Page 4

    3 Contents 1. Introduction ................................................... ......................... 4 1.1 Features .......................................................... ............... 4 1.2 LED Indicator ................................................... .............. 4 1.3 Hardware Diagram ...................... ......................[...]

  • Page 5

    4 1. Introduction This adapter is an IEEE 802.1 1g client device that delivers unrivaled wireless perf orm ance for y our d esk top P C or l apt op PC. With this adapter, you can easily upgrade your computer wireless connectivity. Once connected, access your high-speed Internet connection while sharing photos, files, music, video, printers, and sto[...]

  • Page 6

    5 1.3 Hardware Diagram [For Wireless PCI Adapter] [For Wireless CardBu s Adapter] 1.4 Package Contents • One Wireless PCI or Cardbus adapter • Three external antennas (for PCI adapter) • One CD includes driver and user’s manual 1.5 Before you start You must have the requiremen ts as follow, • A laptop computer / desktop PC w ith an availa[...]

  • Page 7

    6 2. Installation Procedure Note: If you have installed the Wireless Adapter LAN driver & utility before, please uninstall the old version first. 2.1 Install the Hardware [For Wireless CardBus Adapter] STE P1: To use the Wire less Car dbus Ad apter w ith a comp uting device, the Wireless Cardb us Adapter must be equipped w ith an internal or ex[...]

  • Page 8

    7 STE P3: Secure th is card to the rea r of the co mputer c hassis an d put ba ck the co ver. STE P4: Secure the antenna to antenna conne ctor of the card. Plea se refer to the illu stration belo w: STE P5: Turn on the computer. [Guidelines for the Hardware Installation] Please observe the following guideline s when you are installing the PCI card [...]

  • Page 9

    8 2.2 Install the Driver & Utili ty 2.2.1 For Windows XP/2000/ME/98SE Note: The fo llowing installat ion was operated under Windows XP. (Proce dures will be same for Windows 2000 / W indows ME / Windows 98SE) STE P1: Found Ne w Hardware Wizard is displayed after the adapter is installed and the computer is restarted. Please click Cancel to con [...]

  • Page 10

    9 STE P3: Please wait for a while during the Setup Wizard is preparing the setup. STE P4: Please read the follow i ng license agreement. Use the scroll b ar to view the re s t of this agreement. Click Yes to accept the ag reement.[...]

  • Page 11

    10 STE P5: In Window s X P, there is a Windo w s Zero Configuration Tool fo r you to setu p wireless adapter. You can choose to con figure the adapter through the Microsoft Zero Configuration Tool or the Ralink Configuration Tool . It is re commended to choose the Ralink Configuration Tool for the adapter. Click Next to continue. STE P6: If you nee[...]

  • Page 12

    11 STE P7: P lease wait for a while during the adapter is configuring your new software installation. STE P8: When the adapter is installed properly, the configuration utility will be displayed au toma tically .[...]

  • Page 13

    12 STE P9: Please restart your c omputer after the installation has finished. Choose Ye s , I w a n t t o restart my computer now and c lick Finish but ton. To check if the adapter is properly installed, you can right-click My Computer Æ choose Properties Æ click Device Ma nager .[...]

  • Page 14

    13 The Co nfiguration Utility appears as an icon on the system tray of Windows wh ile the adapter is running. You can open the utility by double-click on the icon. Right-click the icon , there are some items for you to operate the configuration utility , z Launch Config Utilities Æ Select this option to open the Configuration Utility tool. z Use Z[...]

  • Page 15

    14 Step 2: Insert Installation CD into CD-ROM drive then windows below will appear. Click Install Driver to begin device driver installation Step 3: Please wait for while during Wireless LAN Card is configuring your new software installation.[...]

  • Page 16

    15 Step 4: After Wireless N etwork Card has finished installing, click “ Finish ” to ex it the setup wiza rd. Step 5: To check if the adapter is properly installed, you can right-click My Computer Æ choose Properties Æ click Device Manager[...]

  • Page 17

    16 [To setup Wireless Network in Windows Vista Operation System] Step 1: Sta rt Î All Programs Î Control Panel Step 2: Choose “ Network and Sharing Center ”[...]

  • Page 18

    17 Step 3: Choose “ Connect to a network ” Step 4: From the list of available networks, choose one of networks which you want to conne ct.[...]

  • Page 19

    18 Step 5: And then, the network has been connected. Click Close to e xit the setup . Step 6: Final, your wireless network has connected.[...]

  • Page 20

    19 3. Wireless Network Configuration Utility The Configuration Utility is a powerful appl ication that helps you to configure the Wireless LAN adapter and monitor the link stat us and st atistics during the communication process. When the adap ter is installed, the co nfigurat ion utility will b e displayed automatically. This adapter will au to co[...]

  • Page 21

    20 STE P3: Uncheck “Use Windows to configure my wireless net w ork settings” to enable the utility for the adapter and then click OK to continue. Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link sta tus and statistics from the config uration utility of the adapter. 3.1 P rofil e[...]

  • Page 22

    21 3.2 Link Stat us In this section, you can immediately monitor the current connected link status, such as Link Speed, Throughput, Link Quality, Sig nal Strength, Noise Leve l …etc. Stat us: Display the SSID and MAC ID of the network that the adapter is connecting to. Extra Info: Display the lin k status.[...]

  • Page 23

    22 Channel: Display the number of the radio channel and the frequency used for the n etworking. Link Speed (Mbps): Display the transmission and reception rate of the network. The maximum transmission rate is 54 Mbps. Throughput (Kbits/sec): Disp lay the speed of data transmitted and received. Link Quality: This bar indicates the quality of the link[...]

  • Page 24

    23 Strength, Cha nnel, Encryption, Au thentication, an d Network Type. If yo u want to con nect to any networks on the list, double-click the item on the list, and the card wi ll automatically conn ect to the selec ted n etwo rk. Resc an But ton : Click this button to collect the SSID and Channel information of all the wireless de vices nearby . Co[...]

  • Page 25

    24 PSM (Power Sav i ng Mode) – Enable the adapter in the power saving mode when it is idle. Network Type: Infrastructure – This o perat ion mo de req uires the prese nce of a wirel ess Acces s Poi nt. All commu nicat ion i s don e via t he Acc ess Point or Rout er. Ad-Ho c – Select this mode if you want to connect to ano ther wireless station[...]

  • Page 26

    25 3.3.2 Authentication and Security Authentication Type: This setting has to be consistent with the wireless networks that the adapter intends to connect. Open: No authentication is needed among the w i reless devices. Shar ed: Only Wireless device using a shared key (WEP Key iden tified) is allowed to[...]

  • Page 27

    26 connecting each other. Setup the s ame key as the wireless d evice that the adapter intends to connect. LEAP: LEAP is a pre -EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this pro tocol, so it should be selected for server products are not a conc ern. When yo[...]

  • Page 28

    27 Encryption Mode: None – Disable the En cryption mode. WEP – Enabled the WEP Da ta Encryption. When the item is se lected, you have to continue setting the WEP Key Length & the key Index. TKIP – TKIP (Temporal Key Integrity Protocol ) changes the temporal key every 1000 0 packets (a packet is a kind of message transmitted over a network[...]

  • Page 29

    28 [An example for MD5 Authentication] Authentication Type: The EAP authentication protocols this adapter has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP and TTLS: PEAP and TTLS are similar and easier than TLS in that they specify a st and-alone auth[...]

  • Page 30

    29 requires that digital certificate s be exchanged in the authenticatio n phase. The server prese nts a ce rtif icat e to the cl ient. After v alida ting t he serv er’s certi fic ate, t he clien t presents a client certificate to the server for validation. MD5-Challenge: MD5-Challenge is the easiest EAP type. It requires the wireless station to [...]

  • Page 31

    30 Use Cer tif icat e Chai n: When the EAP authentication types such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept fro m the authentication ser v er in order to ve rify the server, you have to enabl e this function. Certificate Issuer: Choos e the s erver f rom th e list to issue [...]

  • Page 32

    31 3.5 Advanced In the “Adv anced” , you can configure more advanced settings, for example: wireless Mode, B/G Protection, Tx Ra te, Country Region Code…etc. Wireless Mode: 802. 11 B/ G mi x – If you have a mix of 802.11b & 802.11g wireless stations in your network, it is recommended to setting the card to this mode. This mode is also t[...]

  • Page 33

    32 be transmitted. Auto – Based on th e status of network and au tomatically disable/enable protection mode. On – Always enable the protection mode. Off – Alwa ys disable the protection mode. Tx Rate: There are se veral option s including Au to/1 /2/5.5/6/9/1 2/18/24/36/48/54Mbp s for you to select. When the “Auto” is selected, the de vic[...]

  • Page 34

    33 through the CCX-compliant clients on the non-serving channels when this parameter is enabled. Limit xxx milliseconds (0-2000): It limits the channel measurement time. The default value is 250 milliseconds. 3.6 Q oS The Qo S Page of RaConf ig. It inv olve s “WMM Enable” , “WMM – Power Save Enable” and DLS setup. 3.6.1 Configure to enab [...]

  • Page 35

    34 Step3: Change to “ Site Survey Page” . And add an AP that supports WMM features to a Profile. T he result w ill look like the be low figure in Profil e page.[...]

  • Page 36

    35 3.6.2 Enable WMM – Power Save Step1: Click “W MM – Powe r Save Enable ” . And Click “Setting…” button. Step2: After clicking “Setting…” button , show “Power Sav e Setting” dialog. Please select which ACs you want to enable. Then click “A pply” button . The setting of enabling WMM – Pow er Save is succe ssfully.[...]

  • Page 37

    36 3.6.3 Enable DLS (Direct Link Setup) Step1: Click “Direct Link Setup Enable” . And Click “Apply ” button Step2: Ch ange to “Site Survey Pag e” . And add an AP th at supports DLS features to a Profile. The result w ill look like the be low figure in Profile page .[...]

  • Page 38

    37 The Setting of DLS indicates a s follow : 1. Fill in the blanks of Dir ect Link with MAC Address of STA. The STA must conform to two condition s as follow: Step1: Connect w ith the same AP tha t support DLS feature s. Step2: Have to enab le DLS. 2. Timeout V alue repr esents that it disconnect automatically after some seconds. The value is integ[...]

  • Page 39

    38 3. Click “Apply” bu tton. The result will look like the below figure. Descr ibe “ DLS S tatu s” as fo llow : 1. As the up figure, after configuring DLS successfully, show MAC address of the opposite side and Timeout Value of setting in “D LS Status” . In “DLS Status” o f the opposite side, it shows MAC address of myself and Time [...]

  • Page 40

    39 Step 2: Double click. And the re sult w ill look like the b elow figure. 3. Disconne ct Direct Link Setu p as follow: Step 1: Select a d irect link ST A.[...]

  • Page 41

    40 Step 2: Click “Tea r Down” button. The res ult will look li ke the bel ow fi gure. 3.7 About In the “About” , you can click the hyperlink to connect the website for th e information of the wireless chipset vend or and review basic information about the Utility such as the RaConfig Version, Driver Version, EEPROM Ver sion, IP Address, Sub[...]

  • Page 42

    41 4. Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. Symptom: The LED is Off. Possible Reme dy: Make sure the Wireless adapter is inserted properly. Otherwise, please contact your vendor. 2. Symptom: The LED is always on not blinking. Possible Reme dy: Make su[...]

  • Page 43

    42 Possible Reme dy: Move the antennas of the a ccess point or wireless router into an L shape (one vertically, and one horizontally). Click on the Refre sh button on the Si te Survey screen. If the computer still does not see the Access Point, and then try to move your Access Point closer to the computer. Then click on the Refresh button again. If[...]

  • Page 44

    43 10. What does IEEE 802.11 feature support? The product supports the follow i ng IEEE 802.11 function s: -- CSMA/CA Plus Acknowledge Protocol -- Multi-Channel Roaming -- Automatic Rate Sele ction -- RTS/CTS Feature -- Fragmentation -- Power Management 11. What is Ad-Hoc? An Ad-Hoc integrated wireless LAN is a group of computers, each has a Wirele[...]

  • Page 45

    44 software than previous encryption standards. It is also included in IEEE 802 .11i standard. Compa re wit h AES, TKIP is a tempor ary p rotoc ol fo r repl acin g WEP s ecuri ty unti l manufacturers implement AES at the hardware level. 17. Would the information be intercepted while transmitting on air? WLAN features two-fold protection in security[...]