AmbiCom WL250N-USB manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation AmbiCom WL250N-USB. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel AmbiCom WL250N-USB ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation AmbiCom WL250N-USB décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation AmbiCom WL250N-USB devrait contenir:
- informations sur les caractéristiques techniques du dispositif AmbiCom WL250N-USB
- nom du fabricant et année de fabrication AmbiCom WL250N-USB
- instructions d'utilisation, de réglage et d’entretien de l'équipement AmbiCom WL250N-USB
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage AmbiCom WL250N-USB ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles AmbiCom WL250N-USB et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service AmbiCom en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées AmbiCom WL250N-USB, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif AmbiCom WL250N-USB, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation AmbiCom WL250N-USB. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    AmbiCom WL250N-USB Wireless-N USB Adapter (This manual is useful for user installs w ith Ralink WIFI configuration option) User Manual Version 1.0 November 18, 2008 COPYRIGHT Copyright ©2008/2009 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system , or translat[...]

  • Page 2

    Federal Communication Commission Interference Statement FCC Part 15 This equipment has been tested and found to comply with t he limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses,[...]

  • Page 3

    CHAPTER I: PRODUCT INFORMATION 1-1 Introduction And Safety Information 1-2 Safety Information 1-3 System Requirements 1-4 Package Contents 1-5 Familiar With Your New Wireless Network Dongle CHAPTER II: DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Dongle Installation – With Ralink Configuration Tools 2-2 Connect To Wireless Access Point 2-2-1[...]

  • Page 4

    CHAPTER I: PRODUCT INFORMATION 1-1 Introduction And Safety Information Thank you for purchasing this high-speed 802.11b/g/n wireless network dongle! Except common wireless standards 802.11b/g, this wireless network dongle is also 802.11 Draft N v2.0 compatible - data receiving rate is up to 150Mbps, and that’s faster than 802.11g wi reless networ[...]

  • Page 5

    1-5 Familiar With Your New Wireless Network Dongle LED Name Light Status Description On/Flashing Linked to a wireless access point / Transferring data Link/ Activity Off No wireless activity / No Link CHAPTER II: DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Dongle Installation – With Ralink Configuration Tools Please follow the following ins[...]

  • Page 6

    3. You can choose the configuration tool used to configure the wireless network dongle here. ‘Ralink Configuration Tool’ provides fully access to all functions of this wireless network dongle, such as WPS configuration. Otherwise, please select ‘Microso ft Zero Configuration Tool’ then click ‘Next’. 4. Please wait while the install proc[...]

  • Page 7

    6. When you want to configure your wireless connection, please right click on this icon, and a popup menu will appear. You can click ‘Launch Config Utilit ies’ to start configuration program. Note: that if you stopped config utility by ‘Exit’ function, you’ll not be able to maintain the wireless link to the access point you wish to use. I[...]

  • Page 8

    2-2-1-1 Scan For Other Wireless Devices Configuration utility will scan for all wireless access poi nts automatically. Please c heck if the wireless access point with the SSID (the name of wireless a ccess point) you preferred is shown here. If the wireless access point you wish to connect does not show here, please click ‘R escan’ to try again[...]

  • Page 9

    If the wireless access point does not have SSID, you’ll be prompted to input it now. Please ask the owner of wireless access point for the exact SSID and input it here, then click ‘OK’ when ready. If the SSID you provided here is wrong, you’ll not be able to connect to this access point. If the wireless access point uses enc ryption, you wi[...]

  • Page 10

    2-2-1-3 Add An Access Point To Profile If you will connect to some specific wireless access point frequently, you can add their information to the profile. The profile saves all information of access points, and you can recall them anytime you wish to establish connection. You can add a found access point to profile, or input all information of an [...]

  • Page 11

    To set authentication / encryption in formation for the access point. Please click ‘Auth. Encry.’ tab: Here are descriptions of every setup item: Item Name Description Authentication Select the authenticat ion type of the wireless access point or wireless device you wish to connect. When you’re adding a profile from an existing access point[...]

  • Page 12

    To set 802.1x authentication for the access point. Please click ‘802.1X’ tab: Here are descriptions of every setup item: Item Name Description EAP Method Select 802.1x EAP method from dropdown menu. Please ask the administrator of the access point you wish to connect to select a correct EAP method. Tunnel Authentication Select 802.1x tunnel aut[...]

  • Page 13

    2-2-2 Using Windows Zero Configuration Windows XP and Vista has a built-in wireless network configuration utility, called as ‘Windows Zero Configuration’ (WZC). You can also use WZC to configure your wireless network parameter: Right-click Ralink configuration utility icon and select ‘Use Zero Configurat ion as Configuration utility’. Then [...]

  • Page 14

    2-3 Connection Profile Management If you need to connect to different wireless access points at different time, like of access point of your home, office, cybercafe, or public wireless service, y ou can store the connection parameters (encryption, passphrase, security etc, etc.) as a profile for every access point, so you don’t have to input thes[...]

  • Page 15

    2-3-1 Add A profile If you want to click new profile, click ‘Profile’ menu, then click ‘Add’ button. You’ll be prompted to input detailed information of access point, as described in Section 2-2-1-3. 2-3-2 Edit An Existing Profile If you have added a profile before, and you wish to c hange the content of the profile, you can use this func[...]

  • Page 16

    2-3-3 Delete An Existing Profile If you no longer need a profile, you can delete it. Select t he profile you wish to delete from the list, and click ‘Delete’ button to delete it. 2-3-4 Activate A Profile When you want to connect to a specific wireless device in the profile list, y ou can select it and click ‘Activate’ button, to establish c[...]

  • Page 17

    2-4 Advanced Settings This wireless network dongle provides several advanc ed settings for experienced wireless users. You can change these settings to increase data transfer performance, or change operation mode. Right-click the Ralink configuration utility icon located at lower-right co rner of computer desktop and then click ‘Launch Config Uti[...]

  • Page 18

    2-5 View Network Statistics The configuration utility provides in formation about network statistics and lin k status. If you want to know how your wireless network dongle works, you can use thes e functions to get detailed information about the wireless connection you’re using. Right-click the Ralink configuration utility icon located at lower-r[...]

  • Page 19

    WMM - Power Save Enable Check this box to enable WMM power sa ving mode to save energy, and let your computer’s battery live longer. You also have to select WMM power save modes here: AC_BE: Best Performance AC_BK: Worst Performance AC_VI: Video data has priority AC_VO: Voice data has priority Direct Link Setup Enable If you have another WMM-enab[...]

  • Page 20

    WPS-enabled wireless access point, then click ‘Connect’ to establish connection to selected access point, if there are more than one WPS-enabled access point found. You can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. If you want to delete a found access point from the list, select [...]

  • Page 21

    CHAPTER III: Soft-AP Function This wireless dongle can act as a wireless service provi der to others. You can switch this wireless dongle’s operating mode to ‘AP’ mode to simulate the function of a real wireless access point by software, and all other computers and wireless devices can connect to y our computer wirelessly, even share the inte[...]

  • Page 22

    Here are descriptions of every setup item: Item Name Description SSID Please input the SSID (the name used to ident ify this wireless access point) here. Up to 32 numerical characters can be a ccepted here, excepting space. Channel Please select the wireless channel you wi sh to use. The number of channels available here will vary depends on the se[...]

  • Page 23

    Item Name Description Authentication Type Please select a wireless authentication type y ou wish to use. Available options are ‘Open’, ‘Shared’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If you want to disable wireless data encrypti on, you must select ‘Open’. Encryption Type Please select an encryption mode. The availab[...]

  • Page 24

    Here are descriptions of every setup item: Item Name Description Access Policy Select the policy type of your access ru le. Disable: Allow any wireless client with proper authentication settings to connect to this a ccess point. Allow All: Only allow wireless clients with MAC address listed here to connect to this access point. Reject All: Reject w[...]

  • Page 25

    3-5 Event Log This software access point will log all wireless-related acti vities as a log. Click ‘E vent Log’ tab, and the event log will be displayed. You can click ‘Clear’ to remove all entries in the log.[...]

  • Page 26

    3-6 Statistics If you want to know detailed information about how your software access point works, click ‘Statistics’ tab, and the event log will be displayed. You can click ‘RESET COUNTERS’ button to reset all counters to zero. 3-7 About The ‘About’ tab provides you the information about version number of t he configuration utility, d[...]

  • Page 27

    4-2 Troubleshooting Scenario Solution I can’t find any wireless access point / wireless device in ‘Site Survey’ function. 1. Click ‘Rescan’ for few more times and see if you can find any wireless access point or wireless device. 2. Please move closer to any known wireless access point. 3. ‘Ad hoc’ function must be enabled fo r the wir[...]

  • Page 28

    What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard. What is TKIP? TKIP is a quick-fix method to quickly overcome [...]

  • Page 29

    What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devices using the same or near channel , and they are close enough, radio interference will occur and reduce the radio resource usability. What is STBC? STBC stands for Space-Time Block Coding, which is a techni[...]