Edimax Technology Adaptor manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Edimax Technology Adaptor. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Edimax Technology Adaptor ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Edimax Technology Adaptor décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Edimax Technology Adaptor devrait contenir:
- informations sur les caractéristiques techniques du dispositif Edimax Technology Adaptor
- nom du fabricant et année de fabrication Edimax Technology Adaptor
- instructions d'utilisation, de réglage et d’entretien de l'équipement Edimax Technology Adaptor
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Edimax Technology Adaptor ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Edimax Technology Adaptor et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Edimax Technology en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Edimax Technology Adaptor, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Edimax Technology Adaptor, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Edimax Technology Adaptor. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    T T u u r r b b o o W W i i r r e e l l e e s s s s L L A A N N H H i i - - G G a a i i n n U U S S B B 2 2 . . 0 0 A A d d a a p p t t o o r r User Manual V ersion: 1.0 (November , 2005)[...]

  • Page 2

    COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No p art of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the pri[...]

  • Page 3

    Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limit s are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can r[...]

  • Page 4

    Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with PCMCIA slot on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electric[...]

  • Page 5

    CONTENTS 1 INTRODUCTION ............................................................................. 1 1.1 Features ......................................................................................................................... 2 1.2 Specifications ..........................................................................................[...]

  • Page 6

    1 Introduction Thank you for purchasing the 802.11g T urbo Wire less LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LA N standa rd and easy to carry with the Mini size. It is suitable for any Laptop or De skto p computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps).[...]

  • Page 7

    1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of s[...]

  • Page 8

    1.3 Package Contents Before you begin the inst a llation, please check the items of your p ackage. The package sh ould include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as pos sible. 3[...]

  • Page 9

    2 Installation Procedure Before you proceed with the install ation, please notice following descriptions. Note1: Please do not install the adaptor into your computer be fore ins talling the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server. ) N[...]

  • Page 10

    C. In Windows XP , there is a “Windows Zero Configur ation T ool” for you to setup the wireless adaptor . Y ou can choose to configure the adaptor through the Windows Ze ro Config uration T ool or the Ralink Configuration T ool for the adaptor . It is recommended to choose the Ralink Configurat ion T ool for the adaptor . Click “Next” to co[...]

  • Page 11

    E. The system start s to install the sof tware of the adaptor . Please follow the instructions of the program to plug in the adaptor into the USB port of your computer . And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation. 6[...]

  • Page 12

    3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adaptor and monitor the link status and the statis tics during the communi cation process. When the adaptor is installed, t he configuration utility will be displayed automatically. This adaptor will auto connect to wireless device w[...]

  • Page 13

    Second W ay A. Right-click the icon and select “V iew Available Wirele ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable the utility for the adaptor . Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link statu[...]

  • Page 14

    3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations withi n the acce ssible range of your adaptor and automati cally connect to the wireless device with the highest sign al strength. Fr om the “Site Survey”, a ll the networks nea rby will be listed. You ca[...]

  • Page 15

    3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles an d the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activat[...]

  • Page 16

    3.2.1 Con figure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Y ou may specify a SSID[...]

  • Page 17

    Parameter Description PSM (Power Saving Mode) The power saving func tion is only availab le whe n the network type is in Infrastructure. CAM (Const antly Awake Mode) – The adapto r will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network T ype Infrastructure – This operatio[...]

  • Page 18

    Parameter Description RTS Threshold Minimum packet size required for a n R TS (Request T o Send). For packet s smaller than this threshold, an R TS is not sent and the packet is transmitted direct ly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor chang e is recommended. Fragment Th reshold The value defines the m[...]

  • Page 19

    Parameter Description Authentication T ype LEAP – LEAP is a pre -EAP , Cisco-proprietary proto col, with many of the features of EAP protocol s. Cisco controls the ability of other vendors to implement this protocol, so it shoul d be selected for use only when limited vendor choice for client, access-point, and server products is not a co nce rn.[...]

  • Page 20

    Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p a cket is a kind of message transmitted over a networ[...]

  • Page 21

    The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are th ose prov ided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Poi [...]

  • Page 22

    3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a daptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are si milar and easier than TLS in that they[...]

  • Page 23

    Parameter Description T unneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected us er EAP Identity used for authentication. The identity specified may cont ai n up to 63 ASCII characters, is case sensitive and ta kes the form of a Networ[...]

  • Page 24

    Parameter Description Allow Intermediate Certificates A server desi gnates an issuer as a trusted root authority by placing the issuer's self-signed ce rtificate, which co ntains the issuer's public key, into the tr usted root certification authority certificate store of the host comp uter. Intermediate or sub ordi nate certification auth[...]

  • Page 25

    Parameter Description S tatus Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the networking. Link S peed (Mbps) Display the transmission and reception rate of the network. The maximum transmissi on rate is 54Mbp[...]

  • Page 26

    3.4 Statistics This option enables you to view the statistic informat ion of the con nection including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure mo re advan ced settings, for example: wireless mode, protection mode and etc. 21[...]

  • Page 27

    Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to s et the adaptor to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adaptor can be comp atible with both 802.1 1g and 802.1 1b wireless st ations. If there are only [...]

  • Page 28

    Parameter Description Enable TCP Window Size The TCP Window is the amount of dat a a sender can send on a particular connectio n before it get s an acknowledgment back from the receiver that it has gotten some of it. When the Ro uter or AP the adaptor is connecting to have s et up the TCP Window , you can enable the paramete r to meet the data size[...]

  • Page 29

    3.6 About By choosing this option, you can click the hyperlin k to connect the website for the information of the wireless chipset vendor an d review b asic informat ion about the Utility such as the Drive r, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.7 Turbo Mode This adaptor supports spe cific[...]

  • Page 30

    4 Troubleshooting This chapter provides solutions to pro bl ems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly beco[...]

  • Page 31

    6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi red Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix method [...]

  • Page 32

    13. What is Spread S pectrum ? S pread S pectrum technology is a wideb and ra dio frequency technique develop ed by the milit ary for use in reliable, secu re, missi on-critical communication systems. It is desig ned to trade off bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in[...]