SMC Networks SMCWPCI-N2 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation SMC Networks SMCWPCI-N2. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel SMC Networks SMCWPCI-N2 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation SMC Networks SMCWPCI-N2 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation SMC Networks SMCWPCI-N2 devrait contenir:
- informations sur les caractéristiques techniques du dispositif SMC Networks SMCWPCI-N2
- nom du fabricant et année de fabrication SMC Networks SMCWPCI-N2
- instructions d'utilisation, de réglage et d’entretien de l'équipement SMC Networks SMCWPCI-N2
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage SMC Networks SMCWPCI-N2 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles SMC Networks SMCWPCI-N2 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service SMC Networks en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées SMC Networks SMCWPCI-N2, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif SMC Networks SMCWPCI-N2, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation SMC Networks SMCWPCI-N2. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    EZ Connect™ N Pro Draft 11n Wireless PCI Adapter SMCWPCI-N2[...]

  • Page 2

    i LIMITED W ARRANTY Limited W arrant y S tatement: SMC Networks, Inc. (“SMC”) warrants it s products to be free from defects in workmanship and materials, under normal use and service , for the applica ble warranty term. All SMC products c arry a standard 90-day limited warrant y from the date of purchase from SMC or its Authorized Reseller . S[...]

  • Page 3

    ii LIMIT A TION OF LIABILITY : IN NO EVENT , WHETHER BASED IN CO NTRACT OR TO RT (INCLUDIN G NEGLIGENCE) , SHALL SM C BE LIABLE FOR IN CIDENT AL, CON SEQUENTIA L, INDIRECT , SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVE NUE, LOSS OF BU SINESS, OR OTHER F INANCIAL LOSS ARISING OUT OF OR IN CONNEC TION WITH THE SALE, INST ALLA TION, M[...]

  • Page 4

    iii Compliances Federal Communica tion Commission In terference St atement This equipment has b een tested and foun d to comply wi th the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to p rovide reasonable protection against harmful interf erence in a residential ins tallation. This equipment [...]

  • Page 5

    iv Compliances Europe – EU Declaration of Conformity This device complies with the essential requirem ents of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN60950-1:2001 A11:2004 Safety of Informat[...]

  • Page 6

    v Compliances Council recommendation 1999/519/EC of 12 July 1999, limitations of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz) Č esky [Czech] SMC Networks tímto prohlašuje, že tento Radio LAN device je ve shod ě se základními požadavky a dalšími p ř íslušnými ustanoveními sm ě rnice 1999/5/ES. Dansk [Dan[...]

  • Page 7

    vi Slovensky [Slovak] SMC Networks týmto vyhlasuje, že Radio LAN device sp ĺň a základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen[...]

  • Page 8

    5 Table of Contents Chapter 1 - Getting Started with the SMCWPCI-N2 6 C h a p t e r 2 - W i r e l e s s L A N N e t w o r k i n g 7 T r a n s m i s s i o n R a t e ( T r a n s f e r R a t e ) 7 T y p e o f W i r e l e s s N e t w o r k s 7 W i r e l e s s L A N S e c u r i t y 1 2 Chapter 3 - Hardware and Wireless Utility 13 About Your Draft 11n Wi[...]

  • Page 9

    6 Chapter 1 - Getting S t arted with the SMCWPCI-N2 Congratulations on purchasing the SMCWPCI-N2. This manual provides information for setting up and configuring the SMCWPCI-N2. This manual is intended for both home users and professionals. It is not required to read some of the more technical inform ation in this manual (such as in “Wireless LAN[...]

  • Page 10

    7 Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE BY AN AUTHORIZED ADMI NISTRA TOR. T ransmission Rate (T ransfer Rate) The SMCWPC[...]

  • Page 11

    8 communicate directly to each other . An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). T o set up an ad-hoc network, configure all the st ations in ad-hoc mode. Use the same SSID and channel for each station .[...]

  • Page 12

    9 When a number of wireless stations are connecte d using a single access p oint, you have a Basic Service Set (BSS).[...]

  • Page 13

    10 In the ESS diagram below , commu nication is done through the access point s, which relay data packet s to other wireless stations or devices connected to th e wired network. Wireless stations can then access resources, such as a printer , on the wired network.[...]

  • Page 14

    11 In an ESS en vironment, users are able to move fr om one access point to another wi thout losing t h e connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the SMCWPCI-N2 automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]

  • Page 15

    12 Wireless L AN Security Because wireless networks are not as secure as wire d networks, it’s vital that security settings are clearly understood and applied. The list below shows the possible wireless secu rity levels on your SMCWPCI-N2 starting with t he most secure. EAP (Extensible Authentication Protocol) is used for authentication and utili[...]

  • Page 16

    13 Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Draft 11n Wireless PCI Adapter With the Adapter, you can enjoy wireless mobility within almost any wirele ss networking environment. The following lists the main features: • IEEE802.11n draft v2.0 compliant •[...]

  • Page 17

    14 Hardware and Wireless Utility Installation Follow the instructions be low to install the PCI Ca rd and Wireless Utility. Do not insert the EZ Connect™ N Wirel ess PCI Adapter until instructed. 1. Put the EZ Installation & Document ation CD in to your CD-ROM drive. T he CD will auto run. If the CD does not auto run browse to y our CD drive [...]

  • Page 18

    15 4. T o install to the default folder location click [Next] . It is recommended to use the default folder location unless you are an advan ced user . T o change the installation folder click the [Browse] button and specify a new location. Click [Next] to continue . 5. The wizard is ready to begi n installation. Click [Install]. 6. A “Software I[...]

  • Page 19

    16 8. T urn off your compute r . 9. Insert the EZ Conne c t™ N Wireless PCI Adapter in to an available PCI slot. IMPORT ANT : For correct inst allation of new hardware please refer to your Computer use r manual. 10. Once the EZ Connect™ N Wireless PCI Adapter is inserted screw on the antenna s. 11. T urn On your computer . 12. The “Found New [...]

  • Page 20

    17 14. A “Hardware Inst allation” warning may appear , click [Continue Anyway]. 15. Click [Finish] to complete the Driver/Utility installation.[...]

  • Page 21

    18 Using the Utility to Configure Your Network The following are explanations on how to configure a nd use the Utility program. After completing the installation procedure, a new ico n as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer ov er the icon, and double click the left mouse button to open the Wire[...]

  • Page 22

    19 The following table describes the items found o n the Link Information screen. Wireless Network St atus Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile t ab. SSID Displays the wireless network name. Link St atus Shows whether the station is associated to the wireless network. Netw[...]

  • Page 23

    20 channel Channel Wid th 20MHz only or 40/20MHz channel support Security S tatus Security Shows the security type – Disable, WEP , WP A/WP A2, W AP-PSK/W AP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP S tatus IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway a[...]

  • Page 24

    21 Connecting to a different network Hold your mouse pointer ov er the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration p rofile exists for that network, the Profile Settings window opens to ask to create a p rofile for the network. Follow the proced[...]

  • Page 25

    22 Scan Available Networks Click the Browse button on the Profile Settings scr een to scan for available inf rastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Typ e field on the Profile Settings.[...]

  • Page 26

    23 Click Next to continue. To define the security mode, select the desi red se curity mode from the drop down list. And then click Next to continue. Please see following table for details of security mode s. WEP This card support three modes of WEP , inclu de: 64 Bit s 128 Bit s 152 Bit s Except 152-Bit ode, both 64-Bit & 128-Bit modes support [...]

  • Page 27

    24 Protocol) authenticates wireless LAN client s using only server -side digital certificates by creating an encr ypted SSL /TLS tunnel between the client an d the authentication server . T he tunnel then protects the subsequent us er authentication e xchange. PEAP (EAP-MSCHAP V2) ( Protected Extensible Authentication Protocol) T o use PEAP (EAP-MS[...]

  • Page 28

    25 Advanced Settings After Security Settings are finished, the Advanced Settings screen will be shown as following. SMC recommends usin g the default values. The following table describes the item s found on the Advanced Se ttings screen. Power Save Mode Shows the power save mode. Power m anagement is disabled in ad hoc mode. The options include: z[...]

  • Page 29

    26 After advance settings are finished, the following scre en is displayed as below. You can activate the profile now or later. WPS Wi-Fi Protected Setup (WPS) is based on pu sh-butto n or PIN (Personal Ident ification Number) entry authentication to provide strong WPA/WPA2 encryption key s to client dev ices. Users can push a button on the access [...]

  • Page 30

    27 4. After WPS detects security setti ng you will be prompted to save them to a new profile as shown below. Click Save to save settings 5. After clicking save the following will be displ a yed to confirm WPS is connected successfully. Note: If WPS fails, click the PBC bu tton few more times to try again.[...]

  • Page 31

    28 WPS Setup - PIN Configuration The WPS PIN (Personal Identification Number) setu p is optional to the WPS button setup. It is more secure than using the WPS button. All WPS-compatible devices h ave their own PIN number. 1. The PIN number of your Wireless Cardb us Adapter is an eight-digit number lo cated at the upper-right position of configurati[...]

  • Page 32

    29 Note: You may have to click PIN for few more times to try again. If you still cannot connect to an access point this way, please make sure the PIN co de you provided to acce ss point is correct. WPS Status Bar Description: 1. A successful PIN configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated to WPS AP[...]

  • Page 33

    30 Chapter 4 - Maintenance This chapter describes how to unins tall or upgrade th e Wireless Utility. Uninstall the Driver Follow the step s below to remove (or uninstall) the Card d river from your computer . Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click Sy stem Step 3. Under Hardware tab, cli ck De[...]

  • Page 34

    31 Glossary For unfamiliar terms used below , look for entries elsewhere in the glossary . A D -H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station ( access point). T wo or more wireless stations communicate dire ctly to each other . An ad-h[...]

  • Page 35

    SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire- less network. Wireless devices must have the same SSID to communicate with each other . T EMPORAL K EY I NTEGRITY P ROTOCOL (TKIP) T emporal Key Integrity Protocol (TKI P) uses 128-bit keys t hat are dyna mically generated and distributed by the authe[...]

  • Page 36

    SMCWBR11-G SMCWPCI-N2[...]