Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Advantek Networks AWN-MIMO-54RA manuale d’uso - BKManuals

Advantek Networks AWN-MIMO-54RA manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Advantek Networks AWN-MIMO-54RA. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Advantek Networks AWN-MIMO-54RA o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Advantek Networks AWN-MIMO-54RA descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Advantek Networks AWN-MIMO-54RA dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Advantek Networks AWN-MIMO-54RA
- nome del fabbricante e anno di fabbricazione Advantek Networks AWN-MIMO-54RA
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Advantek Networks AWN-MIMO-54RA
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Advantek Networks AWN-MIMO-54RA non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Advantek Networks AWN-MIMO-54RA e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Advantek Networks in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Advantek Networks AWN-MIMO-54RA, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Advantek Networks AWN-MIMO-54RA, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Advantek Networks AWN-MIMO-54RA. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    802.11g, 54Mbps MIMO PCI Wireless Adapter User’s Manual Model # AWN-MIMO-54RA[...]

  • Pagina 2

    1 FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to pr ovide reasonable protection against harmful in terference in a residential installation. This equ ipment generates, uses, and can radiate radio frequency energy and, if [...]

  • Pagina 3

    2 Revi sion Hist or y R e v i s i o n H i s t o r y V 1 . 1 S e c o n d r e l e a s e All brand and product names mentioned in this manual are trademarks and/ or registered trademarks of their respectiv e holders.[...]

  • Pagina 4

    3 Contents 1. Introduction ................................................... ......................... 4 1.1 Features .......................................................... ............... 4 1.2 LED Indicator ................................................... .............. 4 1.3 Hardware Diagram ...................... ......................[...]

  • Pagina 5

    4 1. Introduction This adapter is an IEEE 802.1 1g client device that delivers unrivaled wireless perf orm ance for y our d esk top P C or l apt op PC. With this adapter, you can easily upgrade your computer wireless connectivity. Once connected, access your high-speed Internet connection while sharing photos, files, music, video, printers, and sto[...]

  • Pagina 6

    5 1.3 Hardware Diagram [For Wireless PCI Adapter] [For Wireless CardBu s Adapter] 1.4 Package Contents • One Wireless PCI or Cardbus adapter • Three external antennas (for PCI adapter) • One CD includes driver and user’s manual 1.5 Before you start You must have the requiremen ts as follow, • A laptop computer / desktop PC w ith an availa[...]

  • Pagina 7

    6 2. Installation Procedure Note: If you have installed the Wireless Adapter LAN driver & utility before, please uninstall the old version first. 2.1 Install the Hardware [For Wireless CardBus Adapter] STE P1: To use the Wire less Car dbus Ad apter w ith a comp uting device, the Wireless Cardb us Adapter must be equipped w ith an internal or ex[...]

  • Pagina 8

    7 STE P3: Secure th is card to the rea r of the co mputer c hassis an d put ba ck the co ver. STE P4: Secure the antenna to antenna conne ctor of the card. Plea se refer to the illu stration belo w: STE P5: Turn on the computer. [Guidelines for the Hardware Installation] Please observe the following guideline s when you are installing the PCI card [...]

  • Pagina 9

    8 2.2 Install the Driver & Utili ty 2.2.1 For Windows XP/2000/ME/98SE Note: The fo llowing installat ion was operated under Windows XP. (Proce dures will be same for Windows 2000 / W indows ME / Windows 98SE) STE P1: Found Ne w Hardware Wizard is displayed after the adapter is installed and the computer is restarted. Please click Cancel to con [...]

  • Pagina 10

    9 STE P3: Please wait for a while during the Setup Wizard is preparing the setup. STE P4: Please read the follow i ng license agreement. Use the scroll b ar to view the re s t of this agreement. Click Yes to accept the ag reement.[...]

  • Pagina 11

    10 STE P5: In Window s X P, there is a Windo w s Zero Configuration Tool fo r you to setu p wireless adapter. You can choose to con figure the adapter through the Microsoft Zero Configuration Tool or the Ralink Configuration Tool . It is re commended to choose the Ralink Configuration Tool for the adapter. Click Next to continue. STE P6: If you nee[...]

  • Pagina 12

    11 STE P7: P lease wait for a while during the adapter is configuring your new software installation. STE P8: When the adapter is installed properly, the configuration utility will be displayed au toma tically .[...]

  • Pagina 13

    12 STE P9: Please restart your c omputer after the installation has finished. Choose Ye s , I w a n t t o restart my computer now and c lick Finish but ton. To check if the adapter is properly installed, you can right-click My Computer Æ choose Properties Æ click Device Ma nager .[...]

  • Pagina 14

    13 The Co nfiguration Utility appears as an icon on the system tray of Windows wh ile the adapter is running. You can open the utility by double-click on the icon. Right-click the icon , there are some items for you to operate the configuration utility , z Launch Config Utilities Æ Select this option to open the Configuration Utility tool. z Use Z[...]

  • Pagina 15

    14 Step 2: Insert Installation CD into CD-ROM drive then windows below will appear. Click Install Driver to begin device driver installation Step 3: Please wait for while during Wireless LAN Card is configuring your new software installation.[...]

  • Pagina 16

    15 Step 4: After Wireless N etwork Card has finished installing, click “ Finish ” to ex it the setup wiza rd. Step 5: To check if the adapter is properly installed, you can right-click My Computer Æ choose Properties Æ click Device Manager[...]

  • Pagina 17

    16 [To setup Wireless Network in Windows Vista Operation System] Step 1: Sta rt Î All Programs Î Control Panel Step 2: Choose “ Network and Sharing Center ”[...]

  • Pagina 18

    17 Step 3: Choose “ Connect to a network ” Step 4: From the list of available networks, choose one of networks which you want to conne ct.[...]

  • Pagina 19

    18 Step 5: And then, the network has been connected. Click Close to e xit the setup . Step 6: Final, your wireless network has connected.[...]

  • Pagina 20

    19 3. Wireless Network Configuration Utility The Configuration Utility is a powerful appl ication that helps you to configure the Wireless LAN adapter and monitor the link stat us and st atistics during the communication process. When the adap ter is installed, the co nfigurat ion utility will b e displayed automatically. This adapter will au to co[...]

  • Pagina 21

    20 STE P3: Uncheck “Use Windows to configure my wireless net w ork settings” to enable the utility for the adapter and then click OK to continue. Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or check the link sta tus and statistics from the config uration utility of the adapter. 3.1 P rofil e[...]

  • Pagina 22

    21 3.2 Link Stat us In this section, you can immediately monitor the current connected link status, such as Link Speed, Throughput, Link Quality, Sig nal Strength, Noise Leve l …etc. Stat us: Display the SSID and MAC ID of the network that the adapter is connecting to. Extra Info: Display the lin k status.[...]

  • Pagina 23

    22 Channel: Display the number of the radio channel and the frequency used for the n etworking. Link Speed (Mbps): Display the transmission and reception rate of the network. The maximum transmission rate is 54 Mbps. Throughput (Kbits/sec): Disp lay the speed of data transmitted and received. Link Quality: This bar indicates the quality of the link[...]

  • Pagina 24

    23 Strength, Cha nnel, Encryption, Au thentication, an d Network Type. If yo u want to con nect to any networks on the list, double-click the item on the list, and the card wi ll automatically conn ect to the selec ted n etwo rk. Resc an But ton : Click this button to collect the SSID and Channel information of all the wireless de vices nearby . Co[...]

  • Pagina 25

    24 PSM (Power Sav i ng Mode) – Enable the adapter in the power saving mode when it is idle. Network Type: Infrastructure – This o perat ion mo de req uires the prese nce of a wirel ess Acces s Poi nt. All commu nicat ion i s don e via t he Acc ess Point or Rout er. Ad-Ho c – Select this mode if you want to connect to ano ther wireless station[...]

  • Pagina 26

    25 3.3.2 Authentication and Security Authentication Type: This setting has to be consistent with the wireless networks that the adapter intends to connect. Open: No authentication is needed among the w i reless devices. Shar ed: Only Wireless device using a shared key (WEP Key iden tified) is allowed to[...]

  • Pagina 27

    26 connecting each other. Setup the s ame key as the wireless d evice that the adapter intends to connect. LEAP: LEAP is a pre -EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this pro tocol, so it should be selected for server products are not a conc ern. When yo[...]

  • Pagina 28

    27 Encryption Mode: None – Disable the En cryption mode. WEP – Enabled the WEP Da ta Encryption. When the item is se lected, you have to continue setting the WEP Key Length & the key Index. TKIP – TKIP (Temporal Key Integrity Protocol ) changes the temporal key every 1000 0 packets (a packet is a kind of message transmitted over a network[...]

  • Pagina 29

    28 [An example for MD5 Authentication] Authentication Type: The EAP authentication protocols this adapter has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adapter intends to connect. PEAP and TTLS: PEAP and TTLS are similar and easier than TLS in that they specify a st and-alone auth[...]

  • Pagina 30

    29 requires that digital certificate s be exchanged in the authenticatio n phase. The server prese nts a ce rtif icat e to the cl ient. After v alida ting t he serv er’s certi fic ate, t he clien t presents a client certificate to the server for validation. MD5-Challenge: MD5-Challenge is the easiest EAP type. It requires the wireless station to [...]

  • Pagina 31

    30 Use Cer tif icat e Chai n: When the EAP authentication types such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept fro m the authentication ser v er in order to ve rify the server, you have to enabl e this function. Certificate Issuer: Choos e the s erver f rom th e list to issue [...]

  • Pagina 32

    31 3.5 Advanced In the “Adv anced” , you can configure more advanced settings, for example: wireless Mode, B/G Protection, Tx Ra te, Country Region Code…etc. Wireless Mode: 802. 11 B/ G mi x – If you have a mix of 802.11b & 802.11g wireless stations in your network, it is recommended to setting the card to this mode. This mode is also t[...]

  • Pagina 33

    32 be transmitted. Auto – Based on th e status of network and au tomatically disable/enable protection mode. On – Always enable the protection mode. Off – Alwa ys disable the protection mode. Tx Rate: There are se veral option s including Au to/1 /2/5.5/6/9/1 2/18/24/36/48/54Mbp s for you to select. When the “Auto” is selected, the de vic[...]

  • Pagina 34

    33 through the CCX-compliant clients on the non-serving channels when this parameter is enabled. Limit xxx milliseconds (0-2000): It limits the channel measurement time. The default value is 250 milliseconds. 3.6 Q oS The Qo S Page of RaConf ig. It inv olve s “WMM Enable” , “WMM – Power Save Enable” and DLS setup. 3.6.1 Configure to enab [...]

  • Pagina 35

    34 Step3: Change to “ Site Survey Page” . And add an AP that supports WMM features to a Profile. T he result w ill look like the be low figure in Profil e page.[...]

  • Pagina 36

    35 3.6.2 Enable WMM – Power Save Step1: Click “W MM – Powe r Save Enable ” . And Click “Setting…” button. Step2: After clicking “Setting…” button , show “Power Sav e Setting” dialog. Please select which ACs you want to enable. Then click “A pply” button . The setting of enabling WMM – Pow er Save is succe ssfully.[...]

  • Pagina 37

    36 3.6.3 Enable DLS (Direct Link Setup) Step1: Click “Direct Link Setup Enable” . And Click “Apply ” button Step2: Ch ange to “Site Survey Pag e” . And add an AP th at supports DLS features to a Profile. The result w ill look like the be low figure in Profile page .[...]

  • Pagina 38

    37 The Setting of DLS indicates a s follow : 1. Fill in the blanks of Dir ect Link with MAC Address of STA. The STA must conform to two condition s as follow: Step1: Connect w ith the same AP tha t support DLS feature s. Step2: Have to enab le DLS. 2. Timeout V alue repr esents that it disconnect automatically after some seconds. The value is integ[...]

  • Pagina 39

    38 3. Click “Apply” bu tton. The result will look like the below figure. Descr ibe “ DLS S tatu s” as fo llow : 1. As the up figure, after configuring DLS successfully, show MAC address of the opposite side and Timeout Value of setting in “D LS Status” . In “DLS Status” o f the opposite side, it shows MAC address of myself and Time [...]

  • Pagina 40

    39 Step 2: Double click. And the re sult w ill look like the b elow figure. 3. Disconne ct Direct Link Setu p as follow: Step 1: Select a d irect link ST A.[...]

  • Pagina 41

    40 Step 2: Click “Tea r Down” button. The res ult will look li ke the bel ow fi gure. 3.7 About In the “About” , you can click the hyperlink to connect the website for th e information of the wireless chipset vend or and review basic information about the Utility such as the RaConfig Version, Driver Version, EEPROM Ver sion, IP Address, Sub[...]

  • Pagina 42

    41 4. Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. Symptom: The LED is Off. Possible Reme dy: Make sure the Wireless adapter is inserted properly. Otherwise, please contact your vendor. 2. Symptom: The LED is always on not blinking. Possible Reme dy: Make su[...]

  • Pagina 43

    42 Possible Reme dy: Move the antennas of the a ccess point or wireless router into an L shape (one vertically, and one horizontally). Click on the Refre sh button on the Si te Survey screen. If the computer still does not see the Access Point, and then try to move your Access Point closer to the computer. Then click on the Refresh button again. If[...]

  • Pagina 44

    43 10. What does IEEE 802.11 feature support? The product supports the follow i ng IEEE 802.11 function s: -- CSMA/CA Plus Acknowledge Protocol -- Multi-Channel Roaming -- Automatic Rate Sele ction -- RTS/CTS Feature -- Fragmentation -- Power Management 11. What is Ad-Hoc? An Ad-Hoc integrated wireless LAN is a group of computers, each has a Wirele[...]

  • Pagina 45

    44 software than previous encryption standards. It is also included in IEEE 802 .11i standard. Compa re wit h AES, TKIP is a tempor ary p rotoc ol fo r repl acin g WEP s ecuri ty unti l manufacturers implement AES at the hardware level. 17. Would the information be intercepted while transmitting on air? WLAN features two-fold protection in security[...]