Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
CNET CWP-905 manuale d’uso - BKManuals

CNET CWP-905 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso CNET CWP-905. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica CNET CWP-905 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso CNET CWP-905 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso CNET CWP-905 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo CNET CWP-905
- nome del fabbricante e anno di fabbricazione CNET CWP-905
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature CNET CWP-905
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio CNET CWP-905 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti CNET CWP-905 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio CNET in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche CNET CWP-905, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo CNET CWP-905, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso CNET CWP-905. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    CWP-905 Wireless-N PCI Adapter User Manual V ersion: 1.0 (July , 2007)[...]

  • Pagina 2

    T able of Contents Chapter 1: Introduction ........................................................................................... 3 1.1 About CWP-905 ...................................................................................... 3 1.2 Main Features ........................................................................................[...]

  • Pagina 3

    Chapter 1: Introduction 1.1 About CWP-905 Thank you for purchasing this high-speed 802.1 1 b/g/n (Draft 2.0) wireless adapter . The Wireless-N PCI Adapter can be installed in mo st desktops and provides true flexibility by allowing the computer to be positioned almost anywhere in the building without the cost and hassle of running network cables. U[...]

  • Pagina 4

    1.3 System Requirement s • An empty PCI slot • Windows 2000, XP , or V ista operating system • CD-ROM drive • At least 100MB of available disk space 1.4 Getting to Know CWP-905 1. PCI Interface 2. Antennas 3. ‘Link’ LED 4. ‘Tx/Rx’ LED LED Name Light S tatus Description On Linked to a wireless access point Link Off Not linked to any [...]

  • Pagina 5

    Chapter 2: Driver Inst allation and Configuration 2.1 Netw ork Card Inst allation Please follow the following instructions to install your new wireless network card: 1. SWITCH THE COMPUTER OFF , remove the cover and insert the wireless network card into an empty PCI slot of your computer . 2. Install all three antennas on the wireless network card,[...]

  • Pagina 6

    3. Switch the computer on, the following me ssage will appear on your computer , please click ‘Cancel’ . 4. Insert the Auto-Install CD into your CD-RO M drive. Unless you hav e disabled the auto-run feature of Windows, the AutoPlay Menu should appear automatically . If not, you can manually access the installation by clicking the Start button a[...]

  • Pagina 7

    5. Please read the end user license agreement and click ‘Y es’ to accept license agreement. 6. Y ou can choose the configuration tool used to configure the wireless network card here. It’s recommended to select ‘Ralink Configuration T ool’, which provides fully access to all function of this wireless network card. If you pr efer to use th[...]

  • Pagina 8

    7. There are two wireless performance mode you can select here: Optimize for WiFi mode or Optimize for performance mode If you want to enhance wireless performance, please select ‘Optimize for performance mode’. However , wireless compatibility is not guaranteed in this mode. If you want to use this mode, you may not be able to communicate with[...]

  • Pagina 9

    8. Please click ‘ Inst all’ to run the driver installation process. 9. When you see this message, please click ‘Fin ish’ to complete the driver installation process. 9[...]

  • Pagina 10

    10. A new icon will appear at lower-right corner of your computer de sktop, you can put the mouse cursor on the icon, and the status of wireless card will be displayed as a popup balloon. HERE! 11. When you want to configure your wireless co nnection, please rig ht click on this icon, and a popup menu will appear . Y ou can click ‘Launch Config U[...]

  • Pagina 11

    2.2 Connect to Wireless Access Point There are two ways you can configure your wireless network card to connect to wireless access point: using the Ralink configuration utilit y which comes with wireless card driver , and using built-in windows zero configuration utility . 2-2-1 Using Ralink Utility Please follow the following instructions to use R[...]

  • Pagina 12

    Here are descriptions of every setup item: SSID: The Service Set IDentifier of wireless access point or other network device. Y ou can think it as the name of access point of wireless device. BSSID: The MAC address of wireless ac cess point or other network device. Unlike SSID, BSSID of every access point or network device is unique, and will not b[...]

  • Pagina 13

    uses. Encryption: Shows the encryption method that access point or wireless device uses. If the wireless access point does n ot enable encryption, you’ ll see ‘None’ displayed here. Authentication: Shows t he authentication mode that access point or wireless device uses. If the wireless access point does not require authentication, you’ll s[...]

  • Pagina 14

    If the access point you selected does not enable encryption (The content of ‘Encryption’ field of the access point you selected is ‘None’, you’ll be connected to this wireless access point within one minute. Please jump to step 6. If the access point you selected enables enc ryption, please proceed to next step. 4. If the wireless access [...]

  • Pagina 15

    5. If the wireless access point uses encrypti on, you have to input WEP p assphrase or WP A preshared key . Please ask the owner of the wireless access point you want to connect, and input the correct passphrase / preshared ke y here, then click ‘OK’. If the value you inputted here is wrong, you will not be able to connect to this wireless acce[...]

  • Pagina 16

    wireless device you connected to) message display ed at lower-left corner of configuration utility , congratulations, you’re successfully connected to the access point or wireless device you selected! 7. Y ou can put the mouse cursor over the Ralink configuration utility icon, and the brief information about link status and signal str ength of cu[...]

  • Pagina 17

    2-2-2 Using Windows Zero Configuration Windows XP and V ista has a built-in wireless netwo rk configuration utility , called as ‘Windows Zero Configuration’ (WZC). Y ou can also us e WZC to configure your wireless network parameter: 1. Right-click Ralink configuration utility ic on and select ‘Use Zero Configuration as Configuration utility .[...]

  • Pagina 18

    4. Right-click ‘Wireless Network Connection’ (i t may have a number as suffix if you have more than one wireless network card, pl ease make sure you rig ht-click the ‘Ralink 802.1 1n Wireless LAN Card), then select ‘View Available Wireless Networks’. 5. All wireless access points in proximity will be displayed here. If the access point yo[...]

  • Pagina 19

    6. If the access point is protec ted by encryption, you have to input its security key or passphrase here. It must match the encryption setting on the access point. If the access point you selected does not us e encryption, you’ll not be prompted for security key or passphrase. 19[...]

  • Pagina 20

    7. If you can see ‘Connected’ message, the connection between your computer and wireless access point is successfully established. 20[...]

  • Pagina 21

    2.3 Connection Profile Management If you need to connect to different wireless access point s at different time, like of access point of your home, office, cybercafe, or public wireless service, you can store the connection parameters (encryption, passphrase, security etc, etc.) as a profile for every access point, so you don’t have in input thes[...]

  • Pagina 22

    Or , you can add a connected wireless access poi nt or wireless device to a profile by clicking ‘Site Survey’ tab, then click ‘Add to Profile’ button: 22[...]

  • Pagina 23

    Y ou can set the parameter for this connection here: 23[...]

  • Pagina 24

    Here are descriptions of every setup items: Profile Name Please give this profile a name, up to 32 alphanumerical characters and symbols are allowed, but sp ace is not allowed. SSID The SSID of the wireless a ccess point or wireless device you selected will be displayed here. But if the SSID of access point or wireless device is not available, you [...]

  • Pagina 25

    it is. Now click ‘Authenticatio n and Security’ tab, and set the en cryption and authentication settings. Here are descriptions of every setup items: Authentication Select the authent ication type of the wireless access T ype point or wireless device you wish to connect. If you’re adding a profile from an existing access point or wireless dev[...]

  • Pagina 26

    Encryption: Select the encryption type of the wireless access point or wireless device you wish to connect. If y ou’re adding a profile from an existing access point or wireless device, the value will be selected automatically , and please do not modify it. WP A Input WP A preshared key here. If encryption is not Preshared Key enabled, or you sel[...]

  • Pagina 27

    Use 802.1x Enable 80 2.1x wireless authentic ation. Please click ‘802.1x Setting’ button to set 802.1x parameters. (See next section). After you finish all settings, click ‘OK’ to save settings and exit. The profile you just created will be displayed: Select the profile you wish to use, and click ‘Act ivate’ to use the profile you selec[...]

  • Pagina 28

    If you no longer need a profile, select the profile then click ‘Delete’. 28[...]

  • Pagina 29

    2-3-2 Using 802.1x – Certification After you click ‘802.1x Setting’, a new window will appear: Here are descriptions of every setup items: Authentication Please select an 802.1x authentication type here. T ype The type you select here m ust be identical to the type of the 802.1x authentication type you’re using. Session Y ou can enable or d[...]

  • Pagina 30

    Domain Name Please input the domain nam e of 802.1x authentication here. This field will be grayed out when authent ication type is not ‘EAP-F AST’. Use Client If the authentication type you use is ‘PEAP’ or ‘TTLS’, you can use the certificate stored on your co mputer . If the authentication type you use is ‘TLS/Smart Card’ , this b[...]

  • Pagina 31

    mode. This setting is hidden when the authentication type is not ‘EAP-F AST’. After you finish all settings, click ‘OK’ to save settings and exit. 31[...]

  • Pagina 32

    2-3-3 Using 802.1x - CA Server If you want to use CA server , please click ‘CA Server ’ tab. And the following message will be displayed: Here are descriptions of every setup items: Use certificate Check this box to enable the use of certificate chain. chain Certificate Please select the i ssuer of certificate from this Issuer dropdown menui. A[...]

  • Pagina 33

    2.4 View Netw ork S t atistics and Link St atus The configuration utility provides informati on about network statistics and link status. If you want to know how your wireless network card works, you can use these functions to get detailed information about the wi reless connection you’re using. 2-4-1 Network S tatistics Please follow the followi[...]

  • Pagina 34

    the statistics of all items back to 0. Click ‘OK’ to close the window . 34[...]

  • Pagina 35

    2-4-2 Link S tatus Please follow the following instructi ons to check network statistics: 1. Right-click the Ralink configur ation utility icon located at lo wer-right corner of computer desktop, then click ‘Launch Config Utilities’. 2. Click ‘Link S tatus’ tab, and information about current wireless connection will be displayed: These info[...]

  • Pagina 36

    every item: S tatus Display the SSID and BSSID of c onnected wireless access point or wireless device (displayed as SSID <-> BSSID as shown in above picture. If there’s no active connection currently , ‘Disconnected’ will be displayed here. Extra Info Displays the link status (‘Link is up’ or Link is down’ , and the radio transmit[...]

  • Pagina 37

    2.5 Advance Settings This wireless network card provides several advanced settings for experienced wireless users. Y ou can change these settings to increase data transfer performance, or change operation mode. Please follow the following instructions to set advanced wireless settings: 1. Right-click the Ralink configur ation utility icon located a[...]

  • Pagina 38

    Here are descriptions of every setup items: Wireless mode Select wireless operation m ode, available options are 802.1 1 B/G mix, 802.1 1 B only , and 802.1 1 B/G/N mix. Y ou can select 802.1 1 B/G/N mix to maximize wireless com patibility with wireless access points and other wireless devices. Anyway , you can set this setting to ‘802.1 1 B only[...]

  • Pagina 39

    Select Y our Select the country / region code of the place you’re Country Region living. Different country / region has dif ferent Code regulations on wireless devices, and it’ s forbidden to use certain channel (radio frequency) in some countries or regions. Please se lect the country and region code according to the place you live. Show When [...]

  • Pagina 40

    2.6 QoS Settings This wireless network card provides QoS (Qualit y of Service) function, which can improve the performance of certain network applications, like audio / video streaming, network telephony (V oIP), and others. When you enable WMM (Wi-Fi Mu ltiMedia) function of this network card, you can define the priority of diff erent kinds of dat[...]

  • Pagina 41

    Here are descriptions of every setup items: WMM Enable Check this box to enable WMM function. Please click ‘Apply’ button on the right of this check box af ter you check or uncheck this box, so corresponding settings in this window will be activated or deactivated respectively . WMM - Power Enable WMM power saving mode to save energy Save Enabl[...]

  • Pagina 42

    Direct Link Enable or disable direct link setup (DLS) function. Setup Enable This function will greatly improve the data transfer rate between WMM-enabled wireless devices. Please click ‘Apply’ button on the right of this check box af ter you check or uncheck this box, so corresponding settings in this window will be activated or deactivated re[...]

  • Pagina 43

    2.7 WPS Configuration Wi-Fi Protected Setup (WPS) is the latest wi reless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you don’t have to configure the wireless access point and setup data encryption. All you have to do [...]

  • Pagina 44

    2-7-1 WPS Setup - PBC (Pus h-Button Configuration) 1. Right-click the Ralink configur ation utility icon located at lo wer-right corner of computer desktop, then click ‘Launch Config Utilities’. 2. Click ‘WPS Configuration’ tab, and the following settings will appear: 44[...]

  • Pagina 45

    3. Push the ‘WPS’ button on your wireless a ccess point (the button used to activate WPS standby mode may have another name), or use ot her way to start WPS st andby mode as the instruction given by your wire less access point’s user manual. 4. Before you start to est ablish the wireless connection by using WPS, you can click ‘Rescan’ but[...]

  • Pagina 46

    network card and access point is successfully connected by WPS, and the information about access point you connected to will be displayed. Sometime WPS may fail, and you can click ‘PBC’ bu tton few more times to try again. When an access point is connected, you can click ‘Disconne ct’ to disconnect your wireless netwo rk card from a connect[...]

  • Pagina 47

    desktop, then click ‘Launch Config Utilities’. 2. Click ‘WPS Configuration’ tab, and the following settings will appear: The PIN number of your wireless network card is an eight-digit number located at the upper-right position of con figuration utility . Reme mber it, and input the number t o your wireless access point as the WPS PIN code ([...]

  • Pagina 48

    3. Click ‘PIN’ button now , and wait for few se conds to one minute. If a wireless access point with correct PIN code is found, you ’ll be connected to that access point: Y ou may have to click ‘PIN’ for few more time s to try again. If you still can not connect to access point by this way , please make sure the PIN code you provided to a[...]

  • Pagina 49

    2.8 About The ‘About’ tab provides you the information about version numbers of configuration utility , firmware, and other important informat ion about your wireless network card. Please follow the following instructions to see these information: 1. Right-click the Ralink configur ation utility icon located at lo wer-right corner of computer d[...]

  • Pagina 50

    The About screen shows release dates as well as driver/utility versions and the MAC/IP address of the card. Please click ‘OK’ to close configuration utility . 50[...]

  • Pagina 51

    Chapter 3: Sof t-AP Function Excepting become a wireless client of other wire less access points, this wireless card can act as a wireless service provider also! Y ou can swit ch this wireless card’s operating mode to ‘AP’ mode to simulate the function of a real wi reless access point by software, and all other computers and wireless devices [...]

  • Pagina 52

    Config Utilities’ after you right -click the Ralink configuration ut ility , which asks you to assign an existing network card with internet connection: If your computer has another network card whi ch is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’; if your computer does not have another netwo[...]

  • Pagina 53

    Here are descriptions of every setup items: SSID Please input the SSID (the name used to identify this wireless access point) here. Up to 3 2 numerical characte rs can be accepted here, excepting space. TX Rate Please select the data transfer rate here. The maximum TX rate you can select here depends on the wireless mode you’ re using. It’ s sa[...]

  • Pagina 54

    channels available here will vary depends on the setting of ‘Country Region Code’. Wireless Mode Please select the wireless operating mode. Y ou can limit the type of wireless client to 802.1 1b or 802.1 1g only , or allow 802.1 1b/g, and 802.1 1b/g/n clients. It’ s safe to select ‘802.1 1 B/G/N mix’ to allow all kinds of wireless cl ient[...]

  • Pagina 55

    know what will be affected. TX Power Y ou can select the wireless output power here. Please select a proper output power setting according to your actual needs. Y ou may not need 100% of output power if other wireless clients are not far from you. Idle Ti me Select the idle time of your wireless network card. Default value is 300. Do not modify thi[...]

  • Pagina 56

    3.2 Security Settings This wireless card supports wireless encryption in AP mode, which will encrypt the dat a being transferred over the air to enhance data security level. It’ s recommended to enable data encryption unless you wish to open your computer (and its internet connection) to the public. When you click ‘Security Setting’ in Ralink[...]

  • Pagina 57

    be encrypted and people with some networking knowledge will be able to read the data you transfer with proper tool. NOTE: WP A encryption is safer than WEP , however , some older wireless clients don’ t support WP A encryption. WP A Pre-shared Please input the WP A pre-shared key here. Only Key clients with the same pre-shared key you inputted he[...]

  • Pagina 58

    3.3 Access Control If you’re not going to open your computer and wi reless resources to the public, you can use MAC address filtering function to enforce your access control policy , so only wireless clients with MAC address you defined by this functi on can be connected to your software access point. Please follow the following instructions to s[...]

  • Pagina 59

    Here are descriptions of every setup items: Access Policy Select the policy type of your access rule: Disable: Allow any wireless client with proper authentication settings to connect to this access point. Allow All: Only allow wireless clients with MAC address listed here to connect to this access point. Reject All: Reject wireless cli ent s with [...]

  • Pagina 60

    you wish to allow or reject here. No colo n (:) or hyphen (-) required. Add Add the MAC address you inputted in ‘MAC address’ field to the list. Delete Please select a MAC address from the list, then click ‘Delete’ button to remove it. Remove All Delete all MAC addresses in the list. Apply Save and apply changes you made. 60[...]

  • Pagina 61

    3.4 Connection t able If you want to see the list of all wireless client s connected to this access point, please follo w the following instructions: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2. Click ‘Mac T able’ tab, and a list cont aining all connected wireless client s will appear: 61[...]

  • Pagina 62

    Here are descriptions of every fields: MAC Address Displays the MAC address of this wireless client. AID The serial number of this wireless connection. Power Saving Displays the cap ability of power-saving function of Mode this wireless client. S tatus Displays additional information of this wireless Connection, like current wireless operating mode[...]

  • Pagina 63

    3.5 Event Log This software access point will log all wireless-related activities as a log. Y ou can follow the following instructions to view the content of the event log: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2. Click ‘Event Log’ tab, and t he event log will be displayed: Y ou can click ‘[...]

  • Pagina 64

    3.6 St atistics If you want to know detailed information about how your software access point works, you can follow the following instructions to vi ew the statistics of the access point: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2. Click ‘S tatistics’ tab, and the event log will be displayed: Y [...]

  • Pagina 65

    Chapter 4: APPENDIX 4.1 T roubleshooting If you encounter any problem when you’re usin g th is wireless network card, don’t pani c! Before you call your dealer of purchase for help, pleas e check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself! Scenario Solution I can’t [...]

  • Pagina 66

    3. Y ou have to input correct passphrase / security key to connect an access point with encryption. Please contact the owner of access point to ask for correct passphrase / security key . 4. The access point you wish to connect only allows network cards with specific MAC address to establish connection. Please go to ‘About’ tab and write the va[...]

  • Pagina 67

    4.2 Glossary 1. What is the IEEE 802.1 1g standard? 802.1 1g is the new IEEE standard for high- speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.1 1g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.1 1g defines the use of the same OFDM [...]

  • Pagina 68

    6. What is BSS ID? A specific A d hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP? WEP is Wired Equivalent Privacy , a dat a privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix method to quic[...]

  • Pagina 69

    (ignored) by most narrowband receivers. 13. What is S pread S pectrum? S pread S pectrum technology is a wideband radio frequen cy technique developed by the military for use in reliable, secure, missi on-critical communication systems. It is designed to trade off bandwid th efficiency for reli ability , integrity , and security . In other words, m[...]