Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Edimax EW-7612UAn V2 manuale d’uso - BKManuals

Edimax EW-7612UAn V2 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Edimax EW-7612UAn V2. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Edimax EW-7612UAn V2 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Edimax EW-7612UAn V2 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Edimax EW-7612UAn V2 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Edimax EW-7612UAn V2
- nome del fabbricante e anno di fabbricazione Edimax EW-7612UAn V2
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Edimax EW-7612UAn V2
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Edimax EW-7612UAn V2 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Edimax EW-7612UAn V2 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Edimax in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Edimax EW-7612UAn V2, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Edimax EW-7612UAn V2, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Edimax EW-7612UAn V2. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    EW -7722 UTn V2 EW -7612 UAn V2 User Manual 10 -2011 / v1.0[...]

  • Pagina 2

    Copyright  by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transc ribed , stored in a retrieval system, or tran slated into any language or computer language, in any form o r by any m eans, electronic, m echanical, m agnetic, optica l, chemical, manual or otherwise, without the pri[...]

  • Pagina 3

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and can r[...]

  • Pagina 4

    R&TTE Compliance Statement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 9[...]

  • Pagina 5

    CONTENTS 1 I N T R O D U C T I O N .................................................................................... 1 1.1 Features ......................................................................................................... 1 1.2 S pecifications .......................................................................................[...]

  • Pagina 6

    1 1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless netw ork card is also able to access 802.11n wireless networks - data transfer rate is 3 00Mbps ! For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that protects your wireless net[...]

  • Pagina 7

    2  Antenna: Chip Antenna (EW -7722UTn V2) High-Gain 3dBi Antenna (EW -7612UAn V2)  Hardware W PS button  Drivers: W indows XP /Vista /7  LEDs: Link/Activity  Temperature: Operating 32~1 04 ° F (0 ~ 40 ° C) , Storage -13~149 ° F (-25~65 ° C)  Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the installa[...]

  • Pagina 8

    3 2 Install ation Procedure Before you proceed with the installatio n, please notice follow ing descriptions. Note1: The following installation was operated under Windows XP . (Procedures are similar for Windows Vista /7 .) Note2: If you have install ed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Har[...]

  • Pagina 9

    4 EW -76 12UA n V2 1. USB connector 2. Link/Activity LED (Under the case) 3. WPS Button LED N ame Light S tatus Description Link/ Activity Of f No wireless netw ork card is installed. On Solid light 5 sec o nds means WPS connection is establishe d successfully . Blinking W ireless netw ork card is n ormally inst alled /Linked to a wi reless access [...]

  • Pagina 10

    5 Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on . EW -7722UTn V2 EW -7612UAn V2 Never use force to insert the card, if you feel it’ s stuck, flip the card over and try again.[...]

  • Pagina 11

    6 The following message will appear on your compute r , click „Cancel‟ Software Installation This wizard can be run in W indows XP/V ista /7 . Y ou ca n inst all the W ireless Adapter by EZMAX Setup W izard in the CD-ROM including in the package. The wizard is an easy and quick configuration tool for internet connection with series process. W h[...]

  • Pagina 12

    7 I. Inst a ll the Driver and Utility If you prefer the traditional setup procedure. Please insert the installation CD to y our CD -ROM Drive, and click “ Exit “ to disable EZmax W izard. If your OS is W indows V ista/7. Please execute the “ Utility Setup.exe “ program a s follows.[...]

  • Pagina 13

    8 Click “ Next ” to go to the next step.[...]

  • Pagina 14

    9 Now you ‟ ll see the following message, please click „ Install ‟ to begin the installation. The system start s to inst all the driver and utility . Click “ Finish ” to complete the driver and utility installation.[...]

  • Pagina 15

    10 II. Conn ect to Wire less Access Point A. T o st art configuring the adapter , double click the icon in th e system tray or right click the icon and select open configuration utility . B. The utility of the adapter is displayed. Click “ Available Network ” and double-click on the wireless access point you want to connect to. If the wireless [...]

  • Pagina 16

    11 NOTE: Network security type ( ‘ Network Auth entication ’ and ‘ Data encryption ’ ) will be selected automatically based on wir eless access point ’ s security setting. It ’ s not r equir ed to change these settings by yourself. C. Input the security setting (WEP key) and click “ OK ” to st art network connection. All opti ons i [...]

  • Pagina 17

    12 hoc connection. Network Authentication Select the network authentication type from drop-down menu. This setting must be identical with the setting of wireless access point you w ith to connect. Data encryption Select the data encry ption t ype from drop-down menu. This setting must be identical with the setting of wireless access point you with [...]

  • Pagina 18

    13 NOTE: If you connected to an access point but the connection has been dr opped soon, please check security settings and r e-check passwor d spelling.[...]

  • Pagina 19

    14 * Use Win dows Z ero Configurati on on Win dows V ista: A. For Windows V ista user , you can use W indows Zero Configuration to con nect to wireless access point. Click „ S tart ‟ button, the n click „ Contr o l P anel. Click „ Netw ork and In tern et ‟ in C ontrol Panel. B. Click „Connect to a network‟ u nder „Network and Sharin[...]

  • Pagina 20

    15 C. Click the access point you want to use if it‟ s shown, then click „Connect‟. D. If it‟s an un named access point (i.e. the SSID of this wir eless access point is hidden), you‟ll be prompted to input it‟ s name, and the name must be identical to the SSID setting of the wireless access point y ou‟re connecting to.[...]

  • Pagina 21

    16 E. If the access point is protected by encryption method, y ou have to input its sec urity or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection betw e en your computer and wireless ac cess point is successfully est ablished. Click „Close‟ to start netw ork connection.[...]

  • Pagina 22

    17 3 Configuration Utility The Configuration Utility is a powerful application that helps you config ure the W ireless L AN Mini USB Adapter and monitor the link status and th e statistics during the communication process. The Configuration Utility appears as an icon on the sy stem tray and desktop of W ind ows. You can open it by double-click on t[...]

  • Pagina 23

    18 3.1 Utilit y Overvie w There are several parts in the utility screen. Please refer to the follow ing tabl e fo r the description. Parameter Description Refresh – Refresh adapter list in the “ B “ block. Mode – There are two modes: S tation and Access Point. If “ S tation “ is selected, the adapter works as a wireless adapter . If “[...]

  • Pagina 24

    19 W ind ows XP Zero Co nfiguration, check the item. Radio Off – This function is for you to turn of f or turn on the radio of the adapter . If the radio is turned of f, the adapter will not work. It is the stat us bar that displays the curr ent st atus of t he utility . T o close it, please disable the “ S tatus Bar “ in the “ View “ ite[...]

  • Pagina 25

    20 3.2 Available Netw ork W hen y ou open the Configuration Utility, the system wil l sca n all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wir eless network with the highest signal s trength . From the “ Available Netw o rk ” tab, all the networks nearby w ill[...]

  • Pagina 26

    21 3.3 Ge neral To check the connection status of the adapter, select “ General “ . This screen shows the information of Link Speed, Network Type, Encry ption Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Paramet er Description S tatus It will show the connection status of th e adapter . S peed It shows the cur[...]

  • Pagina 27

    22 connection including None, WEP , TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. Th e ID prevents the unintentional merging of two co-located WLANs. Signal S trength It indicates the wireless signal strength. Link Quality It indicates the wireless link quality . Network Address It shows [...]

  • Pagina 28

    23 3.4 Profile The “ Profiles List ” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set De fault to manage a profile. Parameter Description Av a ilable Profile(s) This list shows the preferred networks for the w ireless connection. Y o u can add, remove, edit, duplicate the preferred netwo[...]

  • Pagina 29

    24 3 . 4 . 1 C o n f i g u r e t h e P r o f i l e Parameter Description Profile Name Define a recognizable profile name for you to identify the different netw o rks ( Acce ss Point ). Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID p revents the unintentional merging of two co-loc[...]

  • Pagina 30

    25 or Router . If this item is selected, the adapter will work in Ad Ho c mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. Network Authentication This setting has to be consistent with the wirel[...]

  • Pagina 31

    26 WP A2 802.1X – Like W P A , W P A2 support s IEEE 802.1x/EAP authentication or PSK technology . It also includes a new advanced encryption mechanism using the A dvanced Encry ption S tandard (AES). AES is required to the corporate user or government users. The difference betw e en WP A and WP A2 is that W P A 2 provides data encryption via the[...]

  • Pagina 32

    27 computers within the network. Key Length W hen y ou select the “ W EP an d “ PASSPHRASE “ and this function will display in the current status of the utility. The keys are used to encrypt dat a transmitted in the wireless network. Fill the tex t box by following the rules below . 64 -bit – Input 10-digit Hex values as the encryption keys[...]

  • Pagina 33

    28 including CHAP , MSCHAP , MSCHAPv2 and P AP . PEAP speci fies that an EAP -compliant authentication protocol must be used; this adaptor supports MD5, TLS, GTC (Generic T oken Card) and MSCHAPv2. T he client certificate is optional required for the authentication. T unnel Includes MD5, GTC, TLS, MSCHAP-v2. Username The certificate username in the[...]

  • Pagina 34

    29 3.5 Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don ‟ t ensure the status of th e adapter and the network y ou are connecting, please go to the screen for more details.[...]

  • Pagina 35

    30 3.6 Statis tics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]

  • Pagina 36

    31 3.7 Wi -Fi Protect Setup (WPS) Wi -Fi Protected Setup ( W PS) is the latest wireless network technolo gy which makes wireless network setup become very simple. If you have W PS -enabled wireless access point, and you want to establish a secure connection to it, yo u don ‟ t have to configure the wireless access point and setup data encry ption[...]

  • Pagina 37

    32 3. If you click „ Yes ‟ , and the following message will appear on your computer, please select the SSID of wireless access point that you wish to con nect and click „ Select ‟ . 4. Please wait while the install procedure is running and wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you ?[...]

  • Pagina 38

    33 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point ‟ s manufacturer), then click „ PBC ‟ button in wireless configuration utility to start to establish wireless connection by W PS. Please be patient (This may req uire several seconds to one minute to [...]

  • Pagina 39

    34 2. W hen t he connection between this wireless netw ork card and access point is successfully established by W PS, and t he in formation about access point you connected to will be displayed.[...]

  • Pagina 40

    35 3.8 So ftwa re A P Excepting become a wireless client of other wir eless access points, this w ireless card can act as a wireless service provider also! Y ou can switch this w ireless card‟s operating mode to „AP‟ mode to simulate the function of a real wireless access point by software, and all other computers and w ireless devices can co[...]

  • Pagina 41

    36 Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID prevent s th e unintentional merging of two co-located WLANs. The default SSID of the AP is Full Computer Name + “ _AP “ . W ireless adapters connect to the AP should set up the same SSID as the AP . BSSID Display the MA[...]

  • Pagina 42

    37 3 . 8 . 1 AP P r o p e r t i e s S e t t i n g To configure software AP, please click “ Config ” button.[...]

  • Pagina 43

    38 Please note that Ad -Hoc mode is not available w hen network card is in AP mode. The description of major setup items are listed below: Network Name (SSID) Please input the SSID (the name use d t o ide ntify th is wireless access point) here. Up to 32 numerical characters can be accepted here, excepting spac e . Channel Please select the wireles[...]

  • Pagina 44

    39 menu. ASCII / P ASSPHRASE If the encryption method is W EP , check either „ASCII‟ or „P ASSPHRASE‟ box and input it in the box as W EP passphrase. Key Index Select WEP key index (1- 4). If you don‟t know which one you should use, select 1. Network key / Confirm network key IF netw ork au thentication m ode is W P A, please input W P A [...]

  • Pagina 45

    40 3 . 8 . 2 AP Ad v a n c e d If you want to setup adv anced settings of software access point, select „Advanced‟ menu. If you don‟t know the meaning and affects of these settings, keep them untouched. Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packet s (milliseconds). The range for the b[...]

  • Pagina 46

    41 3 . 8 . 3 AP S ta t i s t i c s You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]

  • Pagina 47

    42 3 . 8 . 4 I C S In this page, y ou can assign a network card on your computer as the path for all wireless clients to get connected to Internet. If you have only one network card (except this softw are access point), you don‟t have to select network card here; if you have more than one network card, select the one you wish to be used as Intern[...]

  • Pagina 48

    43 4 Troubles hooting & Glossary This chapter provides solutions to problems usually encountered during the installation and operati on of the adapter . If you encounter any problem when you‟re using this w ireless network card, don‟t panic! Before you call y our dealer of purch ase for help, please check this troubleshooting table, t he so[...]

  • Pagina 49

    44 he / she can add the MAC address of y our network card to his / her access point‟ s l ist. The network is slow / having problem when transferring large files 1. Move closer to the place where access point is located. 2. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number .[...]

  • Pagina 50

    45 4. What is A d - hoc ? An Ad -hoc integrated w ireless LAN is a group of computers, each has a W ireless LAN adapt er , Con nected as an independent wir eless LAN. A d hoc wireless LAN is applicable at a departmental sca le for a branch or SOHO operation. 5. What is Infrastructure ? An integrated wireless and wireless and wired LAN is called[...]

  • Pagina 51

    46 12. What i s DSSS ? What is FHSS ? And what are their differences ? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a p attern that is known to both transmitter and receiver . Properly synchronized, the net ef fe ct is to maintai n a single logical channel. T o an unintended receiver , FHSS appe[...]

  • Pagina 52

    47 Federal Communication Commission Interference St atement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and ca[...]

  • Pagina 53

    48 R&TTE Compliance St a tement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mu tual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the direc[...]