Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
MicroNet SP907NL manuale d’uso - BKManuals

MicroNet SP907NL manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso MicroNet SP907NL. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica MicroNet SP907NL o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso MicroNet SP907NL descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso MicroNet SP907NL dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo MicroNet SP907NL
- nome del fabbricante e anno di fabbricazione MicroNet SP907NL
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature MicroNet SP907NL
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio MicroNet SP907NL non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti MicroNet SP907NL e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio MicroNet in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche MicroNet SP907NL, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo MicroNet SP907NL, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso MicroNet SP907NL. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    User ’ s Manual 1 1n W ireless LAN USB Adapter Model No.: SP907NL http://www.micronet.info[...]

  • Pagina 2

    Table of Contents Chapter 1 Introduction ................................................................................. 1 1.1 Package C ontents .......................................................................................... 1 1.2 Key Features .............................................................................................[...]

  • Pagina 3

    4.6 Statistic s ...................................................................................................... 40 4.7 About ........................................................................................................... 41 Chapter 5 Troubleshooting ....................................................................... 43 Chapte[...]

  • Pagina 4

    1 Chapter 1 Introduction Micronet SP907NL, 11N Wireless LAN USB Adapter, delivers next generation high speed at a more economical and affordable pr ice tag. It is easily implemented for medium-sized business to allow imm ediate access to high speed wireless experience. It is compliant with IEEE 802.11n and backward compatible with IEEE 802.11b/g. T[...]

  • Pagina 5

    2 y WPS configuration for easier c onnection between adapter and AP/router. Enable connection via pushing a butt on or entering an 8-digit code. y Support the commonly available interface USB 2.0 to allow convenient installation. 1.3 Safety Information In order to keep the safety of users, please read through the following safety instructions: y Th[...]

  • Pagina 6

    3 1.5 Specifications Standards IEEE802.11b/ 802.11g / 802.11n Interface USB 2.0/1.1 Frequency Band 2.4000 ~ 2.4835GHz Data Rate z 11b: 1/2/5.5/11Mbps z 11g: 6/9/12/24/36/48/54Mbps z 11n (20MHz): MCS0-7 (up to 72Mbps) z 11n (40MHz): MCS0-7 (up to 150Mbps) Output Power z 11n: 14dBm ± 1.5dBm z 11g: 14dBm ± 1.5dBm z 11b: 17dBm ± 1.5dBm Security z WE[...]

  • Pagina 7

    4 Chapter 2 Tour of Product 2.1 USB Adapter 1. USB Connector: insert this side of the device into an available USB slot. 2. Connector Cab: for protecting device when not in use. 3. WPS button: located on the bottom side of the device for activating WPS pairing mode. 4. Link/Activity LED: indicate device is in use or traffic activity is evident. 2.1[...]

  • Pagina 8

    5 Chapter 3 Configuration 3.1 Drivers Installation Step 1. Gently insert the USB adapter into an available USB slot. The following message will appear, please press <Cancel> . Step 2. Insert driver CD into the CD/DVD ROM drive of the computer, and execute ‘Setup.exe’ program in ‘Utility’ folder. Read through the License Agreement and [...]

  • Pagina 9

    6 Step 3. It is recommended to select ‘Install driver and Ralink WALN Utility’ for first-time installation. Otherwise select second option to update existing drivers. Step 4. The following windows will appear, pleas e press on ‘Install’ to start the process.[...]

  • Pagina 10

    7 Step 5. Click <Finish> to complete the driver installation process. 3.2 Operating Configuration Utility After installation is complete, wireless configuration utility will be shown as an icon at the lower-right corner of the windows desktop. Click on the icon using right mouse key and select <Launch Config Utilities>.[...]

  • Pagina 11

    8 Step 1. Configuration utility will scan for available wireless access points automatically. Please select an access point to connect, and click <Connect> . If the AP you wish to connect is not in the list, please press <Rescan> to renew the interface. Some function includes more information, and can not be fitted in setup area. In thi[...]

  • Pagina 12

    9 3.2.1 Scan for Other Wireless Devices There are two kinds of wireless connec tion mode: Infrastr ucture and Ad-Hoc. Infrastructure mode is used by wirel ess access points, which is able to establish wireless connection for you and other wireless/wired network clients. Ad-Hoc mode is also know as ‘point-to- point’ mode, and in this mode, wirel[...]

  • Pagina 13

    10 y If the wireless device uses encryption, the user must know its encryption key in order to connect. Please launch utility and it will scan for wireless access points near by: Parameter Description SSID The SSID of the wireless access point or wireless d evice selected by user will be displa yed here. When the SSID of access point or wireless d [...]

  • Pagina 14

    11 If users cannot see the access point, please click ‘Rescan’ button to scan for access point again, until t he one preferred is displayed on the interface. Users may have to click ‘Rescan’ for more than two times before the access point wish to connect appears. If user still cannot see the access point after clicking ‘Rescan’ for more[...]

  • Pagina 15

    12 Step 1. Click the wireless access point or network device to connect, it will be highlighted, then click on ‘Connect’. If the access point selected does not use encryption, it will connect to this device within one minute. If the access poi nt selected uses encryption, please proceed to step 3. Step 2. If the wireless access point does not h[...]

  • Pagina 16

    13 Step 4. Please ask the owner of the wirele ss access point for the security information, and input the correct key here and then click on ‘OK’. By checking ‘Show Password’ box, the encryption key inputted here will be display ed. Authentication type will be selected by t he access point automatically, pleas e do not change it. However, i[...]

  • Pagina 17

    14 3.2.3 Add Access Point to Profile If users connect to some specific wireless access point frequently, they can add their information to the profile. Just lik e the telephone direct ory, the profile saves all information of access points, and user can recall them anytime. User can add an access point in the ‘Network’ t ab to profile, or input[...]

  • Pagina 18

    15 Parameter Description Profile Name User can give this profile a name. Every profile need s a unique name. SSID Please input the SSID of this access point. If user selected a n access point from the list, and SSID is not hidden, it will be filled automatically. However, user can modify the SSID if necessary. Network Type Please select the network[...]

  • Pagina 19

    16 Parameter Description Authentication Select the authentication type of the wireless access point or wireless device in this field. When users are ad ding a profile from an existing access point or wireless device, authentication type will be selected automatically. Encryption Select the encryption type of the wireless access point or wireless de[...]

  • Pagina 20

    17 Parameter Description EAP Method Select ‘802.1x EAP method’ from dropdown menu. Please ask the administrator of the access point for the correc t EAP method. Tunnel Authentication Select 802.1x tunnel authentic ation type from dropdown menu. Please ask the administrator of the acce ss p oint for correct tunnel authentication met hod. Thi s p[...]

  • Pagina 21

    18 3.2.4 Using Windows Zero Configuration Windows XP and Vista has a built-in wirel ess network configuration utility, called ‘Windows Zero Configuration’ (WZC). Users can also use WZC to configure the wireles s network parameter. Step 1. Right-click on configurati on utility icon and select <Use Zero Configuration as Conf iguration utility&[...]

  • Pagina 22

    19 Step 3. Click <Network Connections> . Step 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’. Step 5. All wireless access points within prox i[...]

  • Pagina 23

    20 to the access point. Otherwise, users c an press refresh butt on to rescan access points. Select the access point if it’s shown, then click <Connect> . Step 6. If the wireless access point uses encryption, users will have to input the correct WEP passphrase or WPA pre-shar ed key. Ensure both the AP and PC is set with the same WEP passph[...]

  • Pagina 24

    21 3.2.5 Profile Management If users need to connect to different wireless access points at different time, they can store the connection parameters (e ncryption, passphrase, security etc, etc.) as a profile for every access poin t. Click the ‘Profile’ menu and all profiles will be listed in ‘Profile Li st’. Users can select a pr ofile from[...]

  • Pagina 25

    22 Add a Profile If users want to create new profile, click ‘Profile’ menu, then press ‘Add’ button. The interface will prompt the user to input detailed information of access point. Edit a Profile[...]

  • Pagina 26

    23 If users have added a profile before, and th ey wish to change the content of the profile, they can use this function. Please select a profile from the list, and then click on ‘Edit’ button. The interface will provide contents of selected profile for editing. Click on ‘OK’ to save changes, or click ‘Cancel’ to discard changes. Delete[...]

  • Pagina 27

    24 Activate a Profile When users want to connect to a specific wireless device in the profile list, they can select it and click ‘Activate’ button to establish connection.[...]

  • Pagina 28

    25 When a profile is selected and cl ick on ‘Activate’ button, an icon will be displayed in front of the profile to show that the connection has failed. When the connection is successfully established, an icon will be displayed. 3.2.6 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users.[...]

  • Pagina 29

    26 Enable CCX Enable Cisco Compatible eXtensi on s. CCX is a wireless feature developed by Cisco used to imp rove the wi rel ess performance with CCX compatible wirel ess devices. Check this box if the users need to connect to CCX -compatible wireless devices. When CCX is enable d, the following setup items will become available: ¾ Turn on CCKM: C[...]

  • Pagina 30

    27 3.2.8 WMM Setting This wireless network card provides WM M (Wi-Fi Multimedia) function, which can improve the performance of certain network applications, like audio/video streaming, network telephony (VoIP), and others. When the users enable the WMM function of this network card, they ca n define the priority of different kinds of data to give [...]

  • Pagina 31

    28 3.2.9 WPS Configuration Wi-Fi Protected Setup (WPS) is the la test wireless network technology, which makes wireless network setup become very simple. The user doesn’t have to configure the wireless access point and setup data encryption when devices support WPS. This wireless network card is compatible with WPS. To use this function, the wire[...]

  • Pagina 32

    29 All access points with WPS function enabled will be displayed her e. Please make sure the access point users wish to connect is displayed. If not, please click ‘Rescan’ few more times. The user can also click ‘Information’ button to see the detailed information about selected access point. Step 3. Start PBC pairing procedure at access po[...]

  • Pagina 33

    30 Users can click ‘PBC’ button few more times to try again. When an access point is connected, users can click ‘Disconnect’ to disconnect your wireless network card from a connected access point. Users can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. WPS Setup – PIN The PIN c[...]

  • Pagina 34

    31 Parameter Description WPS associate IE Check this box to send the association reque st with WPS IE during WPS setup. WPS probe IE Check this box to send the WPS probe request with WPS IE during WPS setup. Auto When in PIN mode, wireless ac cess point to be connected will be selected automatically if this box is checked. 3.2.10 Radio On/Off Users[...]

  • Pagina 35

    32 3.2.11 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless network card.[...]

  • Pagina 36

    33 Chapter 4 Soft-AP Function Besides becoming a wireless client of other wireless access points, this wireless card can also act as a wireless service provider. Users can switch this wireless card’s operating mode to ‘AP’ to simulate the function of a real wireless access point by software and ev en sharing the internet connection. Please fo[...]

  • Pagina 37

    34 If the computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’. If your computer does not have another network card with In ternet connection, please click ‘Not enable ICS’. After clicking on ‘Enable ICS’ or ‘Not enable ICS’, the user will see the ba[...]

  • Pagina 38

    35 Parameter Description SSID Please input the SSID (the name used to identify this wireless access point) in this field. Up to 32 numeri cal charact ers can be accepted here excepting spa ce. Channel Please select the wireless cha nnel to use for the environment. The number of channels availabl e here will vary depending on the setting of ‘Count[...]

  • Pagina 39

    36 Country Region Code Please select the country code of the country or regio n. Available options are 0-7, wh ich will affect the available wireless channels: 0: FCC (US, Canada, and other countrie s uses FCC radio communication stand ards) 1: ETSI (Europe) 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISERAL (Channel 3 to 9) 7: ISERAL (Channel 5 t[...]

  • Pagina 40

    37 Parameter Description Authentication Type Please select a wireless authenticatio n type to use. Available options are ‘Open’, ‘Share d’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If users wa nt to disable wireless data encryption, please select ‘Open’. Encryption Ty pe Please select an encryption mode. The available o[...]

  • Pagina 41

    38 WEP Key Please input the WEP encryption key in this field when ‘WEP’ is selected. There are 2 types of WEP key: Hex (number 0 to 9, and ASCII characters A to F) and ASCII (all alphanumerical characters plus symbols). Please sel ect the type of WEP key first, and then input the WEP key according to the type of WEP key select ed. If users want[...]

  • Pagina 42

    39 Parameter Description Access Policy Select the policy type of your access rule. ¾ Disable: Allow any wireless client with p rop er authentication settings to connect to this access poin t. ¾ Allow All: Only allow wire less client s with MAC address listed here to connect to this access point. ¾ Reject All: Reject wirele ss clients with MA C a[...]

  • Pagina 43

    40 Parameter Description MAC Address Displays the MAC address of this wireless client. AID The serial number of this wireless connection. Power Saving Mode Displays the capability of pow er-saving function of this wireless client. Status Displays additional information of this wireless Conn ection, like current wireless operating mod e and data tra[...]

  • Pagina 44

    41 4.7 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless access point.[...]

  • Pagina 45

    42[...]

  • Pagina 46

    43 Chapter 5 Troubleshooting If users encounter any problem when using th is wireless network card, consult this section for possible solutions. Before calli ng the dealer of purchase for help, please check this troubleshooting table, the solu tion towards the problem could be very simple. Scenario Solution I can’t find any wireless access point [...]

  • Pagina 47

    44 Chapter 6 Glossary 1. What is the I EEE 802.11g standard? 802.11g is the new IEEE standard for hi gh-speed wireless LAN communications that provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LA N technology for the home, office and public networks. 802.11g defines the use of the same OF[...]

  • Pagina 48

    45 z RTS/CTS Feature z Fragmentation z Power Management 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers with their own Wireless LAN Card connecting as an independent wire less LAN. Ad hoc wireless LAN is applicable at a departmental scale fo r a branch or SOHO operation. 5. What is Infrastructure? An integrated wireless[...]

  • Pagina 49

    46 9. What is AES? AES (Advanced Encryption Standard), a ch ip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, while making more efficient use of har dware and/or software than previous encryption standards. It is also included in IEEE 802.11i standar d. Compare with AES, TKIP is[...]

  • Pagina 50

    47 13. What is Spread Spectrum? Spread Spectrum technology is a wi deband radio frequency technique developed by the military for use in reliable, secu re, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more b andwidth is consumed than in the case of[...]

  • Pagina 51

    48 16. What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devic es using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability. 17. What is STBC? STBC stands for Space-Time Block Coding, which [...]