Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
SMC Networks SMCWCB-N2 manuale d’uso - BKManuals

SMC Networks SMCWCB-N2 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso SMC Networks SMCWCB-N2. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica SMC Networks SMCWCB-N2 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso SMC Networks SMCWCB-N2 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso SMC Networks SMCWCB-N2 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo SMC Networks SMCWCB-N2
- nome del fabbricante e anno di fabbricazione SMC Networks SMCWCB-N2
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature SMC Networks SMCWCB-N2
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio SMC Networks SMCWCB-N2 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti SMC Networks SMCWCB-N2 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio SMC Networks in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche SMC Networks SMCWCB-N2, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo SMC Networks SMCWCB-N2, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso SMC Networks SMCWCB-N2. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    EZ Connect™ N Pro Draft 11n Wireless Cardbus Adapter SMCWCB-N2[...]

  • Pagina 2

    i LIMITED W ARRANTY Limited W arranty S tatement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, und er normal use and service, for the a pplicable warranty term. All SMC products carry a standard 90-day limited warrant y from the date of purchase from SMC or its Authorized Reseller . SMC [...]

  • Pagina 3

    ii LIMIT A TION OF LIABILITY : IN NO EVENT , WHETHER BASED IN CONTRACT OR T ORT (INCLUDIN G NEGLIGENCE) , SHALL SMC BE LIAB LE FOR INCIDE NT AL, CONSEQUE NTIAL, INDIRECT , SPECIA L, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE, LOSS OF BU SINESS, OR O THER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTIO N WITH THE SALE, INST ALLA TION, MAI[...]

  • Pagina 4

    iii Compliances Federal Communica tion Commission In terference St atement This equipment has b een tested and found to compl y with the li mits for a Class B digital devic e, pursuant to Part 15 of the FCC Rules. These limits are designed to p rovide reasonable protecti on against harmful interf erence in a residenti al installation. This equipmen[...]

  • Pagina 5

    iv Compliances Europe – EU Declaration of Conformity This device complies with the essential requirem ents of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN60950-1:2001 A11:2004 Safety of Informat[...]

  • Pagina 6

    v Compliances Council recommendation 1999/519/EC of 12 July 1999, limitations of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz) Č esky [Czech] SMC Networks tímto prohlašuje, že tento Radio LAN device je ve shod ě se základními požadavky a dalšími p ř íslušnými ustanoveními sm ě rnice 1999/5/ES. Dansk [Dan[...]

  • Pagina 7

    vi Slovensky [Slovak] SMC Networks týmto vyhlasuje, že Radio LAN device sp ĺň a základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen[...]

  • Pagina 8

    5 Table of Contents Chapter 1 - Getting Started with the SMCWCB-N2 6 C h a p t e r 2 - W i r e l e s s L A N N e t w o r k i n g 7 T r a n s m i s s i o n R a t e ( T r a n s f e r R a t e ) 7 T y p e o f W i r e l e s s N e t w o r k s 7 W i r e l e s s L A N S e c u r i t y 1 2 Chapter 3 - Hardware and Wireless Utility 13 About Your Draft 11n Wir[...]

  • Pagina 9

    6 Chapter 1 - Getting S t arted with the SMCWCB-N2 Congratulations on purchasing the SMCWCB-N2. This manu al provides information for setting up and configuring the SMCWCB-N2. This manu al is intended for both home users and professionals. It is not required to read some of the more technical inform ation in this manual (such as in “Wireless LAN [...]

  • Pagina 10

    7 Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE BY AN AUTHORIZED ADMI NISTRA TOR. T ransmission Rate (T ransfer Rate) The SMCWCB[...]

  • Pagina 11

    8 T o connect to a wired network within a coverage area using access points, set the SMCWCB-N2 operation mode to Infrastructu re (BSS). T o set up an indep endent wireless workgroup with out an access point, use Ad-hoc (IBSS) mode. A D -H OC (IBSS) N ETWORK Ad-hoc mode does not require an ac cess point or a wired network. T wo o r more wireless sta[...]

  • Pagina 12

    9 When a number of wireless stations are connecte d using a single access p oint, you have a Basic Service Set (BSS).[...]

  • Pagina 13

    10 In the ESS diagram below , communication is done through the access points, which relay dat a packet s to other wireless st ations or devices connected to the wired network. Wireless st ations can then access resources, such as a printer , on the wired network.[...]

  • Pagina 14

    11 In an ESS en vironment, users are able to move f rom one access poi nt to anoth er without losing th e connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the SMCWCB-N2 automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]

  • Pagina 15

    12 Wireless L AN Security Because wireless networks are not as secure as wire d networks, it’s vital that security settings are clearly understood and applied. The list below shows the possible wireless secu rity levels on your SMCWCB-N2 starting with t he most secure. EAP (Extensible Authentication Protocol) is used for authentication and utiliz[...]

  • Pagina 16

    13 Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Draft 11n Wireless Cardbus Adapter With the Adapter, you can enjoy wireless mobility within almost any wirele ss networking environment. The following lists the main features of your Card. • IEEE802.11n draft v[...]

  • Pagina 17

    14 Hardware and Wireless Utility Installation Follow the instructions belo w to install the Cardbus Ad apter and Wireless Utility. Do not insert the EZ Connect™ N Wirel ess Cardbus Adapter until instructed. 1. Put the EZ Installation & Document ation CD in to your CD-ROM drive. T he CD will auto run. If the CD does not auto run browse to y ou[...]

  • Pagina 18

    15 5. The wizard is ready to begi n installation. Click [Inst all]. 6. A “Software Inst allation” warning may appear , click [Continue Anyway]. 7. Click [Finish] to exit the installation wizard.[...]

  • Pagina 19

    16 8. Insert the EZ Conne ct™ N Wireless Cardbus Adapter in to an available PC Card slot. 9. The “Found New Hard ware Wizard” will appear . Click [No, not this time], then [Next]. 10. Click [Install the sof tware automati cally (Recommended)], then clic k [Next]. 11. A “Hardware Installation” warni ng may appear , click [Continue Anyway].[...]

  • Pagina 20

    17 12. Click [Finish] to complete the Driver/Utility installation. Using the Utility to Configure Your Network The following are explanations on how to configure a nd use the Utility program. After completing the installation procedure, a new ico n as shown below will automatically appear in the lowe r right tray bar. Hold your mouse pointer ov er [...]

  • Pagina 21

    18 The user can now use any of the manag ement functi ons available in the Wireless Client Utility .[...]

  • Pagina 22

    19 Link Information Click the Link Information tab to see general information about the pro gram and its operation. The following table describes the items found o n the Link Information screen. Wireless Network St atus Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile t ab. SSID Displ[...]

  • Pagina 23

    20 Channel Control Channel Channel number of the control 20MHz channel Extension Channel To locate the 40MHz channel on combination with the control channel Channel Wid th 20MHz only or 40/20MHz channel support Security S t atus Security Shows the security type – Disable, WEP , WP A/WP A2, W AP-PSK/W AP2-PSK or 802.1X Authentication Displays the [...]

  • Pagina 24

    21 Connecting to a different network Hold your mouse pointer ov er the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration p rofile exists for that network, the Profile Settings window opens to ask to create a p rofile for the network. Follow the proced[...]

  • Pagina 25

    22 Scan Available Networks Click the Browse button on the Profile Settings scr een to scan for available inf rastructure and ad hoc networks. On this list, click Refresh to refresh the lis t at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Typ e field on the Profile Settings.[...]

  • Pagina 26

    23 Click Next to continue. To define the security mode, select the desi red security mode from drop down list. And then click Next to continue. Please see following tabl e for details of security modes. WEP This card support three modes of WEP , include: 64 Bit s 128 Bit s 152 Bit s Except 152-Bit ode, both 64-Bit & 128-Bit modes support Passph[...]

  • Pagina 27

    24 Protocol) authenticates wireless LAN client s using only server -side digital certificates by creating an encr ypted SSL /TLS tunnel between the client an d the authentication server . T he tunne l then protects the subsequent us er authentication e xchange. PEAP (EAP-MSCHAP V2) ( Protected Extensible Authentication Protocol) T o use PEAP (EAP-M[...]

  • Pagina 28

    25 The following table describes the item s found on the Advanced Se ttings screen. Power Save Mode Shows the power save mode. Power m anagement is disabled in ad hoc mode. The options include: z Continuous Access Mode z Maximum Power Saving z Fast Power Saving 802.1 1b Preamble Displays the 802.1 1b preamble format. The options include: z Long z S[...]

  • Pagina 29

    26 After advanced settings are finished, the following scree n is displayed as below. You can activate the profile now or later. WPS Wi-Fi Protected Setup (WPS) is based on pu sh-butto n or PIN (Personal Ident ification Numbe r) entry authentication to provide strong WPA/WPA2 encryption key s to client dev ices. Users can push a button on the acces[...]

  • Pagina 30

    27 4. After WPS detects security setti ng you will be prompted to save them to a new profile as shown below. Click Save to save settings 5. After clicking save the following will be displ a yed to confirm WPS is connected successfully. Note: If WPS fails, click the PBC bu tton few more times to try again.[...]

  • Pagina 31

    28 WPS Setup - PIN Configuration The WPS PIN (Personal Identification Number) setu p is optional to the WPS button setup. It is more secure than using the WPS button. All WPS-compatible devices h ave their own PIN number. 1. The PIN number of your Wireless Cardb us Adapter is an eight-digit number lo cated at the upper-right position of configurati[...]

  • Pagina 32

    29 Note: You may have to click PIN for few more times to try again. If you still cannot connect to an access point this way, please make sure the PIN co de you provided to acce ss point is correct. WPS Status Bar Description: 1. A successful PIN configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated to WPS AP[...]

  • Pagina 33

    30 Chapter 4 - Maintenance This chapter describes how to unins tall or upgrade th e Wireless Utility. Uninstall the Driver Follow the step s below to remove (or uninst all) the Card driver from your computer . Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click Sy stem Step 3. Under Hardware tab, click Dev[...]

  • Pagina 34

    31 Glossary For unfamiliar terms used below , look for entries elsewhere in the glossary . A D -H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station ( access point). T wo or more wireless stations communicate directly to each other . An ad-ho[...]

  • Pagina 35

    SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire- less network. Wireless devices must have the same SSID to communicate with each other . T EMPORAL K EY I NTEGRITY P ROTOCOL (TKIP) T emporal Ke y Integrity Protocol (TKIP) uses 128 -bit keys that are dynamically generated and distributed by the authen[...]

  • Pagina 36

    SMCWBR11-G SMCWCB-N2[...]