Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Zoom 4410B manuale d’uso - BKManuals

Zoom 4410B manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Zoom 4410B. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Zoom 4410B o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Zoom 4410B descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Zoom 4410B dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Zoom 4410B
- nome del fabbricante e anno di fabbricazione Zoom 4410B
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Zoom 4410B
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Zoom 4410B non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Zoom 4410B e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Zoom in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Zoom 4410B, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Zoom 4410B, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Zoom 4410B. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Wi r e l e s s- G USB Adapter USER GUIDE[...]

  • Pagina 2

    Wireless-G USB Adapter 2[...]

  • Pagina 3

    Contents 3 Contents Overview .................................................................. 4 1. Installation Instructions ...................................... 5 Installing and Connecti ng the Adapter .................... 6 The Adapter LED .................................................... 9 2. Setting S ecurity ............................[...]

  • Pagina 4

    Wireless-G USB Adapter 4 Overview The chapters in this User Guide descri be how to: • Install the Zoom Wireless-G USB adapter on a Wind ows ® PC • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wirele ss-G USB configuration software Chapters 1 and 2 cover the basi cs – wha[...]

  • Pagina 5

    Chapter 1: Installation Instructio ns 5 1 Installation Instructions This chapter provides sim ple instructions for installing the Wireless-G USB adapter on a Windows PC. If you ha ve already installed the adapter on a comput er (usi ng the separate Quick Start guide), you can ski p this chapter and begin with Chapter 2: Setting Security. What’s i[...]

  • Pagina 6

    Installing and Connecting the Adapter Important! Install the software BEFORE you plug the Wireless- G USB adapter into your computer. 1 Insert the Wireless-G USB CD into the CD or DV D drive. The CD should start automati cally. Windows Vista: If the AutoPlay dialog box appears, click Run Setup.exe . If a message appears sayi ng An unidentified prog[...]

  • Pagina 7

    Windows Vista: If a message tells you that Wind ows can't verify the publisher of the driver software, select Install this driver soft ware anyway . 5 At the prompt, click Finish and remove the CD. If the Zoom installation menu remains on scree n, click Exit . 6 Shut down the computer. 7 Plug in the USB Adapter and turn your computer back on. [...]

  • Pagina 8

    2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless net works. 3 Highlight the network you want and cli ck Join . If the network you select has security configured, you must enable and configure securi ty on your computer before you can connect. See Chapter 2, Settin g Security . 4 If you join a wirele[...]

  • Pagina 9

    Chapter 1: Installation Instructio ns 9 The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless net work. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.[...]

  • Pagina 10

    2 Setting Security We strongly recommen d security, although you do not need to use it to get your wireless connection wo rking. Important! You must first enable secu rity on the the wireless access point. You then enable secu rity on the adapter using the same configuration that you used for the access poi nt. For example, if the wireless access p[...]

  • Pagina 11

    This option requires you to enter an encryption key sh ared by the access point. • WEP ( W ired E quivalent P rivacy) Both the Open and Shared Authentication modes require WEP security. The most recent assessments of WEP advise choosing Open rathe r than Shared. If the devices in your network do not support WPA2-PSK or WPA-PSK, select Open with W[...]

  • Pagina 12

    2 The Zoom Wireless-G USB configuration software open s to display the configuration paramete rs: 3 Make sure that the desired wirele ss network is displa yed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Net w ork Typ e is correct. There are two types of wireless networks: Infrastruct[...]

  • Pagina 13

    Chapter 2: Setting Security 13 • In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings . 4 Select the Enable Security check box to open the Security Configuration window. For configuratio n instructions, consult this table: To configure Go to page WPA2-PSK 14 WPA-PSK 15 WEP 15 [...]

  • Pagina 14

    WP A2-PSK (Pre-Shared Key) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2- PSK . 2 At Encryption Mode , accept the default: AES ( A dvanced E ncryption S tandard). 3 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a[...]

  • Pagina 15

    WP A - PSK (Pre - Shared Key) If all of the wireless devices in your network DO NOT supp ort the recommended WPA2-PSK, select WPA-PSK. 1 In the Privacy Configuration window, click the Authentication Mode drop-down a rrow and select WPA- PSK . 2 At Encryption Mode , accept the default: TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the Pre-shared[...]

  • Pagina 16

    That’s it! You have configured WPA-PSK security for your wireless connection, and you’re rea dy to use the Internet. WEP (W ired Equivalent Privacy) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select Open (recommend ed) or Shared : The USB Adapter automatically select s WEP as the Encryption Mode. [...]

  • Pagina 17

    Chapter 2: Setting Security 17 • Hexadecimal digits if an access point, router, or some adapters are not Zoo m products b c d In the Key Length drop-down lis t, select 128 bits , 64 bits , or 256 bits . Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could di minish network performance. In the Key Index drop-d[...]

  • Pagina 18

    6 Click the Close box to exit the configuration software. That’s it! You have configured W EP secu rity for your wi reless connection, and you’re ready to use the Internet. WP A2 Select WPA2 if: • you are linking to a corporat e network that use s a RADIUS ( R emote A uthentication D ial- I n U ser S ervice) authe ntication server • all of [...]

  • Pagina 19

    1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2 . 2 At Encryption Mode , accept the default AES ( A dvanced E ncryption S tandard) 3 In the IEEE 802.1X Authentica tion area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentic[...]

  • Pagina 20

    • TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication e xtensions: PAP ( P assword A uthentication P roto col) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s ve rsion of CHAP). MS-CHAPV2 (the default). • SIM ( S ubscriber I dentity M odule). A SIM card stores t he key[...]

  • Pagina 21

    2 Accept the default Authentication Mode : TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With I EEE 802.1X authentication, each wireless device (client) sends a sig nal to the wireless access point, which in turn s[...]

  • Pagina 22

    • PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handsh ake Authentication Protocol. GTC • TLS ( T ransport L ayer S e curity). There are no authentication extension options with TL[...]

  • Pagina 23

    Certificate (WP A2 and WP A) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security o f the network. If you are linking to a corporate network that uses an authentication server and you have con figured WPA2 or[...]

  • Pagina 24

    W iFi™ Protected Setup (WPS) If your access point supports W iFi P rotected S etup (WPS), this protocol can greatly simplify t he process of configuring WPA2- PSK or WPA-PSK security. To access WPS, on the Configuration tab, click the WPS button to open the WPS Config screen: 1 If you are like most users, you will want to join a wireless network [...]

  • Pagina 25

    Chapter 2: Setting Security 25 a You can select the Push Button option if your access point has a hardware Secure Setup o r similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton. The acce ss point will begin accepting WPS connections. Now, [...]

  • Pagina 26

    Wireless-G USB Adapter 26 Changing your Security Setting If the type of security on your wireless network cha nges, you need to modify your securit y settings. On the Configuration tab, click the Con figure Security button to select a different security option and enter the required information.[...]

  • Pagina 27

    3 Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the si gnal stren gth of your network connection, scan available net works, and specify advanced settings. This chapter tells you whe n and how to use each of these options. Creating Profiles A profile is a collection of settings needed for a par[...]

  • Pagina 28

    3 In the Configuration area, enter the following setting s: • SSID – Enter the network name. In the example above, the SSID is Home . • Network Ty pe – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop -down list, select the channel used by the other device(s) in the network. If you are setting up the first comput[...]

  • Pagina 29

    • Enable Security – Select this check box to open the Security Configuration window. Note: If you are se tting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, cli ck OK to return to the Configuration tab. 4 In the Configuration area, click the Apply button to save the sett[...]

  • Pagina 30

    Monitoring Link Status The Status area on the Configuration tab displays in formation about your wireless connection: • State : In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC addre ss used by computers in the network. • Current Ch[...]

  • Pagina 31

    Using Site Survey and Re s ca n Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network nam es ( ESSIDs) so you can connect to a network • Identify the MAC add ress (BSSID) of your wireless access point or wireless router • Che ck the channel difference bet ween your network a nd oth[...]

  • Pagina 32

    32 Wireless-G USB Adapter The information displayed on the Site Surv ey tab is as follows: • ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network. The ESSID is a code attached to[...]

  • Pagina 33

    Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode : • Power Save Enabled : When you select this option, the Wireless-G USB adapter immediately signals the acce ss point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter. Note: The [...]

  • Pagina 34

    Appendix A TCP/IP Settings By default, Windows is set for dynamic addre ssing (DHCP). Generally, this is the correct se tting for an Infrastructure network, but needs to be changed if you are usi ng an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the sectio[...]

  • Pagina 35

    c In the Network Connec tions window, double-clic k the Wireless Network Connection option: d In the Wireless Net work Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings 35[...]

  • Pagina 36

    e In the Wireless Net work Connection Properties dialog box, highlight the version of TCP/IP (Transmi ssion Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below. If you're not sure wh[...]

  • Pagina 37

    c Enter 255.255.255.0 for Subnet ma sk . The Subnet mask should be the same for each comp uter in your ad hoc netw ork. d Enter 10.0.0.5 for De fault gateway and Preferred DNS server . (This is the IP address of the first computer that was set up in your ad hoc network.) T he Default Gateway and Preferred DNS server should be the same for each comp[...]

  • Pagina 38

    38 Wireless-G USB Adapter c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure net work. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. a From the desktop, click the Start button, sele ct Control Panel , and then click Net work Co[...]

  • Pagina 39

    Appendix A: TCP/IP Settings 39 Gateway and Preferred DNS server should be the same for each computer in your ad ho c network. e Click OK twice. That’s it! You have set static IP addressing for a Wi ndows XP computer in an ad hoc net work. 3 For Infrastructure Networks : To verify your DHCP settings, complete the following: a Ensure that Obtain an[...]

  • Pagina 40

    40 Wireless-G USB Adapter 2 Complete the following steps to set stati c IP addressing: a In the Internet Protocol (TCP/IP) Properties dial og box, ensure that Obtain an IP address automatically is not selected. Then make sure the butto ns labeled Use the following IP address and Use the follo w ing DNS server addresses are selected. b If this is th[...]

  • Pagina 41

    Appendix B: Troubleshooting 41 Appendix B Troubleshooting ¾ If your Zoom Wireless-G USB ad apter is not working properly, try these suggestions . • Make sure the adapter is secu rely connected to the computer, either dire ctly or through its USB extender cable. • Perform a power cycle – take the follo wing steps in the order given: 1. Turn o[...]

  • Pagina 42

    42 Wireless-G USB Adapter as these settings for the other devices in your wirele ss network. 2 Then click the Security tab and check t he settings to make sure that the adapter is configured for the same security system as the other devices in your wireless net work. Make sure that your secu rity key is the same – remember that the keys are case-[...]

  • Pagina 43

    Appendix C: Zoom Technical Support Services 43 Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenie nt, professional support responsive to our cu stomers’ needs and ca pabilities. If you find yourself unable to get your Zoom product to operate, and yo[...]

  • Pagina 44

    44 Wireless-G USB Adapter World Wide Web Zoom’s Web page lets you send em ail for assistance, registe r on-line, access product re views and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Produ ct. To access Zoom’s Web page, please log onto your local Internet Se[...]

  • Pagina 45

    Appendix C: Zoom Technical Support Services 45 Contact Zoom by Email You can email Zoom with any tech supp ort questions you might have and one of our Technical Supp ort Engineers will respond by email within 2 business days. You ma y request personal assistance via email at www.zoom.com/techmail . When emailing Zoom, be sure to include the followi[...]

  • Pagina 46

    46 Wireless-G USB Adapter Return of Defective Units Please contact your local distributor or reselle r for Factory Authorized Repair or Replacem ent of your In-Warranty Defective Product . If you are unable to reach you r distributor, you can contact the Zoom Facto r y Customer Service by calling: US: (617) 753-00 23 UK: 0870 720 0090 Please note t[...]

  • Pagina 47

    Appendix D: Regulato ry Information 47 Appendix D Regulatory Information U.S. FCC Part 15 Emissions Stateme nt This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protec tion against harmful interference in a residentia[...]

  • Pagina 48

    48 Wireless-G USB Adapter Countries of Operation & C onditions of Use in the European Co mmunity This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must [...]

  • Pagina 49

    Declaration of Conformit y Declaration of Conformity Overensstemmelseserklæring Déclaration de conformité Conformiteitsverklaring v an de EU Konformitätserklärung Δήλωση Συμμόρφωσης Dichiarazione di conformità Deklaracja zgodno ś ci Declaração de Conformidade Declaración de conformidad Konformitetsdeklaration Cam k ế t [...]

  • Pagina 50

    0888-A 27478 ©2008 NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that [...]