SMC Networks SMCWPCI-N manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of SMC Networks SMCWPCI-N, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of SMC Networks SMCWPCI-N one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of SMC Networks SMCWPCI-N. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of SMC Networks SMCWPCI-N should contain:
- informations concerning technical data of SMC Networks SMCWPCI-N
- name of the manufacturer and a year of construction of the SMC Networks SMCWPCI-N item
- rules of operation, control and maintenance of the SMC Networks SMCWPCI-N item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of SMC Networks SMCWPCI-N alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of SMC Networks SMCWPCI-N, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the SMC Networks service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of SMC Networks SMCWPCI-N.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the SMC Networks SMCWPCI-N item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    USER GUIDE SMCWPCI-N EZ C onnect™ N Dr aft 11n Wir eless PCI A dapt er[...]

  • Page 2

    i LIMITED W ARRANTY Limited W arrant y S tatement: SMC Networks, Inc. (“SMC”) warrants it s pro ducts to be free from defects in workmanship and materials, under normal use and service, fo r the applicabl e warranty term. All SMC products carry a st and ard 90-day limited warrant y from the date of purchase from SMC or its Authorized Reseller .[...]

  • Page 3

    ii LIMIT A TION OF LIABILITY : IN NO EVENT , WHETHER BASED IN CONTRAC T OR T ORT (INCLUDIN G NEGLIGENCE) , SHALL S MC BE LIABLE FOR IN CIDENT AL, CON SEQUENTIAL, INDIRECT , SPECIA L, OR PUNITIVE DA MAGES OF ANY KIND, OR FOR LOSS OF REVENU E, LOSS OF BU SINESS, OR OTHER FI NAN CIAL L O S S ARISING OUT O F OR IN CONNECTION WITH THE SALE, INST ALLA TI[...]

  • Page 4

    iii Compliances Federal Communica tion Commission Inte rference St atement This equipment has b een tested and foun d to comply wi th the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to pro vide reasonable protection against harmful interf erence in a residential ins tallation. This equipment [...]

  • Page 5

    5 Table of Contents Chapter 1 - Getting Started with the SMCWPCI-N 6 C h a p t e r 2 - W i r e l e s s L A N N e t w o r k i n g 7 T r a n s m i s s i o n R a t e ( T r a n s f e r R a t e ) 7 T y p e o f W i r e l e s s N e t w o r k s 7 W i r e l e s s L A N S e c u r i t y 1 1 Chapter 3 - Hardware and Wireless Utility 13 About Your Draft 11n Wir[...]

  • Page 6

    6 Chapter 1 - Getting S t arted with the SMCWPCI-N Congratulations on purchasing the SMCWPCI-N. This manual provides in formation for setting up and configuring the SMCWPCI-N. This manual is intended for both home users and professionals. It is not required to read some of the more technical inform ation in this manual (such as in “Wireless LAN N[...]

  • Page 7

    7 Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE B Y AN AUTHORIZED ADMINIST RA TOR. T ransmission Rate (T ransfer Rate) The SMCWP[...]

  • Page 8

    8 Independent Basic Service Set (IBSS). T o set up an ad-hoc network, configure all the stations in ad- hoc mode. Use the same SSID and channel for each station .[...]

  • Page 9

    9 When a number of wireless stations are connecte d using a single access point, you have a Basic Service Set (BSS).[...]

  • Page 10

    10 In the ESS diagram below , communication is done through the access points, which relay data packet s to other wireless stations or devices connected to th e wired network. Wireless stations can then access resources, such as a printer , on the wired network.[...]

  • Page 11

    11 In an ESS environ ment, users are able to move from one ac cess point to another wi thout losing the connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the SMCWPCI-N automatically switches to the channel used in BSS (2). Wireless L AN Security Because wireless networks are not as secure as wire d networks, it’s vita[...]

  • Page 12

    12 D AT A E NCR YPTION WITH WEP The WEP (Wired Equivalent Priv acy) security protocol is a n encryption me thod designed to tr y to make wireless networks as secure as wired networks. WEP encryption scrambles all dat a packets transmitted between the SMCWPCI-N and the access point or other wireless stations to k eep network communications pri vate.[...]

  • Page 13

    13 Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Draft 11n Wireless PCI Adapter With the Adapter, you can enjoy wireless mobility within almost any wirele ss networking environment. The following lists the main features of your Card. • IEEE802.11n draft v1.0 [...]

  • Page 14

    14 Hardware and Wireless Utility Installation Follow the instructions be low to install the PCI Ca rd and Wireless Utility. Do not insert the EZ Connect™ N Wirel e ss PCI Adapter until instructed. 1. Put the EZ Installation & Document ation CD in to your CD-ROM drive. T he CD will auto run. If the CD does not auto run browse to y our CD drive[...]

  • Page 15

    15 4. T o install to the default folder location click [Next] . It is recommende d to use the default folder location unless you are an advan ced u ser . T o change the inst allation folder click the [Browse] button and specify a new location. Click [Next] to continue . 5. The wizard is ready to begi n installation. Click [Install]. 6. A “Softwar[...]

  • Page 16

    16 8. T urn off your computer . 9. Insert the EZ Conne ct™ N Wirele ss PCI Adapter in to an available PCI slot. IMPORT ANT : For correct inst allation of new hardware please refer to your Computer use r manual. NOTE: T o install the card you may be required to remove the att ached antennas. This is do ne by pulling the antennas from the base. 10.[...]

  • Page 17

    17 14. A “Hardware Installation” warning may a ppea r , click [Continue Anyway]. 15. Click [Finish] to complete the Driver/Utility installation.[...]

  • Page 18

    18 Using the Utility to Configure Your Network The following are explanations on how to configure a nd use the Utility program. After completing the installation procedure, a new ico n as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer ov er the ico n, and double click the left mouse button to open the Wir[...]

  • Page 19

    19 The following table describes the items found o n the Link Information screen. Wireless Network St atus Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile t ab. SSID Displays the wireless network name. Link St atus Shows whether the station is associated to the wireless network. Netw[...]

  • Page 20

    20 channel Channel Wid th 20MHz only or 40/20MHz channel support Security S tatus Security Shows the security type – Disable, WEP , WP A/WP A2, W AP-PSK/WAP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP S tatus IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway ad[...]

  • Page 21

    21 Click the Connect button to connect the available network. If no configuration p rofile exists for that network, the Profile Settings window opens to ask to create a p rofile for the network. Follow the procedures to create pr ofile for that network. Profile T o add a new configuration profile, cli ck Add on the Profile tab. T o modify a configu[...]

  • Page 22

    22 Scan Available Networks Click the Browse button on the Profile Settings scr een to scan for available inf rastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Typ e field on the Profile Settings.[...]

  • Page 23

    23 Click Next to continue. To define the security mode, select the se curity button of the desir ed security mode. And then click Next to continue. Please see following tabl e for details of se curity modes. WEP This card support three mo des of WEP , include: 64 Bit s 128 Bit s 152 Bit s Except 152-Bit ode, both 64-Bit & 128-Bit modes support [...]

  • Page 24

    24 Protocol) authenticates wireless LAN client s using only server -side digital certificates by creating an encr ypted SSL /T LS tunnel between the client an d the authentication server . T he tunnel then protects the subsequent us er authentication e xchange. PEAP (EAP-MSCHAP V2) ( Protected Exten sible Authentication Protocol) T o use PEAP (EAP-[...]

  • Page 25

    25 The following table describes the item s found on the Advanced Se ttings screen. Power Save Mode Shows the power save mode. Power m anag ement is disabled in ad hoc mode. The options incl ude: z Continuous Access Mode z Maximum Power Saving z Fast Power Saving 802.1 1b Preamble Displays the 802.1 1b preamble format. The options include: z Long z[...]

  • Page 26

    26 Chapter 4 - Maintenance This chapter describes how to unins tall or upgrade th e Wireless Utility. Uninstall the Driver Follow the step s below to remove (or uninstall) the Card d river fro m your co mputer . Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click Sy stem Step 3. Under Hard ware tab, click [...]

  • Page 27

    27 Glossary For unfamiliar terms used below , look for entries elsewhere in the glossary . A D -H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station ( access point). T wo or more wireless stations communicate directly to each other . An ad-ho[...]

  • Page 28

    SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire- less network. Wireless devices must have the same SSID to communicate with each other . T EMPORAL K EY I NTEGRITY P ROTOCOL (TKIP) T emporal Ke y Integrity Protocol (TKIP) uses 128-b it keys that are d ynamically generated and distributed by the authe[...]

  • Page 29

    TE CHNICAL SUPPORT F rom U .S.A. and Canada (2 4 hours a da y , 7 days a w eek) Phn: (800) SMC -4- Y OU / (94 9) 6 79-8000 F ax: (94 9) 67 9- 1481 ENGLISH T echnical S upport information a vailable at www .smc.c om FRENCH Inf ormations Support T echnique sur www .smc.c om DEUTSCH T echnischer Support und w eiter e Information unt er www .smc.com SP[...]