SMC Networks SMCWPCI-N2 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of SMC Networks SMCWPCI-N2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of SMC Networks SMCWPCI-N2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of SMC Networks SMCWPCI-N2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of SMC Networks SMCWPCI-N2 should contain:
- informations concerning technical data of SMC Networks SMCWPCI-N2
- name of the manufacturer and a year of construction of the SMC Networks SMCWPCI-N2 item
- rules of operation, control and maintenance of the SMC Networks SMCWPCI-N2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of SMC Networks SMCWPCI-N2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of SMC Networks SMCWPCI-N2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the SMC Networks service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of SMC Networks SMCWPCI-N2.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the SMC Networks SMCWPCI-N2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    EZ Connect™ N Pro Draft 11n Wireless PCI Adapter SMCWPCI-N2[...]

  • Page 2

    i LIMITED W ARRANTY Limited W arrant y S tatement: SMC Networks, Inc. (“SMC”) warrants it s products to be free from defects in workmanship and materials, under normal use and service , for the applica ble warranty term. All SMC products c arry a standard 90-day limited warrant y from the date of purchase from SMC or its Authorized Reseller . S[...]

  • Page 3

    ii LIMIT A TION OF LIABILITY : IN NO EVENT , WHETHER BASED IN CO NTRACT OR TO RT (INCLUDIN G NEGLIGENCE) , SHALL SM C BE LIABLE FOR IN CIDENT AL, CON SEQUENTIA L, INDIRECT , SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVE NUE, LOSS OF BU SINESS, OR OTHER F INANCIAL LOSS ARISING OUT OF OR IN CONNEC TION WITH THE SALE, INST ALLA TION, M[...]

  • Page 4

    iii Compliances Federal Communica tion Commission In terference St atement This equipment has b een tested and foun d to comply wi th the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to p rovide reasonable protection against harmful interf erence in a residential ins tallation. This equipment [...]

  • Page 5

    iv Compliances Europe – EU Declaration of Conformity This device complies with the essential requirem ents of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN60950-1:2001 A11:2004 Safety of Informat[...]

  • Page 6

    v Compliances Council recommendation 1999/519/EC of 12 July 1999, limitations of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz) Č esky [Czech] SMC Networks tímto prohlašuje, že tento Radio LAN device je ve shod ě se základními požadavky a dalšími p ř íslušnými ustanoveními sm ě rnice 1999/5/ES. Dansk [Dan[...]

  • Page 7

    vi Slovensky [Slovak] SMC Networks týmto vyhlasuje, že Radio LAN device sp ĺň a základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen[...]

  • Page 8

    5 Table of Contents Chapter 1 - Getting Started with the SMCWPCI-N2 6 C h a p t e r 2 - W i r e l e s s L A N N e t w o r k i n g 7 T r a n s m i s s i o n R a t e ( T r a n s f e r R a t e ) 7 T y p e o f W i r e l e s s N e t w o r k s 7 W i r e l e s s L A N S e c u r i t y 1 2 Chapter 3 - Hardware and Wireless Utility 13 About Your Draft 11n Wi[...]

  • Page 9

    6 Chapter 1 - Getting S t arted with the SMCWPCI-N2 Congratulations on purchasing the SMCWPCI-N2. This manual provides information for setting up and configuring the SMCWPCI-N2. This manual is intended for both home users and professionals. It is not required to read some of the more technical inform ation in this manual (such as in “Wireless LAN[...]

  • Page 10

    7 Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE BY AN AUTHORIZED ADMI NISTRA TOR. T ransmission Rate (T ransfer Rate) The SMCWPC[...]

  • Page 11

    8 communicate directly to each other . An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). T o set up an ad-hoc network, configure all the st ations in ad-hoc mode. Use the same SSID and channel for each station .[...]

  • Page 12

    9 When a number of wireless stations are connecte d using a single access p oint, you have a Basic Service Set (BSS).[...]

  • Page 13

    10 In the ESS diagram below , commu nication is done through the access point s, which relay data packet s to other wireless stations or devices connected to th e wired network. Wireless stations can then access resources, such as a printer , on the wired network.[...]

  • Page 14

    11 In an ESS en vironment, users are able to move fr om one access point to another wi thout losing t h e connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the SMCWPCI-N2 automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]

  • Page 15

    12 Wireless L AN Security Because wireless networks are not as secure as wire d networks, it’s vital that security settings are clearly understood and applied. The list below shows the possible wireless secu rity levels on your SMCWPCI-N2 starting with t he most secure. EAP (Extensible Authentication Protocol) is used for authentication and utili[...]

  • Page 16

    13 Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Draft 11n Wireless PCI Adapter With the Adapter, you can enjoy wireless mobility within almost any wirele ss networking environment. The following lists the main features: • IEEE802.11n draft v2.0 compliant •[...]

  • Page 17

    14 Hardware and Wireless Utility Installation Follow the instructions be low to install the PCI Ca rd and Wireless Utility. Do not insert the EZ Connect™ N Wirel ess PCI Adapter until instructed. 1. Put the EZ Installation & Document ation CD in to your CD-ROM drive. T he CD will auto run. If the CD does not auto run browse to y our CD drive [...]

  • Page 18

    15 4. T o install to the default folder location click [Next] . It is recommended to use the default folder location unless you are an advan ced user . T o change the installation folder click the [Browse] button and specify a new location. Click [Next] to continue . 5. The wizard is ready to begi n installation. Click [Install]. 6. A “Software I[...]

  • Page 19

    16 8. T urn off your compute r . 9. Insert the EZ Conne c t™ N Wireless PCI Adapter in to an available PCI slot. IMPORT ANT : For correct inst allation of new hardware please refer to your Computer use r manual. 10. Once the EZ Connect™ N Wireless PCI Adapter is inserted screw on the antenna s. 11. T urn On your computer . 12. The “Found New [...]

  • Page 20

    17 14. A “Hardware Inst allation” warning may appear , click [Continue Anyway]. 15. Click [Finish] to complete the Driver/Utility installation.[...]

  • Page 21

    18 Using the Utility to Configure Your Network The following are explanations on how to configure a nd use the Utility program. After completing the installation procedure, a new ico n as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer ov er the icon, and double click the left mouse button to open the Wire[...]

  • Page 22

    19 The following table describes the items found o n the Link Information screen. Wireless Network St atus Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile t ab. SSID Displays the wireless network name. Link St atus Shows whether the station is associated to the wireless network. Netw[...]

  • Page 23

    20 channel Channel Wid th 20MHz only or 40/20MHz channel support Security S tatus Security Shows the security type – Disable, WEP , WP A/WP A2, W AP-PSK/W AP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP S tatus IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway a[...]

  • Page 24

    21 Connecting to a different network Hold your mouse pointer ov er the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration p rofile exists for that network, the Profile Settings window opens to ask to create a p rofile for the network. Follow the proced[...]

  • Page 25

    22 Scan Available Networks Click the Browse button on the Profile Settings scr een to scan for available inf rastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Typ e field on the Profile Settings.[...]

  • Page 26

    23 Click Next to continue. To define the security mode, select the desi red se curity mode from the drop down list. And then click Next to continue. Please see following table for details of security mode s. WEP This card support three modes of WEP , inclu de: 64 Bit s 128 Bit s 152 Bit s Except 152-Bit ode, both 64-Bit & 128-Bit modes support [...]

  • Page 27

    24 Protocol) authenticates wireless LAN client s using only server -side digital certificates by creating an encr ypted SSL /TLS tunnel between the client an d the authentication server . T he tunnel then protects the subsequent us er authentication e xchange. PEAP (EAP-MSCHAP V2) ( Protected Extensible Authentication Protocol) T o use PEAP (EAP-MS[...]

  • Page 28

    25 Advanced Settings After Security Settings are finished, the Advanced Settings screen will be shown as following. SMC recommends usin g the default values. The following table describes the item s found on the Advanced Se ttings screen. Power Save Mode Shows the power save mode. Power m anagement is disabled in ad hoc mode. The options include: z[...]

  • Page 29

    26 After advance settings are finished, the following scre en is displayed as below. You can activate the profile now or later. WPS Wi-Fi Protected Setup (WPS) is based on pu sh-butto n or PIN (Personal Ident ification Number) entry authentication to provide strong WPA/WPA2 encryption key s to client dev ices. Users can push a button on the access [...]

  • Page 30

    27 4. After WPS detects security setti ng you will be prompted to save them to a new profile as shown below. Click Save to save settings 5. After clicking save the following will be displ a yed to confirm WPS is connected successfully. Note: If WPS fails, click the PBC bu tton few more times to try again.[...]

  • Page 31

    28 WPS Setup - PIN Configuration The WPS PIN (Personal Identification Number) setu p is optional to the WPS button setup. It is more secure than using the WPS button. All WPS-compatible devices h ave their own PIN number. 1. The PIN number of your Wireless Cardb us Adapter is an eight-digit number lo cated at the upper-right position of configurati[...]

  • Page 32

    29 Note: You may have to click PIN for few more times to try again. If you still cannot connect to an access point this way, please make sure the PIN co de you provided to acce ss point is correct. WPS Status Bar Description: 1. A successful PIN configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated to WPS AP[...]

  • Page 33

    30 Chapter 4 - Maintenance This chapter describes how to unins tall or upgrade th e Wireless Utility. Uninstall the Driver Follow the step s below to remove (or uninstall) the Card d river from your computer . Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click Sy stem Step 3. Under Hardware tab, cli ck De[...]

  • Page 34

    31 Glossary For unfamiliar terms used below , look for entries elsewhere in the glossary . A D -H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station ( access point). T wo or more wireless stations communicate dire ctly to each other . An ad-h[...]

  • Page 35

    SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire- less network. Wireless devices must have the same SSID to communicate with each other . T EMPORAL K EY I NTEGRITY P ROTOCOL (TKIP) T emporal Key Integrity Protocol (TKI P) uses 128-bit keys t hat are dyna mically generated and distributed by the authe[...]

  • Page 36

    SMCWBR11-G SMCWPCI-N2[...]