TRENDnet TEW-509UB manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of TRENDnet TEW-509UB, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of TRENDnet TEW-509UB one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of TRENDnet TEW-509UB. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of TRENDnet TEW-509UB should contain:
- informations concerning technical data of TRENDnet TEW-509UB
- name of the manufacturer and a year of construction of the TRENDnet TEW-509UB item
- rules of operation, control and maintenance of the TRENDnet TEW-509UB item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of TRENDnet TEW-509UB alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of TRENDnet TEW-509UB, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the TRENDnet service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of TRENDnet TEW-509UB.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the TRENDnet TEW-509UB item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    1[...]

  • Page 2

    2 Federal Communication Commission Interfe rence S t atement This equipment has been tested and found to comply with the limit s for a Class B digital de vice, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a r esidential installation. This equipment generates, uses a[...]

  • Page 3

    3 Table of Contents Federal Communic at ions Commis sion (FC C) Interference stateme nt 2 C E M a r k W a r n i n g 2 C h a p t e r 1 – W i r e l e s s L A N N e t w o r k i n g Transmission Rate 4 T y p e o f W i r e l e s s N e t w o r k s 4 Ad-Hoc (IBSS) Ne twork 5 Infrastructure (BSS) Ne twork 5 W i r e l e s s L A N S e c u r i t y 7 D a t a[...]

  • Page 4

    4 Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology . T HE INFORMA TION IN T HIS SEC TI ON I S FOR Y OUR REF ER ENC E. C HANGING NETWORK SETTI NG S AND P AR TICULA RL Y SECURITY SETTTINGS SHOULD ONL Y BE DONE B Y AN AUTHORIZED ADMINISTRA TOR. T ransmission Rate (T ransfer Rate) The[...]

  • Page 5

    5 When a numb er of wireless stations are conne cted using a single acce ss point, you have a Bas ic Service Set (BSS).[...]

  • Page 6

    6 In the ESS diagram below , communication is done through the access point s, which relay data p ackets to other wireless stations or devices connected to the wired network. Wireless stations can then acc ess resources, such as a printer , on the wired network. In an ESS environm ent, users are ab le to move from one access point to anothe r witho[...]

  • Page 7

    7 W IRELESS LAN S ECURITY Because wireless networks are not as secure as wired netw orks, it is vital that security set ti ngs are clearly understood and appli ed. The list below shows the possible wir eless securi t y levels on your adapter starting with the most secure. EAP (Extensible Authentication Pro tocol) is used for authentication and util[...]

  • Page 8

    8 Chapter 2 - Getting Started This cha pter int roduces the Adapter and prepares you to use the Wi reless Utility . 2.1 About Your 802.11a/b /g Wireless USB2.0 Adapter with HotSpot Detector The Adapter is an 802.11a, 802.11b, and 80 2.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless ne[...]

  • Page 9

    9 2.4 Wireless Uti lity & Adapter Hardware Installation NOTE: Please do not connect the USB adapter unless in structed to do so Follow the instruction s below to install the USB Adapter and Utility. STEP 1 Insert the Driver and Utility CD into CD d rive STEP 2 Autorun window appears automatically , c l ick on Inst all Utility bu tton to start .[...]

  • Page 10

    10 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application softw are. Click Next to continue. STEP 6 The wizard is ready to begin installatio n. Click Inst all to start the installation.[...]

  • Page 11

    11 STEP 7 Click Fini sh to complete the client utility installation . STEP 8 At this moment plea se insert your USB Adapter to your Laptop, Choose Inst all the sof tw are automatically and click Next . STEP 9 Click Fi nish to comp lete the installation .[...]

  • Page 12

    12 2.6 Using the Utility to Configure Your Network The following are exp lanations on how to config ure an d use the Utility program. After completing the installation procedure, a new icon will automatically appear in the lower right task bar. Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client Utili[...]

  • Page 13

    13 2.6.1 Link Information Click the Link Infor m ati on tab to see general information about the program and its op erations. The Link Information tab does not require any configuration. The following table describes the items found on the Link Infor mation screen. Wirel ess Ne tw ork Status Profile Name The name of the cur rent selected configurat[...]

  • Page 14

    14 2.6. 2 Si te Surv ey Click the Site Survey tab to se e available infra structure and ad hoc netwo rks. On this screen, click Refresh to refresh the list at any time. Connecting to a diff erent n etwork Hold your mouse pointer over the network icon, and click the right mou se button to select the network. Click the Connect button to connect the a[...]

  • Page 15

    15 2.6. 3 Pr o fi l e T o add a new configuration pro file, click Add on the Profile tab. T o modify a configuration profile, select the configuration from the Pro file list and click the Edit bu tton.[...]

  • Page 16

    16 Scan Available Networks Click the Browse button on the Profile Settings scree n to scan for availab le inf r astructure and ad hoc networks. On this list , click Refresh to refresh the list at any time . To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings. Click Next to continue the pro[...]

  • Page 17

    17 WP A/WP A2 Enables the use of Wi-Fi Pro tected Access (WP A). Choosing WPA/WPA2 opens the WPA/WPA2 Sec urity Settings screen. Th e option s include: TLS (T ransport Layer Security) is a Point-to-Point Protocol (PPP) extensi on supportin g addition al authenti cation meth ods within PPP . T ra nsport Layer Sec urity (TLS) provides for mutua l aut[...]

  • Page 18

    18 Advanced Settings After Security Settings finished, the Advanced Settings screen will be shown as following. The following table describes the items found on the Advanced Settings screen . Power Sav e Mode Shows the power save mode. Power ma nagement is disabled in ad hoc m od e. The options include: z Continuous Access Mode z Maximum Po wer Sav[...]

  • Page 19

    19 Aft er adv an ce s ett ings ar e fini shed , the f ollowi ng sc reen s howe d as below. You can activate the profile now or later.[...]

  • Page 20

    20 Chapter 3 – HotSpot This section explains the ha rdware section of the TEW-509UB. 3.1 Charging the TEW -509UB The TEW -509UB is powered by a rechargeable battery . The battery must be charged before first use as follows. CAUTION Most notebook computer USB connectors are horizontal. The TEW-509UB should be connected with the display facing up. [...]

  • Page 21

    21 3.3 LCD Display The illustration below show s the icons in the LCD. A ll the icons will not necessarily appear together as shown here. Fully charged and Re charging icon s w o uld appea r during charging p ro c e ss only . 3.4 Finding a HotSpot Refer to the following to find a ho t spot. 3. Switch Power to ON . The TEW-509U B boots and sea rches[...]

  • Page 22

    22 Chapter 4 – Maintenance This chapter describes how to un install or upgrade the Wireless Utility. 4.1 Uninst all the Driver Follow the steps be low to remove (or uninstall) the USB Adapter driver from your computer . Step 1. To remove the driver from the OS , go to Start -> Cont r ol Panel Step 2. Double-click System Step 3. Under Hardware [...]

  • Page 23

    23 Glossary For unfamiliar terms used below , loo k for entries elsewhere in the glossary . AD -HO C (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base st ation (access point). T wo or more wireless stations communicate directly to each other . An ad-ho[...]

  • Page 24

    24 RO A M I N G In an infrastructure network, wireless st ations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connecti on to the network. This i s roaming. As the wireless station moves from place to place, it is responsible for choosing the most[...]

  • Page 25

    25 Limited W arranty TRENDware warrants its pr oducts against defects in material and workmanship, under normal use and service, for the following leng ths of time from the d ate of purch ase. Wireless Products – 3 Y ears W arranty If a product doe s not operate as warranted above during the applicable warranty period, TRENDware shal l, at its op[...]

  • Page 26

    26[...]