Edimax Technology Adaptor manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Ir para a página of

Bom manual de uso

As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Edimax Technology Adaptor. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoEdimax Technology Adaptor vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.

O que é a instrução?

A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Edimax Technology Adaptor você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.

Infelizmente, pequenos usuários tomam o tempo para ler o manual Edimax Technology Adaptor, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.

Então, o que deve conter o manual perfeito?

Primeiro, o manual Edimax Technology Adaptor deve conte:
- dados técnicos do dispositivo Edimax Technology Adaptor
- nome do fabricante e ano de fabricação do dispositivo Edimax Technology Adaptor
- instruções de utilização, regulação e manutenção do dispositivo Edimax Technology Adaptor
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes

Por que você não ler manuais?

Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Edimax Technology Adaptor não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Edimax Technology Adaptor e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Edimax Technology na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Edimax Technology Adaptor, como para a versão papel.

Por que ler manuais?

Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Edimax Technology Adaptor, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.

Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Edimax Technology Adaptor. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação

Índice do manual

  • Página 1

    T T u u r r b b o o W W i i r r e e l l e e s s s s L L A A N N H H i i - - G G a a i i n n U U S S B B 2 2 . . 0 0 A A d d a a p p t t o o r r User Manual V ersion: 1.0 (November , 2005)[...]

  • Página 2

    COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No p art of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the pri[...]

  • Página 3

    Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limit s are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can r[...]

  • Página 4

    Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with PCMCIA slot on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electric[...]

  • Página 5

    CONTENTS 1 INTRODUCTION ............................................................................. 1 1.1 Features ......................................................................................................................... 2 1.2 Specifications ..........................................................................................[...]

  • Página 6

    1 Introduction Thank you for purchasing the 802.11g T urbo Wire less LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LA N standa rd and easy to carry with the Mini size. It is suitable for any Laptop or De skto p computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps).[...]

  • Página 7

    1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of s[...]

  • Página 8

    1.3 Package Contents Before you begin the inst a llation, please check the items of your p ackage. The package sh ould include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as pos sible. 3[...]

  • Página 9

    2 Installation Procedure Before you proceed with the install ation, please notice following descriptions. Note1: Please do not install the adaptor into your computer be fore ins talling the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server. ) N[...]

  • Página 10

    C. In Windows XP , there is a “Windows Zero Configur ation T ool” for you to setup the wireless adaptor . Y ou can choose to configure the adaptor through the Windows Ze ro Config uration T ool or the Ralink Configuration T ool for the adaptor . It is recommended to choose the Ralink Configurat ion T ool for the adaptor . Click “Next” to co[...]

  • Página 11

    E. The system start s to install the sof tware of the adaptor . Please follow the instructions of the program to plug in the adaptor into the USB port of your computer . And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation. 6[...]

  • Página 12

    3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adaptor and monitor the link status and the statis tics during the communi cation process. When the adaptor is installed, t he configuration utility will be displayed automatically. This adaptor will auto connect to wireless device w[...]

  • Página 13

    Second W ay A. Right-click the icon and select “V iew Available Wirele ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable the utility for the adaptor . Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link statu[...]

  • Página 14

    3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations withi n the acce ssible range of your adaptor and automati cally connect to the wireless device with the highest sign al strength. Fr om the “Site Survey”, a ll the networks nea rby will be listed. You ca[...]

  • Página 15

    3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles an d the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activat[...]

  • Página 16

    3.2.1 Con figure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Y ou may specify a SSID[...]

  • Página 17

    Parameter Description PSM (Power Saving Mode) The power saving func tion is only availab le whe n the network type is in Infrastructure. CAM (Const antly Awake Mode) – The adapto r will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network T ype Infrastructure – This operatio[...]

  • Página 18

    Parameter Description RTS Threshold Minimum packet size required for a n R TS (Request T o Send). For packet s smaller than this threshold, an R TS is not sent and the packet is transmitted direct ly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor chang e is recommended. Fragment Th reshold The value defines the m[...]

  • Página 19

    Parameter Description Authentication T ype LEAP – LEAP is a pre -EAP , Cisco-proprietary proto col, with many of the features of EAP protocol s. Cisco controls the ability of other vendors to implement this protocol, so it shoul d be selected for use only when limited vendor choice for client, access-point, and server products is not a co nce rn.[...]

  • Página 20

    Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p a cket is a kind of message transmitted over a networ[...]

  • Página 21

    The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are th ose prov ided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Poi [...]

  • Página 22

    3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a daptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are si milar and easier than TLS in that they[...]

  • Página 23

    Parameter Description T unneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected us er EAP Identity used for authentication. The identity specified may cont ai n up to 63 ASCII characters, is case sensitive and ta kes the form of a Networ[...]

  • Página 24

    Parameter Description Allow Intermediate Certificates A server desi gnates an issuer as a trusted root authority by placing the issuer's self-signed ce rtificate, which co ntains the issuer's public key, into the tr usted root certification authority certificate store of the host comp uter. Intermediate or sub ordi nate certification auth[...]

  • Página 25

    Parameter Description S tatus Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the networking. Link S peed (Mbps) Display the transmission and reception rate of the network. The maximum transmissi on rate is 54Mbp[...]

  • Página 26

    3.4 Statistics This option enables you to view the statistic informat ion of the con nection including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure mo re advan ced settings, for example: wireless mode, protection mode and etc. 21[...]

  • Página 27

    Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to s et the adaptor to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adaptor can be comp atible with both 802.1 1g and 802.1 1b wireless st ations. If there are only [...]

  • Página 28

    Parameter Description Enable TCP Window Size The TCP Window is the amount of dat a a sender can send on a particular connectio n before it get s an acknowledgment back from the receiver that it has gotten some of it. When the Ro uter or AP the adaptor is connecting to have s et up the TCP Window , you can enable the paramete r to meet the data size[...]

  • Página 29

    3.6 About By choosing this option, you can click the hyperlin k to connect the website for the information of the wireless chipset vendor an d review b asic informat ion about the Utility such as the Drive r, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.7 Turbo Mode This adaptor supports spe cific[...]

  • Página 30

    4 Troubleshooting This chapter provides solutions to pro bl ems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly beco[...]

  • Página 31

    6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi red Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix method [...]

  • Página 32

    13. What is Spread S pectrum ? S pread S pectrum technology is a wideb and ra dio frequency technique develop ed by the milit ary for use in reliable, secu re, missi on-critical communication systems. It is desig ned to trade off bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in[...]