MicroNet Technology SP907NL manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation MicroNet Technology SP907NL. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel MicroNet Technology SP907NL ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation MicroNet Technology SP907NL décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation MicroNet Technology SP907NL devrait contenir:
- informations sur les caractéristiques techniques du dispositif MicroNet Technology SP907NL
- nom du fabricant et année de fabrication MicroNet Technology SP907NL
- instructions d'utilisation, de réglage et d’entretien de l'équipement MicroNet Technology SP907NL
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage MicroNet Technology SP907NL ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles MicroNet Technology SP907NL et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service MicroNet Technology en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées MicroNet Technology SP907NL, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif MicroNet Technology SP907NL, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation MicroNet Technology SP907NL. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    User ’ s Manual 1 1n W ireless LAN USB Adapter Model No.: SP907NL http://www.micronet.info[...]

  • Page 2

    Table of Contents Chapter 1 Introduction ................................................................................. 1 1.1 Package C ontents .......................................................................................... 1 1.2 Key Features .............................................................................................[...]

  • Page 3

    4.6 Statistic s ...................................................................................................... 40 4.7 About ........................................................................................................... 41 Chapter 5 Troubleshooting ....................................................................... 43 Chapte[...]

  • Page 4

    1 Chapter 1 Introduction Micronet SP907NL, 11N Wireless LAN USB Adapter, delivers next generation high speed at a more economical and affordable pr ice tag. It is easily implemented for medium-sized business to allow imm ediate access to high speed wireless experience. It is compliant with IEEE 802.11n and backward compatible with IEEE 802.11b/g. T[...]

  • Page 5

    2 y WPS configuration for easier c onnection between adapter and AP/router. Enable connection via pushing a butt on or entering an 8-digit code. y Support the commonly available interface USB 2.0 to allow convenient installation. 1.3 Safety Information In order to keep the safety of users, please read through the following safety instructions: y Th[...]

  • Page 6

    3 1.5 Specifications Standards IEEE802.11b/ 802.11g / 802.11n Interface USB 2.0/1.1 Frequency Band 2.4000 ~ 2.4835GHz Data Rate z 11b: 1/2/5.5/11Mbps z 11g: 6/9/12/24/36/48/54Mbps z 11n (20MHz): MCS0-7 (up to 72Mbps) z 11n (40MHz): MCS0-7 (up to 150Mbps) Output Power z 11n: 14dBm ± 1.5dBm z 11g: 14dBm ± 1.5dBm z 11b: 17dBm ± 1.5dBm Security z WE[...]

  • Page 7

    4 Chapter 2 Tour of Product 2.1 USB Adapter 1. USB Connector: insert this side of the device into an available USB slot. 2. Connector Cab: for protecting device when not in use. 3. WPS button: located on the bottom side of the device for activating WPS pairing mode. 4. Link/Activity LED: indicate device is in use or traffic activity is evident. 2.1[...]

  • Page 8

    5 Chapter 3 Configuration 3.1 Drivers Installation Step 1. Gently insert the USB adapter into an available USB slot. The following message will appear, please press <Cancel> . Step 2. Insert driver CD into the CD/DVD ROM drive of the computer, and execute ‘Setup.exe’ program in ‘Utility’ folder. Read through the License Agreement and [...]

  • Page 9

    6 Step 3. It is recommended to select ‘Install driver and Ralink WALN Utility’ for first-time installation. Otherwise select second option to update existing drivers. Step 4. The following windows will appear, pleas e press on ‘Install’ to start the process.[...]

  • Page 10

    7 Step 5. Click <Finish> to complete the driver installation process. 3.2 Operating Configuration Utility After installation is complete, wireless configuration utility will be shown as an icon at the lower-right corner of the windows desktop. Click on the icon using right mouse key and select <Launch Config Utilities>.[...]

  • Page 11

    8 Step 1. Configuration utility will scan for available wireless access points automatically. Please select an access point to connect, and click <Connect> . If the AP you wish to connect is not in the list, please press <Rescan> to renew the interface. Some function includes more information, and can not be fitted in setup area. In thi[...]

  • Page 12

    9 3.2.1 Scan for Other Wireless Devices There are two kinds of wireless connec tion mode: Infrastr ucture and Ad-Hoc. Infrastructure mode is used by wirel ess access points, which is able to establish wireless connection for you and other wireless/wired network clients. Ad-Hoc mode is also know as ‘point-to- point’ mode, and in this mode, wirel[...]

  • Page 13

    10 y If the wireless device uses encryption, the user must know its encryption key in order to connect. Please launch utility and it will scan for wireless access points near by: Parameter Description SSID The SSID of the wireless access point or wirele ss d e vice selected by user will be displa yed here. When the SSID of access point or wireless [...]

  • Page 14

    11 If users cannot see the access point, please click ‘Rescan’ button to scan for access point again, until t he one preferred is displayed on the interface. Users may have to click ‘Rescan’ for more than two times before the access point wish to connect appears. If user still cannot see the access point after clicking ‘Rescan’ for more[...]

  • Page 15

    12 Step 1. Click the wireless access point or network device to connect, it will be highlighted, then click on ‘Connect’. If the access point selected does not use encryption, it will connect to this device within one minute. If the access poi nt selected uses encryption, please proceed to step 3. Step 2. If the wireless access point does not h[...]

  • Page 16

    13 Step 4. Please ask the owner of the wirele ss access point for the security information, and input the correct key here and then click on ‘OK’. By checking ‘Show Password’ box, the encryption key inputted here will be display ed. Authentication type will be selected by t he access point automatically, pleas e do not change it. However, i[...]

  • Page 17

    14 3.2.3 Add Access Point to Profile If users connect to some specific wireless access point frequently, they can add their information to the profile. Just lik e the telephone direct ory, the profile saves all information of access points, and user can recall them anytime. User can add an access point in the ‘Network’ t ab to profile, or input[...]

  • Page 18

    15 Parameter Description Profile Name User can give this profile a name. Every profile need s a unique name. SSID Please input the SSID of this access point. If user selected a n access point from the list, and SSID is not hidden, it will be filled automatically. However, user can modify the SSID if necessary. Network Typ e Please select the networ[...]

  • Page 19

    16 Parameter Description Authentication Select the authentication type of the wireless access point or wireless device in this field. When use rs are ad ding a profile from an existing access point or wireless device, authentication type will be selected automatically. Encryption Select the encryption type of the wireless access poin t or wireless [...]

  • Page 20

    17 Parameter Description EAP Method Select ‘802.1x EAP method’ from dropdown menu. Please ask the administrator of the access point for the correc t EAP method. Tunnel Authentication Select 802.1x tunnel authentic ation type from dropdown menu. Please ask the administrator of the acce ss point for correct tunnel authentication met hod. Thi s pu[...]

  • Page 21

    18 3.2.4 Using Windows Zero Configuration Windows XP and Vista has a built-in wirel ess network configuration utility, called ‘Windows Zero Configuration’ (WZC). Users can also use WZC to configure the wireles s network parameter. Step 1. Right-click on configurati on utility icon and select <Use Zero Configuration as Conf iguration utility&[...]

  • Page 22

    19 Step 3. Click <Network Connections> . Step 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’. Step 5. All wireless access points within prox i[...]

  • Page 23

    20 to the access point. Otherwise, users c an press refresh butt on to rescan access points. Select the access point if it’s shown, then click <Connect> . Step 6. If the wireless access point uses encryption, users will have to input the correct WEP passphrase or WPA pre-shar ed key. Ensure both the AP and PC is set with the same WEP passph[...]

  • Page 24

    21 3.2.5 Profile Management If users need to connect to different wireless access points at different time, they can store the connection parameters (e ncryption, passphrase, security etc, etc.) as a profile for every access poin t. Click the ‘Profile’ menu and all profiles will be listed in ‘Profile Li st’. Users can select a pr ofile from[...]

  • Page 25

    22 Add a Profile If users want to create new profile, click ‘Profile’ menu, then press ‘Add’ button. The interface will prompt the user to input detailed information of access point. Edit a Profile[...]

  • Page 26

    23 If users have added a profile before, and th ey wish to change the content of the profile, they can use this function. Please select a profile from the list, and then click on ‘Edit’ button. The interface will provide contents of selected profile for editing. Click on ‘OK’ to save changes, or click ‘Cancel’ to discard changes. Delete[...]

  • Page 27

    24 Activate a Profile When users want to connect to a specific wireless device in the profile list, they can select it and click ‘Activate’ button to establish connection.[...]

  • Page 28

    25 When a profile is selected and cl ick on ‘Activate’ button, an icon will be displayed in front of the profile to show that the connection has failed. When the connection is successfully established, an icon will be displayed. 3.2.6 Advanced Settings This wireless network card provides several advanced settings for experienced wireless users.[...]

  • Page 29

    26 Enable CCX Enable Cisco Compatible eXtensi o ns. CCX is a wireless feature developed by Cisco used to imp rove the wi reless performance with CCX compatible wirel ess devices. Check this box if the users need to conne ct to CCX -compatible wireless devices. When CCX is en able d, the following setup items will become available: ¾ Turn on CCKM: [...]

  • Page 30

    27 3.2.8 WMM Setting This wireless network card provides WM M (Wi-Fi Multimedia) function, which can improve the performance of certain network applications, like audio/video streaming, network telephony (VoIP), and others. When the users enable the WMM function of this network card, they ca n define the priority of different kinds of data to give [...]

  • Page 31

    28 3.2.9 WPS Configuration Wi-Fi Protected Setup (WPS) is the la test wireless network technology, which makes wireless network setup become very simple. The user doesn’t have to configure the wireless access point and setup data encryption when devices support WPS. This wireless network card is compatible with WPS. To use this function, the wire[...]

  • Page 32

    29 All access points with WPS function enabled will be displayed her e. Please make sure the access point users wish to connect is displayed. If not, please click ‘Rescan’ few more times. The user can also click ‘Information’ button to see the detailed information about selected access point. Step 3. Start PBC pairing procedure at access po[...]

  • Page 33

    30 Users can click ‘PBC’ button few more times to try again. When an access point is connected, users can click ‘Disconnect’ to disconnect your wireless network card from a connected access point. Users can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. WPS Setup – PIN The PIN c[...]

  • Page 34

    31 Parameter Description WPS associate IE Check this box to send the association reque st with WPS IE during WPS setup. WPS probe IE Check this box to send the WPS probe request with WPS IE during WPS setup. Auto When in PIN mode, wireless a c ce ss point to be connected will be selected automatically if this box is checked. 3.2.10 Radio On/Off Use[...]

  • Page 35

    32 3.2.11 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless network card.[...]

  • Page 36

    33 Chapter 4 Soft-AP Function Besides becoming a wireless client of other wireless access points, this wireless card can also act as a wireless service provider. Users can switch this wireless card’s operating mode to ‘AP’ to simulate the function of a real wireless access point by software and ev en sharing the internet connection. Please fo[...]

  • Page 37

    34 If the computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’. If your computer does not have another network card with In ternet connection, please click ‘Not enable ICS’. After clicking on ‘Enable ICS’ or ‘Not enable ICS’, the user will see the ba[...]

  • Page 38

    35 Parameter Description SSID Please input the SSID (the name used to identify this wireless access point) in this field. Up to 32 numeri cal characters can be accepted here excepting spa c e. Channel Please select the wireless cha nnel to use for the environment. The number of channels availabl e here will vary depending on the setting of ‘Count[...]

  • Page 39

    36 Country Region Code Please select the country code of the co untry or regio n. Available options are 0-7, wh ich will affect the available wireless chan nels: 0: FCC (US, Canada, and other countrie s uses FCC radio communication stand ards) 1: ETSI (Europe) 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISERAL (Channel 3 to 9) 7: ISERAL (Channel 5[...]

  • Page 40

    37 Parameter Description Authentication Type Please select a wireless authenticatio n type to use. Available options are ‘Open’, ‘Share d’, WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If users wa nt to disable wireless data encryption, please select ‘Ope n’. Encryption Ty pe Please select an encryption mode. The available [...]

  • Page 41

    38 WEP Key Please input the WEP encryption key in this field when ‘WEP’ is selected. There are 2 types of WEP key: Hex (number 0 to 9, and ASCII characters A to F) and ASCII (all alphanumerical characters plus symbol s). Please sel ect the type of WEP key first, and then input the WEP key according to the type of WEP key select ed. If users wan[...]

  • Page 42

    39 Parameter Description Access Policy Select the policy type of your access rule. ¾ Disable: Allow any wireless client with p rop er authentication settings to connect to this access poin t. ¾ Allow All: Only allow wire less client s with MAC address listed here to connect to this access point. ¾ Reject All: Reject wirele ss clients with MA C a[...]

  • Page 43

    40 Parameter Description MAC Address Displays the MAC address of this wireless client. AID The serial number of this wireless connection. Power Saving Mode Displays the capability of pow er-saving function of this wireless client. Status Displays additional information of this wireless Conn ection, like current wireless operating mod e and data tra[...]

  • Page 44

    41 4.7 About The ‘About’ tab provides the info rmation about version number of the configuration utility, driv er, and other important information about the wireless access point.[...]

  • Page 45

    42[...]

  • Page 46

    43 Chapter 5 Troubleshooting If users encounter any problem when using th is wireless network card, consult this section for possible solutions. Before calli ng the dealer of purchase for help, please check this troubleshooting table, the solu tion towards the problem could be very simple. Scenario Solution I can’t find any wireless access point [...]

  • Page 47

    44 Chapter 6 Glossary 1. What is the I EEE 802.11g standard? 802.11g is the new IEEE standard for hi gh-speed wireless LAN communications that provides up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LA N technology for the home, office and public networks. 802.11g defines the use of the same OF[...]

  • Page 48

    45 z RTS/CTS Feature z Fragmentation z Power Management 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers with their own Wireless LAN Card connecting as an independent wire less LAN. Ad hoc wireless LAN is applicable at a departmental scale fo r a branch or SOHO operation. 5. What is Infrastructure? An integrated wireless[...]

  • Page 49

    46 9. What is AES? AES (Advanced Encryption Standard), a ch ip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, while making more efficient use of har dware and/or software than previous encryption standards. It is also included in IEEE 802.11i standar d. Compare with AES, TKIP is[...]

  • Page 50

    47 13. What is Spread Spectrum? Spread Spectrum technology is a wi deband radio frequency technique developed by the military for use in reliable, secu re, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more b andwidth is consumed than in the case of[...]

  • Page 51

    48 16. What is GI? GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devic es using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability. 17. What is STBC? STBC stands for Space-Time Block Coding, which [...]