TRENDnet Wireless N Gaming Adapter manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation TRENDnet Wireless N Gaming Adapter. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel TRENDnet Wireless N Gaming Adapter ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation TRENDnet Wireless N Gaming Adapter décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation TRENDnet Wireless N Gaming Adapter devrait contenir:
- informations sur les caractéristiques techniques du dispositif TRENDnet Wireless N Gaming Adapter
- nom du fabricant et année de fabrication TRENDnet Wireless N Gaming Adapter
- instructions d'utilisation, de réglage et d’entretien de l'équipement TRENDnet Wireless N Gaming Adapter
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage TRENDnet Wireless N Gaming Adapter ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles TRENDnet Wireless N Gaming Adapter et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service TRENDnet en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées TRENDnet Wireless N Gaming Adapter, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif TRENDnet Wireless N Gaming Adapter, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation TRENDnet Wireless N Gaming Adapter. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    - 1 -[...]

  • Page 2

    S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FC C Rules. These limits are designed to provide reasonable protection against harmful interference in a re sidential installation. This equipment generates uses and can radiate radio frequency energy and, if not i[...]

  • Page 3

    - 3 - firmware setting is not accessible by the end user . European Union Notice: Radio products with the CE marking comply wit h the R&TTE Dir ective (1999/5/EC), the EMC Directive (89/336/EEC) and the Low Voltage Directive (73/23/EEC ) issued by the Commission of the European Community. Compliance with these directives implies co nformity to [...]

  • Page 4

    Table of Contents T able of Contents .............................................................................................................................. ........ 4  1.  Getting Started with the TEW - 647GA ................................................................................................ 6  1.1.  Package Content[...]

  • Page 5

    C .............................................................................................................................. ............................. 42  D .............................................................................................................................. ............................. 42  E ................[...]

  • Page 6

    1. Getting Started with the TEW-647GA Congratulations on purchasing the TEW -647GA! Th is manual provides information for setting up and configuring the TEW -647GA. This manual is intended for both home users and professionals. 1.1. Package Content s z TEW-647GA Wireless N Gaming Adapter z CD-ROM (User ’s Guide) z Multi-Language Quick Installatio[...]

  • Page 7

    2. Introduction The TEW -647GA Wireless N Gaming Adapter is an high-performance, supports high-speed wireless networking at home, at wo rk or in public places. This bridge is also back comp atible with 802.1 1g or 1 1b devices. This means that you do not need to change your entire network to maintain connectivity . Y ou may sacrifice some of 1 1n?[...]

  • Page 8

    3. Hardware Overview 3.1. LED Indications 8[...]

  • Page 9

    3.2. Rear Panel 3.3 T op View 3.4 Bottom V iew 9[...]

  • Page 10

    3.3 Inst allation Considerations The TEW-647GA Gaming Adapter allows you to access your network by using a wireles s connection from virtually any where within its oper ating range. Keep in mind that the number , thickness and location of walls, ceil ings, or other objects that the wireless signals must pass through, ma y limit the range. T ypical [...]

  • Page 11

    3.4 Getting S t art 1. Insert Setup Wizard CD into your CD-ROM drive. 2. The Welcome screen appears on your monitor. Click Setup Wizard button. 3. Read the License Agreemen t, accept the terms and click Next to continue the installation. 11[...]

  • Page 12

    4. Connect an Ethernet cable from the LAN port on your PC to the LAN port on the TEW-647GA, click Next to continue. 5. Plug in the power adapter and verify the Power & Ethernet LEDs are light. 12[...]

  • Page 13

    6. The search window will detect the c onnected TEW -647GA on our pc and display information here. Click Configure to continue (default TEW -647GA IP Address is 192.168.10.1 10). 7. Enter the password for TEW-647GA the click Login . The default password is “blank”. 13[...]

  • Page 14

    8. To change new password, please enter the new password below then click Change . Note: To continue without changing the password, please click on the Skip button 9. There are 2 options to configure this adapter, WPS (Wi-Fi Protected Setup) or Manual Setup. To setup with WPS method, continue to step 10 or to perform a Manual setup, please go to st[...]

  • Page 15

    When selecting PBC method, once the Enable WPS is clicked, also press the WPS on your wireless router, t he devices would negotiate and connection automatically. When using the PIN Method , please enter the Device PIN num ber on your router and save it. Use Site Survey button to find the router you would like to connect then click Enable WPS , then[...]

  • Page 16

    11. When the connection is made, it is recomme nded that you save or print your wireless settings with the Save or Print buttons. Click Apply to continue. 12. Disconnect the Ethernet cable from your PC to the destination game console. 16 13. Congratulations you hav e configured you TEW-647GA.[...]

  • Page 17

    14. When using Manual Setup , you can select to receive an IP address dynamically from the router or to use an fix IP address that matches your network segment on TEW-647GA. Once you made the selection, click Next to continue. To use static IP, please make sure it matches your wireless network. Click Configure to continue. 17[...]

  • Page 18

    15. Enter a SSID for TEW-647GA, click Next button. Note: Enter the SSID of the wireless router/a ccess point you would like to connect to. Select the wireless mode and the security m ode that your current wireless network is 18 using.[...]

  • Page 19

    WEP Encryption 16. To use WEP security, select WEP and click Next button. Select 64-bit or 128-bit WEP key length, and enter your WEP key. For 64-bit encryption, enter 10 hexadecimal characters, For 128-bit encryption, enter 26 hexadecimal characters. Click Next to continue the setting. WPA-PSK/WPA2-PSK 17. To use WPA or WPA2 security, select WPA o[...]

  • Page 20

    18. Confirm your new settings. It is recommended that you save or print your wireless settings with the Save or Print buttons. Once finished, click Apply to continue. 20 19. Disconnect the Ethernet cable from your PC to the destination game console.[...]

  • Page 21

    20. Congratulations you hav e configured you TEW-647GA. 21[...]

  • Page 22

    4. Using the Configuration Menu Whenever you want to configure your TEW - 647GA, you can access the Configuration Menu through your PC by opening the Web-browser and ty ping in the IP Address of the TEW - 647GA. The TEW -647GA ’ s default IP Address is http://192.168.10.1 10 ¾ Open the Web browser . ¾ T ype in the IP Address of the Bridge (http[...]

  • Page 23

    4.1. Network 4.1.1 LAN Setting LAN Connection T ype Choose "S tatic IP (fixed IP)" if your router does not support DHCP or if for any other reason you need to assign a fixed address to the AP . In this case, you must also configure the following fields. IP Address The IP address of this gami ng adapter on the local area network. Assign an[...]

  • Page 24

    4.2 Wireless 4.2.1 Profile Create a custom connection to a specific wirele ss network. Use this option to make custom profiles and store new profile for later use. Configure the setting to connect to a wireless net work, selection option for network type, SSID, and wireless security . The profile can be edited, deleted and made active from this opt[...]

  • Page 25

    When adding an Profile, please make sure your information ma tches your existing wireless network. Security Mode Unless one of these encryption modes is selected, wireless transmission s to and from your wireless network can be easily intercepted and interpreted by unauthorized users. None No encryption. WEP (Open or Shared) 25 A method of encrypti[...]

  • Page 26

    provided so you can enter a string that is easier to remember. The ASCII string is conv erted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Key Length Hex ASCII 64-bit 10 characters 5 characters 128-bit 26 characters 13 characters WPA-Personal or WPA2-[...]

  • Page 27

    4.2.2 Site Survey Use the Site Survey tool to search for wireless networks around the TEW -647GA adapter . Click on the Scan button to search for wireless network to join. From this window , you can also add the selected network to your profile by clicking the Add Profile button. T o connect to the desire wireless network, click on the Connect butt[...]

  • Page 28

    4.2.3 S t atistics V iew the current operating st atus of the TEW -647GA, see the T ransmit and Receive data. 28[...]

  • Page 29

    4.2.4 Advance Use this setting to adjust the wireless environment. Wireless Modes 2.4GHz 802.1 1b/g mixed mode - This wireless mode works in the 2.4GHz frequency range and will allow both wireless b and wirele ss g client to connect a nd access the TEW -647GA at 1 1Mbps for wireless b, at 54Mbps for wirele ss g and share access at the same time. Al[...]

  • Page 30

    2.4GHz 802.1 1 n only – This wireless mode works in the 2.4GHz frequency range and will only allow the use of wireless n client devices to connect and access the TEW -647GA. Although the wireless n operates in the 2.4GHz frequency , this mode will only permit wireless n client devices to work and will exclude any other wireless mode and devices t[...]

  • Page 31

    Using “Auto” option can increase throughput. Howe ver, it can also increa se error rate in some installations, due to increased sensit i vity to radio-frequency reflections . Select the option that works best for your installation. MCS Fix MCS rate for HT rate. (Auto, 0~32) The Modulation and Coding Scheme (MCS) is a value that determines the m[...]

  • Page 32

    WMM Power Saving An option that allows wireless clients such as notebooks or Laptop s to save battery life by sending less transmission during idle times. Add a check mark to enable this option. PS Mode Used for specific application when using W MM Power Saving mode is enabled, use this feature to help with Quality of Service (Q oS) settings; these[...]

  • Page 33

    4.2.6 WPS Y ou can setup security easily by choosing PIN or PBC method to do Wi -Fi Protected Setup. PIN Start or PBC Start Enable the WPS feature. 33[...]

  • Page 34

    PIN Settings A PIN is a unique number that can be used to ad d to the rout er and use t hat as an au thentication key to join the existing wireless network. Client PIN Shows the current value of the adapter. Renew PIN Create a random number that is a valid PIN. This becomes the adapter’s PIN. You can then copy this PIN to the wireless router’s [...]

  • Page 35

    4.2 Administrator 4.2.1 Management At this page, you can configure ad ministrator account and password. 35[...]

  • Page 36

    4.2.2 Upload Firmware By assigning firmware location, you can upload firmware at this page. Once you have a firmware saved on your computer , use this option to browse for the file and then click Apply to upload the file into the adapter . 36[...]

  • Page 37

    4.2.3 Setting Management Y ou can save system settings by exporting them to a configuration file, restore them by importing the file, or reset them to factory default. 37[...]

  • Page 38

    Export Settings This option allows you to export and then save t he router's configuration to a file on your computer . Be sure to save the configur ation before performing a firmware upgrade. Import Settings Use this option to restore previously saved router configuration settings. Load Factory Default s This option restores all configuration[...]

  • Page 39

    4.2.4 Stat u s Y ou can check system information and network configurations on this page. 39[...]

  • Page 40

    Glossary A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network Peer-to-Peer network between wireless clients Address Resolution Protocol ARP. Used to map MAC addre sses to IP add[...]

  • Page 41

    To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA. An IP address that that a Windows computer will assign itself when it is configured to obtain an IP addre ss automatically but no DHCP se rver is available on the network B Backward Compa[...]

  • Page 42

    C CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that reques ts data from a server Collision When do two devices on the same Ethernet net work try and transmit data at the exact same time. Cookie Information that is stored on the hard drive of your computer that holds your preferences to the site that [...]

  • Page 43

    A predetermined value or setting that is used by a program when no user input has been entered for this value or setting DHCP Dynamic Host Configuration Protocol: Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate: An electronic method of providing credentials [...]

  • Page 44

    The most widely used technology for Local Area Networks. F File server A computer on a network that stores data so that the other comput ers on the network can all access it File sharing Allowing data from computer s on a network to be access ed by other computers on the network with different levels of access rights Firewall A device that protects[...]

  • Page 45

    GUI Graphical user interface H Half-duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being tr ansmitted from one AP to another Host Computer on a network HTTP Hypertext Transfer [...]

  • Page 46

    IIS Internet Information Server is a WEB serv er and FTP server provided by Microsoft Infrastructure In terms of a wireless network, this is w hen wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP /IP to allow for resources to be accessed from computers around the world Internet[...]

  • Page 47

    IPX Internetwork Packet Exchange is a network ing protocol developed by Novel to enable their Netware clients and servers to communicate ISP Internet Service Provider J Java A programming language used to create pr ograms and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte L LAN Local Area Network Latency The amount of time that it [...]

  • Page 48

    L2TP Layer 2 Tunneling Protocol M MAC address A unique hardware ID assigned to every Et hernet adapter by the manufacturer. Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connecti on to a straight-through cable MDIX Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable MIB[...]

  • Page 49

    NAT Network Address Translation allows many private IP addresses to connect to the Internet, or another network , through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communica tion protocol. This is an updated version of NetBIOS NetBIOS Network Basic Input/Output System Netmask Determines what portion of an IP add[...]

  • Page 50

    Open Systems Interconnection is the refer ence model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing tabl e are sent to all the other APs in the network as opposed to sending the entire routing tabl[...]

  • Page 51

    PPPoE Point-to-Point Protocol over Ethernet is us ed to connect multiple co mputers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Au[...]

  • Page 52

    RJ-45 The most commonly used connection method for Ethernet RS-232C The interface for serial communication betwe en computers and other related devices RSA Algorithm used for encrypt ion and authentication S Server A computer on a network that provides servic es and resources to other computers on the network Session key An encryption and decryptio[...]

  • Page 53

    Small Office/Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that m onitors outgoing and incoming traffi c to make sure that only valid responses to o[...]

  • Page 54

    Throughput The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between y ou computer and specific destination U UDP User Datagram Protocol Unicast Communication between a singl e sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and c onfi[...]

  • Page 55

    VPN: A secure tunnel over the Internet to connect remote offices or users to their company's network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN VoIP Voice over IP W Wake on LAN Allows you to power up a computer though it's Network Interface Card WAN Wide Area Network WCN Windows Conne[...]

  • Page 56

    Wi-Fi Protected Access An updated version of security for wireless ne tworks that provides authentication as well as encryption Wide Area Network The larger network that your LAN is connect ed to, which may be the Internet itself, or a regional or corporate network Wireless ISP A company that provides a broadband Inter net connection over a wireles[...]

  • Page 57

    Specifications Ha rdwa re  Standards  IEEE  802.11b,  IEEE  802.11g  and  IEEE  802.11n  (dr aft  2.0)  LED  Indicator  WPS,  WLAN,  LAN ,  Po w er  Powe r  Consumption  Standby  mode:  160mA  (max)  ;  Tra n s m i t  mode  :  210mA  (max)  Supported  OS ?[...]

  • Page 58

    Limited Warranty TRENDnet  war rants  its  products  ag ainst  def ects  in  material  and  workmanship,  under  normal  use  and  service,  for  the  fo llowing  lengths  of  time  from  the  da te  of  purchase.    TEW ‐ 647GA  –  3 [...]

  • Page 59

     W ARRANTIES  EX CLUSIVE :  IF  THE  TRENDNET  PRODUCT  DOES  NO T  OPE RA TE  AS  W ARRANTED  ABOVE,  THE  CUST OMER’S  SOLE  REMED Y  SHALL  BE,  AT  TRENDNET ’S  OPTION,  REP AIR  OR  REPL ACE.  THE  FOREG OIN G  W ARRANTIES  AND  REMEDIES  ARE  EX C[...]

  • Page 60

    60[...]