Vai alla pagina of
Manuali d’uso simili
-
Network Card
Edimax EW-7206GAb
42 pagine 1.12 mb -
Network card
Edimax EN-9260TX-E
13 pagine -
Network card
Edimax HP-2002AC
21 pagine -
Network Card
Edimax HP-8501
20 pagine 0.78 mb -
Network Card
Edimax Ethernet Cardbus Adapter
21 pagine 0.46 mb -
Network Card
Edimax USB VoIP Gateway Box None
7 pagine 0.41 mb -
Network Card
Edimax EW-7126
24 pagine 0.6 mb -
Network card
Edimax EW-7128Gn
88 pagine
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Edimax EW-7612HPn. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Edimax EW-7612HPn o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Edimax EW-7612HPn descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso Edimax EW-7612HPn dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Edimax EW-7612HPn
- nome del fabbricante e anno di fabbricazione Edimax EW-7612HPn
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Edimax EW-7612HPn
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Edimax EW-7612HPn non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Edimax EW-7612HPn e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Edimax in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Edimax EW-7612HPn, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Edimax EW-7612HPn, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Edimax EW-7612HPn. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
[...]
-
Pagina 2
COPYRIGHT Copyright ©2009/2010 by this company. All ri ghts reserved. No part of this publication may be reproduced, transmitted, transcri bed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the prior[...]
-
Pagina 3
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radi[...]
-
Pagina 4
Federal Communication Commission (FCC) Radiation Exposure S tatement This EUT is compliance with SAR for gener al population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance wit h the measurement methods and procedures specified in OET Bulletin 65 Supplement C. The equipment version marketed in US is restricted[...]
-
Pagina 5
R&TTE Compliance Statement This equipment complies with all the r equirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND THE CO UNCIL of March 9, 1999 on radio equipment and telecommunication terminal E quipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and repl aces in the directive [...]
-
Pagina 6
English Copyright © by Edimax T echnol ogy Co, L TD. all ri g h t s r e s e r v e d . N o p a r t o f t h i s publication may be reproduced, tr ansmitted, transcribed, stor ed in a retrieval system, or translated into any languag e or computer language, in any form or by any means, electronic, mechanical, magnet ic, optical, chemical, manual or ot[...]
-
Pagina 7
CONTENTS 1 INTRODUCT ION ............................................................................. 1 1.1 Features ....................................................................................................................... .. 1 1.2 Specifications ....................................................................[...]
-
Pagina 8
1 1 Introduction Thank you for purchasing this high-spe ed wire less network card! Excepting common wirele ss standards 802.11b/g, this wirel ess network card is also able to access 802.11 n wireless networks - data transfer rate is 300Mbps, and that’ s three times faster than 802.11g wireless network! For WLAN security issues, this ada pter supp[...]
-
Pagina 9
2 • Temperature: Operating 32 ~104 ° F (0 ~40 ° C), Storage -13~149 ° F (-25~65 ° C) • Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the inst allation, please check the items of your p ackage. The package shoul d include the following items: • One USB Adapter • One CD (Driver/Utility/User’s Manual) • One [...]
-
Pagina 10
3 2 Installation Procedure Before you proceed with the inst allation, please notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/Vista/7.) Note2: If you have installed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Hard[...]
-
Pagina 11
4 Software Installation This wizard can be run in Windows 2000/XP/V ista/7. Y ou can install the Wireless Adapter by EZMAX Setup Wizard in the CD-ROM including in the p ackage. The wizard is an easy and quick configuration tool fo r internet connection with series process. When you start EZMAX Setup Wizard, you will get the following welcome scre e[...]
-
Pagina 12
5 I. Install the Driver and Utility A. Insert the Installation CD to your CD-R OM Drive. Execute the “Setup.exe” program. B. Select Setup Language and click “OK” to proceed. C. Click “Next” to go to the next step.[...]
-
Pagina 13
6 D. Now you’ll see the following message, pleas e cli ck ‘Install’ to begin the installation. E. The system start s to install the driver and utility .[...]
-
Pagina 14
7 F. Click “Finish” to complete the driver and utility inst allation.[...]
-
Pagina 15
8 II. Connect to W ireless Access Point A. T o start configuring the adapter , double click the icon in the system tray or right click the icon and select open confi guration utility . B. The utility of the adapter is displayed. Cli ck “A vailable Network” and double-clic k on the wireless access point you want to connect to.[...]
-
Pagina 16
9 C. Input the security setting and click “OK” to start network conn ection.[...]
-
Pagina 17
10 * Use Windows Zero Configuration on Windows V ista: A. For Windows Vist a user , you can use Windows Ze ro Configuration to connect to wireless access point. Click ‘S tart’ button, then click ‘Control Panel. Click ‘Network and Internet’ in Control Panel. B. Click ‘Connect to a network’ under ‘Network and Sharing Ce nter ’[...]
-
Pagina 18
11 C. Click the access point you want to us e if it’ s shown, then click ‘Connect’. D. If it’s an unnamed acce ss point (i.e. the SSID of this wireless access point is hidden), you’ll be prompted to input it’s nam e, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.[...]
-
Pagina 19
12 E. If the access point is protected by encryption met hod, you have to input it s security or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection bet ween your co mputer and wireless access point is successfully esta blished. Click ‘Close’ to start network connection.[...]
-
Pagina 20
13 3 Configuration Utility The Configuration Utility is a powerful application that helps you conf igure the Wireless LAN Mini USB Adapter and monitor the link status an d the statistics during the communication process. The Configuration Utility appears as an icon on the sy stem tray and desktop of Windows. You can open it by double-click on the i[...]
-
Pagina 21
14 3.1 Utility Overview There are several parts in the ut ility screen. Please refer to the fo llowing table for the descripti on. Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – Ther e are two modes: S tation and Access Point. If “S tation“ is selected, the adapter works as a wireless a dapter . If “Acce[...]
-
Pagina 22
15 It is the status bar that displays t he current status of the utility . T o close it, please disable the “S tatus Bar“ i n the “View“ item. There are several t abs in the block for you to setup the function of the adapter . Please refer to the description in the following sections. 1% ~ 100% Where you can adjust wireless Tx power ( wirel[...]
-
Pagina 23
16 Parameter Description Available Net work(s) This list shows all information of the available wireless networks within the range of your adapter . Th e information includes SSID, Channel, Encryption, Network Authentication, Signal and etc. If you want to connect to any network on the list, double-cli ck the selected netw ork. Refresh Click “Ref[...]
-
Pagina 24
17 Parameter Description S tatus It will show the connection st atus of the adapter . S peed It shows the current speed T ype Infrastructure – This operation mode require s the presence of an 802.1 1 Access Point. All communication is done via the Access Point or Router . IBSS – Select this mode if you want to connect to another wireless st ati[...]
-
Pagina 25
18 3.4 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Description Available Prof ile(s) This list shows the pref erre d networks for the wireless connectio n. Y ou can add, remove, edit, duplicate the preferred net wo[...]
-
Pagina 26
19 3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks ( Acce ss Point ). Network Name (SSID) The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Y ou may s[...]
-
Pagina 27
20 Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network yo u are connecting to. Network Authentication This setting has to be co nsistent with the wireless networks that the adapter intends to connect. Open System – No authe [...]
-
Pagina 28
21 Parameter Description Data Encryption Disabled – Disable the WEP Data Encryption. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) chang es the temporal key every 10,000 packets (a p acket is a kind of message transmitted ov[...]
-
Pagina 29
22 Parameter Description Confirm Network Key Please enter network se curity key here again. EAP T ype GTC – GTC is an authentication proto col which allows the exchange of clear text authentic ation credential s across the network. TLS – TLS is the most secure of the EAP protocols but not easy to use. It requires that digit al ce rtificates be [...]
-
Pagina 30
23 3.5 Status This screen shows the information of manufactu rer, driver version, se ttings of the wireless network the adapter is connecting to, linking time and link stat us. If you don’t ensure the status of the adapt er and the network you are con necting, please go to the screen for more details.[...]
-
Pagina 31
24 3.6 Statistics You can get the real time information about t he packet transmissi on and receiving status duri ng wireless communication from the screen. If you want to recount the statistics va lue, please click “Reset“.[...]
-
Pagina 32
25 3.7 Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wirele ss networ k technology which makes wireless n etwork setup become very simple. If you have WPS-enabled wireless a ccess point, and you want to establish a secure connection to it, you don’t have to configu re the wireless access point and setup data encryption by yo[...]
-
Pagina 33
26 3. If you click ‘Yes’, and the following me ssage will appear on your computer, please select the SSID of wireless access point that you wish to co nnect and click ‘Select’. 4. Please wait while the install procedure is running an d wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you’ll b[...]
-
Pagina 34
27 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless conne ction by W PS. Please be patient (This may require several seconds to one minute to comp[...]
-
Pagina 35
28 3.8 Software AP You should click “ Mode “ and sele ct “Access Poin t “ to enable Software AP mode.This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, WEP encrypti on and so on are described as follows. Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique[...]
-
Pagina 36
29 3.8.1 AP Properties Setti ng Please refer to Section 3.4.1 for the setti ng of the parameters for AP. Note that Ad Hoc mode is not enabled for AP.[...]
-
Pagina 37
30 3.8.2 AP Advanced Parameter Description Beacon Interval Beacon Interval t hat specifies the duration between beacon packet s (milliseconds). The r ange for the beacon period is between 20-1000 milliseconds with a typical value of 100. DTIM Period Determines the interval th e Access Point will send its broadcast traffic. Defaul t value is 3 beaco[...]
-
Pagina 38
31 3.8.3 AP St atistics You can get the real time information about t he packet transmissi on and receiving status during wireless communication from the screen. If you want to recount the statistics va lue, please click “Reset“.[...]
-
Pagina 39
32 3.8.4 ICS If you want to connect to the internet through this SoftAP, you will need to make a bridge between our SoftAP and your internet connect. Select the inte rnet connection in your SoftAP host machine and press the “Apply” button.[...]
-
Pagina 40
33 4 Troubleshooting This chapter provides solutions to pro blems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g st andard? 802.1 1g is the new IEEE st andard fo r high-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly b [...]
-
Pagina 41
34 6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi red Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix meth[...]
-
Pagina 42
35 13. What is Spread S pectrum ? S pread S pectrum technology is a wideband radio frequency tech nique developed by the military for use in reliable, secure, missi on-critical communication systems. It is desig ned to trade off bandwidt h efficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in t[...]
-
Pagina 43
36 Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limit s for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and c[...]
-
Pagina 44
37 R&TTE Compliance S t atement This equipment complies with all the requirement s of DIRECTIVE 1999/5/EC OF THE EUROPEAN P A RLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in th e direct[...]
-
Pagina 45
38[...]