Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Topcom 4001G, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Topcom 4001G one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Topcom 4001G. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Topcom 4001G should contain:
- informations concerning technical data of Topcom 4001G
- name of the manufacturer and a year of construction of the Topcom 4001G item
- rules of operation, control and maintenance of the Topcom 4001G item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Topcom 4001G alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Topcom 4001G, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Topcom service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Topcom 4001G.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Topcom 4001G item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
S S k k y y r r @ @ c c e e r r U U S S B B 4 4 0 0 0 0 1 1 g g Full User Guide[...]
-
Page 2
[...]
-
Page 3
CONTENTS 1.1 Features ......................................................................................................................... 2 1.2 Specifications ................................................................................................................ 2 1.3 Package Contents .................................................[...]
-
Page 4
1 Introduction Thank you for purchasing the 802.11g Wirel ess LAN USB Adapter. This USB adapter is de si gned to comply with IEEE 802.11g Wireless LA N standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). It supp[...]
-
Page 5
1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wirel ess network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of s[...]
-
Page 6
1.3 Package Contents Before you begin the inst a llation, please check the ite ms of your p ackage. The packag e should include the following items: • One USB Adaptor • One CD (Driver/Utility/User’s Manual) 3[...]
-
Page 7
2 Installation Procedure Before you proceed with the inst all ation, please notice following descriptio ns. Note1: Please do not install the adaptor into your computer be fore ins talling the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/2003 Server.) Note3: I[...]
-
Page 8
C. If you need the adaptor to operate with better pe rformance, please choose the “Optimi ze for performance” to enable the Tx Burst mode. Or you ca n choose “Optimize for Wi-Fi mode” to le t the adaptor run in st an dard wireless netwo rk. 5[...]
-
Page 9
D. The system start s to install the sof tware of the adaptor . Please follow the instructions of the program to plug in the adaptor into the USB port of your computer . And the system will automatically detect the adaptor E. Please click “Finish” to complete the installation. 6[...]
-
Page 10
3 Configuration Utility The Topcom Configuration Utility is a powerful a ppl ication that helps you configure the USB adaptor and monitor the link status and the statis tics during the communi cation process. When the adaptor is installed, t he configuration utility will be displayed automatically. This adaptor will auto connect to wireless device [...]
-
Page 11
3.1 Site Survey When you open the Topcom Configuration Utility, t he system will scan all the ch a nnels to find all the access points/stations within the acce ssible range of your ad aptor and automatically connect to the wireless device with the highest sign al strength. Fr om the “Site Survey”, a ll the networks nea rby will be listed. You c[...]
-
Page 12
3.2 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activate[...]
-
Page 13
3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevent s the uni ntentional merging of two co-located WLANs. Y ou may specify a SSI[...]
-
Page 14
Parameter Description PSM (Power Saving Mode) The power saving func tion is only availab le whe n the network type is in Infrastructure. CAM (Const antly A w ake Mode) – T he adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network T ype Infrastructure – This operat[...]
-
Page 15
Parameter Description RTS Threshold Minimum packet size requi red for an RT S (Request T o Send). For packet s smaller than this threshold, an RTS is not sent and the packet is transmitted direct ly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor chang e is recommended. Fragment Th reshold The value defines the ma[...]
-
Page 16
Parameter Description Authentication T ype LEAP – LEAP is a pre-EA P , Cisco-proprieta ry protocol, with many of the features of EAP protocol s. Cisco controls the ability of other vendors to implement this protocol, so it shoul d be selected for use only when limited vendor choice for client, access-point, and server products is not a co nce rn.[...]
-
Page 17
Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the i t em is selected, you have to continue setting the WEP Encryption key s. TKIP – TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p acket is a kin d of message transmitted over a net[...]
-
Page 18
The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are those pro vided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Poi n[...]
-
Page 19
3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a daptor has supporte d are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they[...]
-
Page 20
Parameter Description T unneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected us er EAP Identity used for authentication. The identity specified may contai n up to 63 ASCII characters, is case sensitive and ta kes the form of a Network[...]
-
Page 21
Parameter Description Allow Intermediate Certificates A server desi gnates an issuer as a trusted root authority by placing the issuer's self-signed ce rtificate, which co ntains the issuer's public key, into the tr usted root certification authority certificate store of the host comp uter. Intermediate or sub ordi nate certification auth[...]
-
Page 22
Parameter Description S tatus Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the networking. Link S peed (Mbps) Display the transmission and reception rate of the network. The maximum transmissi on rate is 54Mbp[...]
-
Page 23
3.4 Statistics This option enables you to view the statistic informat ion of the con nectio n including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure mo re advan ced settings, for example: wireless mode, protection mode and etc. 20[...]
-
Page 24
Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless st ations in you r networ k, it is recommended to set the adaptor to this mode. Thi s mode is also the default setting. 802.1 1 B only – This adaptor can be comp atible with both 802.1 1g and 802.1 1b wireless stations. If there are only 80[...]
-
Page 25
Parameter Description Enable TCP Window Size The TCP Window i s the amount of data a sender can send on a particular connectio n before it get s an acknowledgme nt back from the receiver that it has gotten some of it. When the Router or AP the adaptor is connecting to have s et up the TCP Win dow , you can enable the paramete r to meet the data siz[...]
-
Page 26
3.6 About By choosing this option, you can click the hyperlin k to connect the website for the informatio n of the wireless chipset vendor and review b asic informat ion about the Utili ty such as the Driver, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.7 Turbo Mode This adaptor supports spe cific[...]
-
Page 27
24[...]
-
Page 28
4 Troubleshooting This chapter provides solutions to pro blems us ually encountered during the inst allation and operatio n of the adapter . 1. What is the IEEE 802.1 1g st andar d? 802.1 1g is the new IEEE standard fo r high-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly beco[...]
-
Page 29
6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi re d Equivalent Privacy , a data pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix method [...]
-
Page 30
13. What is Spread S pectrum ? S pread S pectrum technol o gy is a wideband radio frequen cy technique developed by the milit ary for use in reliable, secure, missi on-critical communication system s. It is designed to trade of f bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwid th is consumed than i[...]