Ir para a página of
Manuais similares
-
Network Card
Edimax 802.11g
32 páginas 0.77 mb -
Network Card
Edimax EW-7317LDg
2 páginas 0.07 mb -
Network card
Edimax EW-7722UTn V2
54 páginas -
Network Card
Edimax EW-7205AP
36 páginas 1.35 mb -
Network card
Edimax HP-2002AC
21 páginas -
Network card
Edimax EW-7128Gn
88 páginas -
Network Card
Edimax Adaptor
32 páginas 0.82 mb -
Network card
Edimax EN-9260TX-E
13 páginas
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Edimax Adaptor. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoEdimax Adaptor vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Edimax Adaptor você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Edimax Adaptor, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Edimax Adaptor deve conte:
- dados técnicos do dispositivo Edimax Adaptor
- nome do fabricante e ano de fabricação do dispositivo Edimax Adaptor
- instruções de utilização, regulação e manutenção do dispositivo Edimax Adaptor
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Edimax Adaptor não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Edimax Adaptor e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Edimax na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Edimax Adaptor, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Edimax Adaptor, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Edimax Adaptor. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
T T u u r r b b o o W W i i r r e e l l e e s s s s L L A A N N H H i i - - G G a a i i n n U U S S B B 2 2 . . 0 0 A A d d a a p p t t o o r r User Manual V ersion: 1.0 (November , 2005)[...]
-
Página 2
COPYRIGHT Copyright © 2005/2006 by this company . All rights reserved. No p art of this publication may be reproduced, transmitted, tr anscribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the pri[...]
-
Página 3
Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limit s are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can r[...]
-
Página 4
Federal Communications Commission (FCC) RF Exposure Requirements SAR compliance has been established in the laptop computer(s) co nfigurations with PCMCIA slot on the side near the center , as tested in the application for Certification, and can be used in laptop computer(s) with substantially similar physical dimensions, construction, and electric[...]
-
Página 5
CONTENTS 1 INTRODUCTION ............................................................................. 1 1.1 Features ......................................................................................................................... 2 1.2 Specifications ..........................................................................................[...]
-
Página 6
1 Introduction Thank you for purchasing the 802.11g T urbo Wire less LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standa rd and easy to carry with the Mini size. It is suitable for any Laptop or Deskto p computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). I[...]
-
Página 7
1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfe r speed within the specific wireles s network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of s[...]
-
Página 8
1.3 Package Contents Before you begin the inst a llation, please check the items of your p ackage. The package sh oul d include the following items: • One USB Adaptor • One Hi-Gain Antenna • One CD (Driver/Utility/User’s Manual) • One Quick Guide If any of the above items is missing, contact your supplier as soon as possible. 3[...]
-
Página 9
2 Installation Procedure Before you proceed with the install ation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before ins talling the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server. ) No[...]
-
Página 10
C. In Windows XP , there is a “Windows Zero Configur ation T ool” for you to setup the wireless adaptor . Y ou can choose to configure the adaptor through the Windows Zero Config uration T ool or the Ralink Configuration T ool for the adaptor . It is recommended to choose the Ralink Configu rat ion T ool for the adaptor . Click “Next” to co[...]
-
Página 11
E. The system start s to install the sof tware of the adaptor . Please follow the instructions of the program to plug in the adaptor into the USB port of your computer . And the system will automatically detect the adaptor F. Please click “Finish” to complete the installation. 6[...]
-
Página 12
3 Configuration Utility The Ralink Configuration Utility is a powerful appli cation that helps you configure the USB adaptor and monitor the link status and the statis tics during the communi cation process. When the adaptor is installed, t he configuration utility will be displayed automatically. This adaptor will auto connect to wireless device w[...]
-
Página 13
Second W ay A. Right-click the icon and select “V iew Available Wirele ss Networks”. B. Click “Advanced”. C. Uncheck “Use Wind ows to configure my wire less network settings” to enable the utility for the adaptor . Note: If “Wireless Zero Configuration” is enabl ed, y ou can only configure the advance setting or check the link statu[...]
-
Página 14
3.1 Site Survey When you open the Ralink Configur ation Utility, the system will scan all the channels to find all the access points/stations within the acce ssible range of your adaptor and automati cally connect to the wireless device with the highest sign al strength. Fr om the “Site Survey”, a ll the networks nea rby will be listed. You can[...]
-
Página 15
3.2 Profile The “Profiles List” is for you to manage the netwo rks you con ne ct to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative setting s of the profiles including Profile Name, SSID, Cha nnel, etc. This sign indicates the activat[...]
-
Página 16
3.2.1 Con f igure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID pre vents the unintentional merging of two co-located WLANs. Y ou may specify a SSI[...]
-
Página 17
Parameter Description PSM (Power Saving Mode) The power saving func tion is only available whe n the network type is in Infrastructure. CAM (Const antly A w ake Mode) – The adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network T ype Infrastructure – This operatio[...]
-
Página 18
Parameter Description RTS Threshold Minimum packet size required for an R TS (Request T o Send). For packet s smaller than this threshold, an R TS is not sent and the packet is transmitted direct ly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended. Fragment Th reshold The value defines the max[...]
-
Página 19
Parameter Description Authentication T ype LEAP – LEAP is a pre -EAP , Cisco-proprietary proto c ol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it shoul d be selected for use only when limited vendor choice for client, access-point, and server products is not a conce rn. [...]
-
Página 20
Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a p acket is a kin d of message transmitted over a networ[...]
-
Página 21
The IEEE 802.1X specification describe s a protocol that can be used fo r authenticating both clients and servers on a network. The authentication algorithm s and methods are th ose pro vided by the Extensible Authentication Protocol (EAP), a method of authentic ation that has been in use for a number of years on networks that provide Point-to-Poi [...]
-
Página 22
3.2.1.3 802.1x Setting-Certification Parameter Description Authentication T ype The EAP authentication pr otocol s this a daptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are si milar and easier than TLS in that they[...]
-
Página 23
Parameter Description T unneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected us er EAP Identity used for authentication. The identity specified may contai n up to 63 ASCII characters, is case sensitive and ta kes the form of a Network[...]
-
Página 24
Parameter Description Allow Intermediate Certificates A server desi gnates an issuer as a trusted root authority by placing the issuer's self-signed ce rtificate, which contains the issuer's public key, into the tr usted root certification authority certificate store of the host comp uter. Intermediate or subordi nate certification author[...]
-
Página 25
Parameter Description S tatus Display the SSID and MAC ID of the network the adaptor is connecting to. Extra Info Display the link st atus. Channel Display the number of the radio channel and the freq uency used for the networking. Link S peed (Mbps) Display the transmission and reception rate of the network. The maximum transmissi on rate is 54Mbp[...]
-
Página 26
3.4 Statistics This option enables you to view the statistic informat ion of the con nectio n including transmit statistics and receive statistics. You may reset the counters by clickin g ”Reset Counter”. 3.5 Advance This option enables you to configure more advan ced settings, for example: wireless mode, protection mode and etc. 21[...]
-
Página 27
Parameter Description Wireless Mode 802.1 1 B/G mix – If you have a mix of 802.1 1b and 802.1 1g wireless stations in you r networ k, it is recommended to se t the adaptor to this mode. Thi s mode is al so the default setting. 802.1 1 B only – This adaptor can be comp atible with both 802.1 1g and 802.1 1b wireless st ations. If there are only [...]
-
Página 28
Parameter Description Enable TCP Window Size The TCP Window is the amount of dat a a sender can send on a particular connectio n before it get s an acknowledgment back from the receiver that it has gotten some of it. When the Router or AP the adaptor is connecting to have s et up the TCP Window , you can enable the paramete r to meet the dat a size[...]
-
Página 29
3.6 About By choosing this option, you can click the hyperlin k to conn ect the website for the information of the wireless chipset vendor and review b asic informat ion about the Utility such a s the Drive r, Utility and EEPROM Version. The MAC Address of the adaptor is displayed in the screen as well. 3.7 Turbo Mode This adaptor supports specific[...]
-
Página 30
4 Troubleshooting This chapter provides solutions to pro bl ems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g standar d? 802.1 1g is the new IEEE standard fo r hi gh-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly beco[...]
-
Página 31
6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi re d Equivalent Privacy , a dat a pr ivacy mecha nism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix metho[...]
-
Página 32
13. What is Spread S pectrum ? S pread S pectrum technology is a wideb and ra dio frequency technique developed by the milit ary for use in reliable, secure, missi on-critical communication systems. It is desig ned to trade off bandwidt h ef ficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in t[...]