SMC Networks SMCWPCI-N2 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации SMC Networks SMCWPCI-N2. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции SMC Networks SMCWPCI-N2 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции SMC Networks SMCWPCI-N2 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций SMC Networks SMCWPCI-N2, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции SMC Networks SMCWPCI-N2 должна находится:
- информация относительно технических данных устройства SMC Networks SMCWPCI-N2
- название производителя и год производства оборудования SMC Networks SMCWPCI-N2
- правила обслуживания, настройки и ухода за оборудованием SMC Networks SMCWPCI-N2
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск SMC Networks SMCWPCI-N2 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок SMC Networks SMCWPCI-N2 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта SMC Networks, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания SMC Networks SMCWPCI-N2, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства SMC Networks SMCWPCI-N2, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции SMC Networks SMCWPCI-N2. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    EZ Connect™ N Pro Draft 11n Wireless PCI Adapter SMCWPCI-N2[...]

  • Страница 2

    i LIMITED W ARRANTY Limited W arrant y S tatement: SMC Networks, Inc. (“SMC”) warrants it s products to be free from defects in workmanship and materials, under normal use and service , for the applica ble warranty term. All SMC products c arry a standard 90-day limited warrant y from the date of purchase from SMC or its Authorized Reseller . S[...]

  • Страница 3

    ii LIMIT A TION OF LIABILITY : IN NO EVENT , WHETHER BASED IN CO NTRACT OR TO RT (INCLUDIN G NEGLIGENCE) , SHALL SM C BE LIABLE FOR IN CIDENT AL, CON SEQUENTIA L, INDIRECT , SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVE NUE, LOSS OF BU SINESS, OR OTHER F INANCIAL LOSS ARISING OUT OF OR IN CONNEC TION WITH THE SALE, INST ALLA TION, M[...]

  • Страница 4

    iii Compliances Federal Communica tion Commission In terference St atement This equipment has b een tested and foun d to comply wi th the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to p rovide reasonable protection against harmful interf erence in a residential ins tallation. This equipment [...]

  • Страница 5

    iv Compliances Europe – EU Declaration of Conformity This device complies with the essential requirem ents of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN60950-1:2001 A11:2004 Safety of Informat[...]

  • Страница 6

    v Compliances Council recommendation 1999/519/EC of 12 July 1999, limitations of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz) Č esky [Czech] SMC Networks tímto prohlašuje, že tento Radio LAN device je ve shod ě se základními požadavky a dalšími p ř íslušnými ustanoveními sm ě rnice 1999/5/ES. Dansk [Dan[...]

  • Страница 7

    vi Slovensky [Slovak] SMC Networks týmto vyhlasuje, že Radio LAN device sp ĺň a základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] SMC Networks vakuuttaa täten että Radio LAN device tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen[...]

  • Страница 8

    5 Table of Contents Chapter 1 - Getting Started with the SMCWPCI-N2 6 C h a p t e r 2 - W i r e l e s s L A N N e t w o r k i n g 7 T r a n s m i s s i o n R a t e ( T r a n s f e r R a t e ) 7 T y p e o f W i r e l e s s N e t w o r k s 7 W i r e l e s s L A N S e c u r i t y 1 2 Chapter 3 - Hardware and Wireless Utility 13 About Your Draft 11n Wi[...]

  • Страница 9

    6 Chapter 1 - Getting S t arted with the SMCWPCI-N2 Congratulations on purchasing the SMCWPCI-N2. This manual provides information for setting up and configuring the SMCWPCI-N2. This manual is intended for both home users and professionals. It is not required to read some of the more technical inform ation in this manual (such as in “Wireless LAN[...]

  • Страница 10

    7 Chapter 2 - Wireless LAN Networking This section provides background information on wireless LAN networking technolog y . T HE INFORMA TION IN THIS SECT ION IS FOR YOUR REFERENCE. C HANGING NETWORK SETT INGS AND P ARTICULARL Y SECURITY SETTTINGS SHOULD ONL Y BE DO NE BY AN AUTHORIZED ADMI NISTRA TOR. T ransmission Rate (T ransfer Rate) The SMCWPC[...]

  • Страница 11

    8 communicate directly to each other . An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). T o set up an ad-hoc network, configure all the st ations in ad-hoc mode. Use the same SSID and channel for each station .[...]

  • Страница 12

    9 When a number of wireless stations are connecte d using a single access p oint, you have a Basic Service Set (BSS).[...]

  • Страница 13

    10 In the ESS diagram below , commu nication is done through the access point s, which relay data packet s to other wireless stations or devices connected to th e wired network. Wireless stations can then access resources, such as a printer , on the wired network.[...]

  • Страница 14

    11 In an ESS en vironment, users are able to move fr om one access point to another wi thout losing t h e connection. In the diagram below , when the user moves from BSS (1) to BSS (2) the SMCWPCI-N2 automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram[...]

  • Страница 15

    12 Wireless L AN Security Because wireless networks are not as secure as wire d networks, it’s vital that security settings are clearly understood and applied. The list below shows the possible wireless secu rity levels on your SMCWPCI-N2 starting with t he most secure. EAP (Extensible Authentication Protocol) is used for authentication and utili[...]

  • Страница 16

    13 Chapter 3 - Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your Draft 11n Wireless PCI Adapter With the Adapter, you can enjoy wireless mobility within almost any wirele ss networking environment. The following lists the main features: • IEEE802.11n draft v2.0 compliant •[...]

  • Страница 17

    14 Hardware and Wireless Utility Installation Follow the instructions be low to install the PCI Ca rd and Wireless Utility. Do not insert the EZ Connect™ N Wirel ess PCI Adapter until instructed. 1. Put the EZ Installation & Document ation CD in to your CD-ROM drive. T he CD will auto run. If the CD does not auto run browse to y our CD drive [...]

  • Страница 18

    15 4. T o install to the default folder location click [Next] . It is recommended to use the default folder location unless you are an advan ced user . T o change the installation folder click the [Browse] button and specify a new location. Click [Next] to continue . 5. The wizard is ready to begi n installation. Click [Install]. 6. A “Software I[...]

  • Страница 19

    16 8. T urn off your compute r . 9. Insert the EZ Conne c t™ N Wireless PCI Adapter in to an available PCI slot. IMPORT ANT : For correct inst allation of new hardware please refer to your Computer use r manual. 10. Once the EZ Connect™ N Wireless PCI Adapter is inserted screw on the antenna s. 11. T urn On your computer . 12. The “Found New [...]

  • Страница 20

    17 14. A “Hardware Inst allation” warning may appear , click [Continue Anyway]. 15. Click [Finish] to complete the Driver/Utility installation.[...]

  • Страница 21

    18 Using the Utility to Configure Your Network The following are explanations on how to configure a nd use the Utility program. After completing the installation procedure, a new ico n as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer ov er the icon, and double click the left mouse button to open the Wire[...]

  • Страница 22

    19 The following table describes the items found o n the Link Information screen. Wireless Network St atus Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile t ab. SSID Displays the wireless network name. Link St atus Shows whether the station is associated to the wireless network. Netw[...]

  • Страница 23

    20 channel Channel Wid th 20MHz only or 40/20MHz channel support Security S tatus Security Shows the security type – Disable, WEP , WP A/WP A2, W AP-PSK/W AP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP S tatus IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway a[...]

  • Страница 24

    21 Connecting to a different network Hold your mouse pointer ov er the network icon, and click the right mouse button to select the network. Click the Connect button to connect the available network. If no configuration p rofile exists for that network, the Profile Settings window opens to ask to create a p rofile for the network. Follow the proced[...]

  • Страница 25

    22 Scan Available Networks Click the Browse button on the Profile Settings scr een to scan for available inf rastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Typ e field on the Profile Settings.[...]

  • Страница 26

    23 Click Next to continue. To define the security mode, select the desi red se curity mode from the drop down list. And then click Next to continue. Please see following table for details of security mode s. WEP This card support three modes of WEP , inclu de: 64 Bit s 128 Bit s 152 Bit s Except 152-Bit ode, both 64-Bit & 128-Bit modes support [...]

  • Страница 27

    24 Protocol) authenticates wireless LAN client s using only server -side digital certificates by creating an encr ypted SSL /TLS tunnel between the client an d the authentication server . T he tunnel then protects the subsequent us er authentication e xchange. PEAP (EAP-MSCHAP V2) ( Protected Extensible Authentication Protocol) T o use PEAP (EAP-MS[...]

  • Страница 28

    25 Advanced Settings After Security Settings are finished, the Advanced Settings screen will be shown as following. SMC recommends usin g the default values. The following table describes the item s found on the Advanced Se ttings screen. Power Save Mode Shows the power save mode. Power m anagement is disabled in ad hoc mode. The options include: z[...]

  • Страница 29

    26 After advance settings are finished, the following scre en is displayed as below. You can activate the profile now or later. WPS Wi-Fi Protected Setup (WPS) is based on pu sh-butto n or PIN (Personal Ident ification Number) entry authentication to provide strong WPA/WPA2 encryption key s to client dev ices. Users can push a button on the access [...]

  • Страница 30

    27 4. After WPS detects security setti ng you will be prompted to save them to a new profile as shown below. Click Save to save settings 5. After clicking save the following will be displ a yed to confirm WPS is connected successfully. Note: If WPS fails, click the PBC bu tton few more times to try again.[...]

  • Страница 31

    28 WPS Setup - PIN Configuration The WPS PIN (Personal Identification Number) setu p is optional to the WPS button setup. It is more secure than using the WPS button. All WPS-compatible devices h ave their own PIN number. 1. The PIN number of your Wireless Cardb us Adapter is an eight-digit number lo cated at the upper-right position of configurati[...]

  • Страница 32

    29 Note: You may have to click PIN for few more times to try again. If you still cannot connect to an access point this way, please make sure the PIN co de you provided to acce ss point is correct. WPS Status Bar Description: 1. A successful PIN configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated to WPS AP[...]

  • Страница 33

    30 Chapter 4 - Maintenance This chapter describes how to unins tall or upgrade th e Wireless Utility. Uninstall the Driver Follow the step s below to remove (or uninstall) the Card d river from your computer . Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2. Double-click Sy stem Step 3. Under Hardware tab, cli ck De[...]

  • Страница 34

    31 Glossary For unfamiliar terms used below , look for entries elsewhere in the glossary . A D -H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station ( access point). T wo or more wireless stations communicate dire ctly to each other . An ad-h[...]

  • Страница 35

    SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire- less network. Wireless devices must have the same SSID to communicate with each other . T EMPORAL K EY I NTEGRITY P ROTOCOL (TKIP) T emporal Key Integrity Protocol (TKI P) uses 128-bit keys t hat are dyna mically generated and distributed by the authe[...]

  • Страница 36

    SMCWBR11-G SMCWPCI-N2[...]