Edimax GN-621U Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Síťové karty Edimax GN-621U. Edimax GN-621U Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 2

5 D. Now you’ll see the following message, please click ‘Install’ to begin the installation. E. The system starts to install the driver and utility

Strany 3 - Interference Statement

6 II. Connect to Wireless Access Point A. To start configuring the adapter, double click the icon in the system tray or right click the icon and se

Strany 4

7 C. Input the security setting and click “OK” to start network connection.

Strany 5 - CONTENTS

8 * Use Windows Zero Configuration on Windows Vista: A. For Windows Vista user, you can use Windows Zero Configuration to connect to wireless access

Strany 6 - 1 Introduction

9 C. Click the access point you want to use if it’s shown, then click ‘Connect’. D. If it’s an unnamed access point (i.e. the SSID of this wireles

Strany 7 - 1.3 Package Contents

10 E. If the access point is protected by encryption method, you have to input its security or passphrase here. It must match the encryption setting

Strany 8 - 2 Installation Procedure

11 3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN Mini USB Adapter and monit

Strany 9

12 Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“ is s

Strany 10

13 3.2 Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within

Strany 11

14 3.3 General To check the connection status of the adapter, select “General“. This screen shows the information of Link Speed, Network Type, Encryp

Strany 12

Copyright© by Edimax Technology Co, LTD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in

Strany 13

15 SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-

Strany 14

16 Duplicate If you like to build up the new profile with the same settings as the current profile, then you can select this feature. Set Default

Strany 15

17 Ad Hoc – Connect to another wireless adapter in the Wireless LAN network without through an Access Point or Router. If this item is selected, the

Strany 16 - 3 Configuration Utility

18 WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WEP 802.1X – It’s a special mode for usi

Strany 17

19 Key Index (advanced) Select one of the four keys to be the data encryption key. Network Key Please enter network security key here to make s

Strany 18

20 3.5 Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linki

Strany 19 - 3.3 General

21 3.7 Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become ver

Strany 20 - 3.4 Profile

22 3. If you click ‘Yes’, and the following message will appear on your computer, please select the SSID of wireless access point that you wish to c

Strany 21

23 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s

Strany 22

24 3.8 Software AP This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, WEP encryption and so on are

Strany 23

Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital dev

Strany 24

25 3.8.1 AP Properties Setting Please refer to Section 3.4.1 for the setting of the parameters for AP. Note that Ad Hoc mode is not enabled for AP.

Strany 25 - 3.6 Statistics

26 Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packets (milliseconds). The range for the beacon

Strany 26 - I. Pin Input Config (PIN)

27 3.8.4 ICS If you want to connect to the internet through this SoftAP, you will need to make a bridge between our SoftAP and your internet connect

Strany 27

28 4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What

Strany 28

29 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. Wh

Strany 29

30 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, sec

Strany 31 - 3.8.3 AP Statistics

R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL o

Strany 32 - 3.8.4 ICS

CONTENTS 1 INTRODUCTION ... 11.1 Features ...

Strany 33 - 4 Troubleshooting

1 1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless networ

Strany 34

2 • LEDs: Link/Activity • Transmit Power: 11n: 14±1.5dBm, 11g: 14±1.5dBm, 11b: 17±1.5dBm • Dimension: 10(H) x 19.5(W) x 56(D) mm • Temperature: O

Strany 35

3 2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was op

Strany 36

4 B. Select Setup Language and click “OK” to proceed. C. Click “Next” to go to the next step.

Komentáře k této Příručce

Žádné komentáře