Instruction d'utilisation Topcom SKYR@CER USB 4001G

Instruction d'utilisation pour le dispositif Topcom SKYR@CER USB 4001G

Dispositif: Topcom SKYR@CER USB 4001G
Catégorie: Lecteur
Fabricant: Topcom
Dimension: 0.73 MB
Date d'addition: 8/19/2014
Nombre des pages: 30
Imprimez l'instruction

Téléchargez

Comment utiliser?

Notre objectif consiste à vous assurer le plus rapide accès au contenu de l'instruction d'utilisation du dispositif Topcom SKYR@CER USB 4001G. En utilisant l'aperçu en ligne vous pouvez parcourir le sommaire et passer à la page où vous trouverez la résolution de votre problème avec Topcom SKYR@CER USB 4001G.

Pour votre confort

Si regarder l'instruction Topcom SKYR@CER USB 4001G directement sur la page n'est pas confortable pour vous, vous pouvez profiter de deux solutions possibles:

  • Exploration au mode de plein écran - pour analyser l'instruction d'une manière commode (sans l'avoir téléchargée sur votre ordinateur) vous pouvez utiliser le mode d'exploration en plein écran. Pour démarrer l'exploration de l'instruction Topcom SKYR@CER USB 4001G en plein écran, utilisez le bouton Plein écran.
  • Téléchargement sur l'ordinateur - vous pouvez aussi télécharger l'instruction Topcom SKYR@CER USB 4001G sur votre ordinateur et la sauvegarder dans vos ressources. Si vous n'avez pas envie de gaspiller votre espace disque, vous pouvez toujours télécharger cette instruction du ManualsBase dans l'avenir.
Topcom SKYR@CER USB 4001G Manuel d'utilisation - Online PDF
Advertisement
« Page 1 of 30 »
Advertisement
Version imprimée

Beaucoup de gens préfèrent de lire les documents dans la version imprimée et non pas sur l'écran. L'option d'impression de l'instruction est aussi prévue et vous pouvez en profiter en cliquant le lien ci-dessus - Imprimez l'instruction. Il n'est pas nécessaire d'imprimer toute l'instruction Topcom SKYR@CER USB 4001G - on peut choisir des pages. Economisez le papier.

Résumés

Vous trouverez ci-dessous les annonces des contenus qui se trouvent sur les pages suivantes de l'instruction de Topcom SKYR@CER USB 4001G. Si vous voulez parcourir rapidement le contenu des pages suivantes de l'instruction, vous pouvez en profiter.

Résumés du contenu
Résumé du contenu de la page N° 1
















Skyr@cer USB 4001g
Skyr@cer USB 4001g




Full User Guide

Résumé du contenu de la page N° 2

Résumé du contenu de la page N° 3

CONTENTS 1.1 Features......................................................................................................................... 2 1.2 Specifications................................................................................................................ 2 1.3 Package Contents.......................................................................................................... 3 3.1 Site Survey........................................................................

Résumé du contenu de la page N° 4

1 Introduction Thank you for purchasing the 802.11g Wireless LAN USB Adapter. This USB adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adaptor supports higher data throughput than the IEEE 802.11g standard (up to 54Mbps). It supports specific ways to increase the data transfer rate at a time; compress the data and decrease the waiting time to send the next data to the

Résumé du contenu de la page N° 5

1.1 Features • Complies with the IEEE 802.11b and IEEE 802.11g 2.4GHz (DSSS) standards. • High data transfer rate – up to 54Mbps. • Supports Turbo Mode to enhance the data transfer speed within the specific wireless network. • Supports 64/128-bit WEP, WPA (TKIP with IEEE 802.1x), WPA2 (AES with IEEE 802.1x) functions for high level of security. • Supports the most popular operating system: Windows 98SE/Me/2000/XP/2003 Server. • Supports USB 2.0/1.1/1.0 interface. • Portable and mini-s

Résumé du contenu de la page N° 6

1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One USB Adaptor • One CD (Driver/Utility/User’s Manual) 3

Résumé du contenu de la page N° 7

2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: Please do not install the adaptor into your computer before installing the software program from the CD. Note2: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/2003 Server.) Note3: If you have installed the Turbo Wireless LAN USB Adaptor driver & utility before, please uninstall the old version first. A. Insert the Instal

Résumé du contenu de la page N° 8

C. If you need the adaptor to operate with better performance, please choose the “Optimize for performance” to enable the Tx Burst mode. Or you can choose “Optimize for Wi-Fi mode” to let the adaptor run in standard wireless network. 5

Résumé du contenu de la page N° 9

D. The system starts to install the software of the adaptor. Please follow the instructions of the program to plug in the adaptor into the USB port of your computer. And the system will automatically detect the adaptor E. Please click “Finish” to complete the installation. 6

Résumé du contenu de la page N° 10

3 Configuration Utility The Topcom Configuration Utility is a powerful application that helps you configure the USB adaptor and monitor the link status and the statistics during the communication process. When the adaptor is installed, the configuration utility will be displayed automatically. This adaptor will auto connect to wireless device which has better signal strength and no wireless security setting. The Topcom Configuration Utility appears as an icon on the system tray o

Résumé du contenu de la page N° 11

3.1 Site Survey When you open the Topcom Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adaptor and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list. Parameter Description Available Networks This

Résumé du contenu de la page N° 12

3.2 Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Delete/Edit/Activate a profile. Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting. Add/Delete/Edit Button Click the

Résumé du contenu de la page N° 13

3.2.1 Configure the Profile 3.2.1.1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the adaptor and then only the device with the same SSID can interconnect to the adaptor. If you want to add the network n

Résumé du contenu de la page N° 14

Parameter Description PSM (Power Saving Mode) The power saving function is only available when the network type is in Infrastructure. CAM (Constantly Awake Mode) – The adaptor will always set in active mode. PSM (Power Saving Mode) – Enable the adaptor in the power saving mode when it is idle. Network Type Infrastructure – This operation mode requires the presence of an 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode i

Résumé du contenu de la page N° 15

Parameter Description RTS Threshold Minimum packet size required for an RTS (Request To Send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. Minor change is recommended. Fragment Threshold The value defines the maximum size of packets; any packet size larger than the value will be fragmented. If you have decreased this value and experience high packet erro

Résumé du contenu de la page N° 16

Parameter Description Authentication Type LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for use only when limited vendor choice for client, access-point, and server products is not a concern. When you have set up LEAP authentication, you have to enter the user name and password of your computer. WPA – WPA provides a scheme of mutual auth

Résumé du contenu de la page N° 17

Parameter Description Encryption Mode None – Disable the encryption mode. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security. AES – AES has been developed to ensure the highest degree of security a

Résumé du contenu de la page N° 18

The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do. When an AP acting as an authenticator detects a wireless stat

Résumé du contenu de la page N° 19

3.2.1.3 802.1x Setting-Certification Parameter Description Authentication Type The EAP authentication protocols this adaptor has supported are included as follows. This setting has to be consistent with the wireless APs or Routers that the adaptor intends to connect. PEAP &TTLS – PEAP and TTLS are similar and easier than TLS in that they specify a stand-alone authentication protocol be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, including CHAP, MS-

Résumé du contenu de la page N° 20

Parameter Description Tunneled Authentication Protocol When the authentication type is PEAP or TTLS, select a protocol to be used to build the encrypted tunnel. Identity This is the protected user EAP Identity used for authentication. The identity specified may contain up to 63 ASCII characters, is case sensitive and takes the form of a Network Access Identifier, consisting of @. The user’s home realm is optional and indicates the rout


Instructions pareilles
# Instruction d'utilisation Catégorie Téléchargez
1 Topcom SKYR@CER 8144827 Manuel d'utilisation Lecteur 3
2 Topcom Wireless USB Stick Manuel d'utilisation Lecteur 16
3 Sony MSH-128S2 Manuel d'utilisation Lecteur 2
4 Sony 2GB Flash Drive USM2GLX Manuel d'utilisation Lecteur 0
5 Sony SAITE1300-F Manuel d'utilisation Lecteur 0
6 Sony CRX - 160E Manuel d'utilisation Lecteur 0
7 Sony 2GN Manuel d'utilisation Lecteur 0
8 Sony 7819900133 Manuel d'utilisation Lecteur 0
9 Sony USM512U2 Manuel d'utilisation Lecteur 0
10 Sony DRX-S70U-W Manuel d'utilisation Lecteur 22
11 Sony BDX-S500U Manuel d'utilisation Lecteur 29
12 Sony 500gb External Hard Disk Drive HDEG5/B Manuel d'utilisation Lecteur 1
13 Sony VAIO VPCSB Manuel d'utilisation Lecteur 39
14 Sony 500gb External Hard Disk Drive HDEG5B Manuel d'utilisation Lecteur 2
15 Sony 2-586-675-11 (1) Manuel d'utilisation Lecteur 0