all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 |
|
User manual of host | Users Manual | 1019.32 KiB | June 03 2009 | |||
1 2 3 |
|
User manual of module | Users Manual | 360.85 KiB | June 03 2009 | |||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | External Photos | April 06 2009 | ||||||
1 2 3 | Internal Photos | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | RF Exposure Info | April 06 2009 | ||||||
1 2 3 | RF Exposure Info | April 06 2009 | ||||||
1 2 3 | Test Setup Photos | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | April 06 2009 | ||||||
1 2 3 | Test Report | April 06 2009 | ||||||
1 2 3 | Test Setup Photos | April 06 2009 | ||||||
1 2 3 | Cover Letter(s) | July 05 2009 / August 05 2009 | ||||||
1 2 3 | Cover Letter(s) | July 05 2009 / August 05 2009 | ||||||
1 2 3 | Cover Letter(s) | June 03 2009 | ||||||
1 2 3 | Cover Letter(s) | June 03 2009 | ||||||
1 2 3 | Cover Letter(s) | June 03 2009 | ||||||
1 2 3 | ID Label/Location Info | June 03 2009 | ||||||
1 2 3 | ID Label/Location Info | June 03 2009 | ||||||
1 2 3 | ID Label/Location Info | June 03 2009 | ||||||
1 2 3 | ID Label/Location Info | June 03 2009 | ||||||
1 2 3 | Cover Letter(s) | June 03 2009 | ||||||
1 2 3 | RF Exposure Info | June 03 2009 | ||||||
1 2 3 | RF Exposure Info | June 03 2009 | ||||||
1 2 3 | RF Exposure Info | June 03 2009 | ||||||
1 2 3 | Cover Letter(s) | June 03 2009 |
1 2 3 | User manual of host | Users Manual | 1019.32 KiB | June 03 2009 |
Aspire one Series User Guide Copyright 2009. Acer Incorporated. All Rights Reserved. Aspire one Series User Guide Original Issue: 02/2009 Changes may be made periodically to the information in this publication without obligation to notify any person of such revisions or changes. Such changes will be incorporated in new editions of this manual or supplementary documents and publications. Record the model number, serial number, purchase date and place of purchase information in the space provided below. The serial number and model number are recorded on the label affixed to your computer. All correspondence concerning your unit should include the serial number, model number and purchase information. This booklet has been reviewed for accuracy. Although Acer makes all reasonable attempts for this booklet to be printed in an accurate manner, Acer takes no responsibility for any inadvertent errors or misprints. Acers liability with respect to this booklet is subject to any limitation of liability set out in the applicable product warranty. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronically, mechanically, by photocopy, recording or otherwise, without the prior written permission of Acer Incorporated. Aspire one Series Notebook PC Model number: __________________________________ Serial number: ___________________________________ Date of purchase: ________________________________ Place of purchase: ________________________________ Acer and the Acer logo are registered trademarks of Acer Incorporated. Other companies'
product names or trademarks are used herein for identification purposes only and belong to their respective companies. Information for your safety and comfort iii Safety instructions Read these instructions carefully. Keep this document for future reference. Follow all warnings and instructions marked on the product. Turning the product off before cleaning Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners. Use a damp cloth for cleaning. CAUTION for plug as disconnecting device Observe the following guidelines when connecting and disconnecting power to the power supply unit:
Install the power supply unit before connecting the power cord to the AC power outlet. Unplug the power cord before removing the power supply unit from the computer. If the system has multiple sources of power, disconnect power from the system by unplugging all power cords from the power supplies. CAUTION for Accessibility Be sure that the power outlet you plug the power cord into is easily accessible and located as close to the equipment operator as possible. When you need to disconnect power to the equipment, be sure to unplug the power cord from the electrical outlet. CAUTION for Dummy Card of Memory Card Slot Your computer shipped with plastic dummies installed in the memory card slot. Dummies protect unused slots from dust, metal object, or other particles. Save the dummy for use when no memory card is installed in the slot. CAUTION for Listening To protect your hearing, follow these instructions.
Increase the volume gradually until you can hear clearly and comfortably. Do not increase the volume level after your ears have adjusted. Do not listen to music at high volumes for extended periods. Do not increase the volume to block out noisy surroundings. Decrease the volume if you can't hear people speaking near you. iv Warnings
Do not use this product near water. Do not place this product on an unstable cart, stand or table. If the product falls, it could be seriously damaged. Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface. This product should never be placed near or over a radiator or heat register, or in a built-in installation unless proper ventilation is provided. Never push objects of any kind into this product through cabinet slots as they may touch dangerous voltage points or short-out parts that could result in a fire or electric shock. Never spill liquid of any kind onto or into the product. To avoid damage of internal components and to prevent battery leakage, do not place the product on a vibrating surface. Never use it under sporting, exercising, or any vibrating environment which will probably cause unexpected short current or damage rotor devices, HDD, Optical drive, and even exposure risk from lithium battery pack. Using electrical power
This product should be operated from the type of power indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company. Do not allow anything to rest on the power cord. Do not locate this product where people will walk on the cord. If an extension cord is used with this product, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed the fuse rating. Do not overload a power outlet, strip or receptacle by plugging in too many devices. The overall system load must not exceed 80% of the branch circuit rating. If power strips are used, the load should not exceed 80% of the power strip's input rating. This product's AC adapter is equipped with a three-wire grounded plug. The plug only fits in a grounded power outlet. Make sure the power outlet is properly grounded before inserting the AC adapter plug. Do not insert the plug into a non-grounded power outlet. Contact your electrician for details. Warning! The grounding pin is a safety feature. Using a power outlet that is not properly grounded may result in electric shock and/or injury. v Note: The grounding pin also provides good protection from unexpected noise produced by other nearby electrical devices that may interfere with the performance of this product.
Use the product only with the supplied power supply cord set. If you need to replace the power cord set, make sure that the new power cord meets the following requirements: detachable type, UL listed/CSA certified, type SPT-2, rated 7 A 125 V minimum, VDE approved or its equivalent, 4.6 meters (15 feet) maximum length. Product servicing Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to qualified service personnel. Unplug this product from the wall outlet and refer servicing to qualified service personnel when:
the power cord or plug is damaged, cut or frayed liquid was spilled into the product the product was exposed to rain or water the product has been dropped or the case has been damaged the product exhibits a distinct change in performance, indicating a need for service the product does not operate normally after following the operating instructions
Note: Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition. Guidelines for safe battery usage This notebook uses a Lithium-ion battery. Do not use it in a humid, wet or corrosive environment. Do not put, store or leave your product in or near a heat source, in a high temperature location, in strong direct sunlight, in a microwave oven or in a pressurized container, and do not expose it to temperatures over 60C (140F). Failure to follow these guidelines may cause the battery to leak acid, become hot, explode or ignite and cause injury and/or damage. Do not pierce, open or disassemble the battery. If the battery leaks and you come into contact with the leaked fluids, rinse thoroughly with water and seek medical attention immediately. For safety reasons, and to prolong the lifetime of the battery, charging will not occur at temperatures below 0C (32F) or above 40C
(104F). The full performance of a new battery is achieved only after two or three complete charge and discharge cycles. The battery can be charged and vi discharged hundreds of times, but it will eventually wear out. When the operation time becomes noticeably shorter than normal, buy a new battery. Use only Acer approved batteries, and recharge your battery only with Acer approved chargers designated for this device. Use the battery only for its intended purpose. Never use any charger or battery that is damaged. Do not short-circuit the battery. Accidental short-circuiting can occur when a metallic object such as a coin, clip or pen causes direct connection of the positive (+) and negative (-) terminals of the battery. (These look like metal strips on the battery.) This might happen, for example, when you carry a spare battery in your pocket or purse. Short-circuiting the terminals may damage the battery or the connecting object. The capacity and lifetime of the battery will be reduced if the battery is left in hot or cold places, such as in a closed car in summer or winter. Always try to keep the battery between 15C and 25C (59F and 77F). A device with a hot or cold battery may not work temporarily, even when the battery is fully charged. Battery performance is especially limited in temperatures well below freezing. Do not dispose of batteries in a fire as they may explode. Batteries may also explode if damaged. Dispose of batteries according to local regulations. Please recycle when possible. Do not dispose as household waste. Wireless devices may be susceptible to interference from the battery, which could affect performance. Replacing the battery pack The notebook uses lithium batteries. Replace the battery with the same type as that which came bundled with your product. Use of another battery may present a risk of fire or explosion. Warning! Batteries may explode if not handled properly. Do not disassemble or dispose of them in fire. Keep them away from children. Follow local regulations when disposing of used batteries. Telephone line safety
Disconnect all telephone lines from the equipment when not in use and/or before servicing. To avoid the remote risk of electric shock from lightning, do not connect the telephone line to this equipment during lightning or thunderstorms.
Warning! For safety reasons, do not use non-compliant parts when adding or changing components. Consult your reseller for purchase options. Additional safety information Your device and its enhancements may contain small parts. Keep them out of the reach of small children. Operating environment vii Warning! For safety reasons, turn off all wireless or radio transmitting devices when using your laptop under the following conditions. These devices may include, but are not limited to:
wireless lan (WLAN), Bluetooth and/or 3G. Remember to follow any special regulations in force in any area, and always switch off your device when its use is prohibited or when it may cause interference or danger. Use the device only in its normal operating positions. This device meets RF exposure guidelines when used normally, and it and its antenna are positioned at least 1.5 centimeters (5/8 inches) away from your body (refer to the figure below). It should not contain metal and you should position the device the above-stated distance from your body. To successfully transmit data files or messages, this device requires a good quality connection to the network. In some cases, transmission of data files or messages may be delayed until such a connection is available. Ensure that the above separation distance instructions are followed until the transmission is completed. Parts of the device are magnetic. Metallic materials may be attracted to the device, and persons with hearing aids should not hold the device to the ear with the hearing aid. Do not place credit cards or other magnetic storage media near the device, because information stored on them may be erased. Medical devices Operation of any radio transmitting equipment, including wireless phones, may interfere with the functionality of inadequately protected medical devices. Consult a physician or the manufacturer of the medical device to determine if they are adequately shielded from external RF energy or if you have any questions. Switch off your device in health care facilities when any regulations posted in these areas instruct you to do so. Hospitals or health care facilities may be using equipment that could be sensitive to external RF transmissions.. Pacemakers. Pacemaker manufacturers recommend that a minimum separation of 15.3 centimeters (6 inches) be maintained between wireless devices and a pacemaker to avoid potential interference with the pacemaker. These recommendations are consistent with the independent research by and recommendations of Wireless Technology Research. Persons with pacemakers should do the following:
Always keep the device more than 15.3 centimeters (6 inches) from the pacemaker
Not carry the device near your pacemaker when the device is switched o. If you suspect interference, switch off your device, and move it. Hearing aids. Some digital wireless devices may interfere with some hearing aids. If interference occurs, consult your service provider. viii Vehicles RF signals may affect improperly installed or inadequately shielded electronic systems in motor vehicles such as electronic fuel injection systems, electronic antiskid (antilock) braking systems, electronic speed control systems, and air bag systems. For more information, check with the manufacturer, or its representative, of your vehicle or any equipment that has been added. Only qualified personnel should service the device, or install the device in a vehicle. Faulty installation or service may be dangerous and may invalidate any warranty that may apply to the device. Check regularly that all wireless equipment in your vehicle is mounted and operating properly. Do not store or carry flammable liquids, gases, or explosive materials in the same compartment as the device, its parts, or enhancements. For vehicles equipped with an air bag, remember that air bags inflate with great force. Do not place objects, including installed or portable wireless equipment in the area over the air bag or in the air bag deployment area. If in-vehicle wireless equipment is improperly installed, and the air bag inflates, serious injury could result. Using your device while flying in aircraft is prohibited. Switch off your device before boarding an aircraft. The use of wireless teledevices in an aircraft may be dangerous to the operation of the aircraft, disrupt the wireless telephone network, and may be illegal. Potentially explosive environments Switch off your device when in any area with a potentially explosive atmosphere and obey all signs and instructions. Potentially explosive atmospheres include areas where you would normally be advised to turn off your vehicle engine. Sparks in such areas could cause an explosion or fire resulting in bodily injury or even death. Switch off the device at refueling points such as near gas pumps at service stations. Observe restrictions on the use of radio equipment in fuel depots, storage, and distribution areas; chemical plants;
or where blasting operations are in progress. Areas with a potentially explosive atmosphere are often, but not always, clearly marked. They include below deck on boats, chemical transfer or storage facilities, vehicles using liquefied petroleum gas (such as propane or butane), and areas where the air contains chemicals or particles such as grain, dust or metal powders. Do not switch the notebook on when wireless phone use is prohibited or when it may cause interference or danger. Emergency calls Warning: You cannot make emergency calls through this device. To make an emergency call you shall dial out through your mobile phone or other telephone call system. Disposal instructions Do not throw this electronic device into the trash when discarding. To minimize pollution and ensure utmost protection of the global environment, please recycle. For more information on the Waste from Electrical and Electronics Equipment (WEEE) regulations, visit http://global.acer.com/about/sustainability.htm ix Mercury advisory For projectors or electronic products containing an LCD/CRT monitor or display:
Lamp(s) inside this product contain mercury and must be recycled or disposed of according to local, state or federal laws. For more information, contact the Electronic Industries Alliance at www.eiae.org. For lamp-specific disposal information, check www.lamprecycle.org. x ENERGY STAR is a government program (public/private partnership) that gives people the power to protect the environment in a cost effective way and without sacrificing quality or product features. Products that earn the ENERGY STAR prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the US Environmental Protection Agency (EPA) and the US Department of Energy (DOE). In the average home, 75% of all electricity used to power home electronics is consumed while the products are turned off. ENERGY STAR qualified home electronic products in the off position use up to 50% less energy than conventional equipment. More information refers to http://www.energystar.gov and http://www.energystar.gov/
powermanagement. Note: The statement above is applicable only to Acer notebooks with an ENERGY STAR sticker located in the bottom right-hand corner of the palm rest. As an ENERGY STAR partner, Acer Inc. has determined that this product meets the ENERGY STAR guidelines for energy efficiency. This product has been shipped enabled for power management:
Activate display Sleep mode within 15 minutes of user inactivity. Activate computers Sleep mode within 30 minutes of user inactivity.
Wake the computer from Sleep mode by pushing power button. Tips and information for comfortable use Computer users may complain of eyestrain and headaches after prolonged use. Users are also at risk of physical injury after long hours of working in front of a computer. Long work periods, bad posture, poor work habits, stress, inadequate working conditions, personal health and other factors greatly increase the risk of physical injury. Incorrect computer usage may lead to carpal tunnel syndrome, tendonitis, tenosynovitis or other musculoskeletal disorders. The following symptoms may appear in the hands, wrists, arms, shoulders, neck or back:
If you have these symptoms, or any other recurring or persistent discomfort and/or pain related to computer use, consult a physician immediately and inform your company's health and safety department. The following section provides tips for more comfortable computer use. numbness, or a burning or tingling sensation aching, soreness or tenderness pain, swelling or throbbing stiffness or tightness coldness or weakness xi Finding your comfort zone Find your comfort zone by adjusting the viewing angle of the monitor, using a footrest, or raising your sitting height to achieve maximum comfort. Observe the following tips:
refrain from staying too long in one fixed posture avoid slouching forward and/or leaning backward stand up and walk around regularly to remove the strain on your leg muscles take short rests to relax your neck and shoulders avoid tensing your muscles or shrugging your shoulders install the external display, keyboard and mouse properly and within comfortable reach if you view your monitor more than your documents, place the display at the center of your desk to minimize neck strain
Taking care of your vision Long viewing hours, wearing incorrect glasses or contact lenses, glare, excessive room lighting, poorly focused screens, very small typefaces and low-contrast displays could stress your eyes. The following sections provide suggestions on how to reduce eyestrain. Eyes
Rest your eyes frequently. Give your eyes regular breaks by looking away from the monitor and focusing on a distant point. Blink frequently to keep your eyes from drying out. Keep your display clean. Keep your head at a higher level than the top edge of the display so your eyes point downward when looking at the middle of the display. Adjust the display brightness and/or contrast to a comfortable level for enhanced text readability and graphics clarity. Eliminate glare and reflections by:
placing your display in such a way that the side faces the window or any light source
minimizing room light by using drapes, shades or blinds
using a task light changing the display's viewing angle using a glare-reduction filter using a display visor, such as a piece of cardboard extended from the display's top front edge Avoid adjusting your display to an awkward viewing angle. Avoid looking at bright light sources, such as open windows, for extended periods of time.
Display
xii Developing good work habits Develop the following work habits to make your computer use more relaxing and productive:
Take short breaks regularly and often. Perform some stretching exercises. Breathe fresh air as often as possible. Exercise regularly and maintain a healthy body. Warning! We do not recommend using the computer on a couch or bed. If this is unavoidable, work for only short periods, take breaks regularly, and do some stretching exercises. Note: For more information, please refer to "Regulations and safety notices" on page 28 in the AcerSystem User Guide. First things first We would like to thank you for making an Acer notebook your choice for meeting your mobile computing needs. xiii Your guides To help you use your Acer notebook, we have designed a set of guides:
First off, the Just for Starters...poster helps you get started with setting up your computer. The printed Aspire One Series User Guide contains useful information applying to all models in the Aspire product series. It covers basic topics such as Acer eRecovery Management, using the keyboard, Audio, etc. Please understand that due to its nature, the Generic User Guide as well as the AcerSystem User Guide mentioned below will occasionally refer to functions or features which are only contained in certain models of the series, but not necessarily in the model you purchased. Such instances are marked in the text with language such as "only for certain models". The printed Quick Guide introduces you to the basic features and functions of your new computer. For more on how your computer can help you to be more productive, please refer to the AcerSystem User Guide. This guide contains detailed information on such subjects as system utilities, data recovery, expansion options and troubleshooting. In addition it contains warranty information and the general regulations and safety notices for your notebook. It is available in Portable Document Format (PDF) and comes preloaded on your notebook. Follow these steps to access it:
1 Click on Start, All Programs, AcerSystem. 2 Click on AcerSystem User Guide. Note: Viewing the file requires Adobe Reader. If Adobe Reader is not installed on your computer, clicking on AcerSystem User Guide will run the Adobe Reader setup program first. Follow the instructions on the screen to complete the installation. For instructions on how to use Adobe Reader, access the Help and Support menu. Basic care and tips for using your computer Turning your computer on and off To turn on the computer, simply press and release the power button below the LCD screen beside the easy-launch buttons. Please refre to "Quick Guide" for the location of the power button. xiv
To turn the power off, do any of the following:
Use the Windows shutdown command Click on Start then click on Shut Down. Use the power button You can also put the computer in sleep mode by pressing the sleep hotkey
<Fn> + <F4>. Note: If you cannot power off the computer normally, press and hold the power button for more than four seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it.
Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces.
Taking care of your AC adapter Here are some ways to take care of your AC adapter:
Do not connect the adapter to any other device.
Do not step on the power cord or place heavy objects on top of it. Carefully route the power cord and any cables away from foot traffic.
When unplugging the power cord, do not pull on the cord itself but pull
on the plug. The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord. Also, the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating. xv Taking care of your battery pack Here are some ways to take care of your battery pack:
Use only batteries of the same kind as replacements. Turn the power off before removing or replacing batteries. Do not tamper with batteries. Keep them away from children. Dispose of used batteries according to local regulations. Recycle if possible.
Turn off the computer and remove the battery pack. Disconnect the AC adapter. Use a soft, moist cloth. Do not use liquid or aerosol cleaners. Cleaning and servicing When cleaning the computer, follow these steps:
1 2 3 If either of the following occurs:
Please refer to "Frequently asked questions" on page 10 . the computer has been dropped or the body has been damaged;
the computer does not operate normally xvi s t n e t n o C Information for your safety and comfort Safety instructions Additional safety information Operating environment Medical devices Vehicles Potentially explosive environments Emergency calls Disposal instructions Tips and information for comfortable use First things first Your guides Basic care and tips for using your computer Turning your computer on and off Taking care of your computer Taking care of your AC adapter Taking care of your battery pack Cleaning and servicing Acer eRecovery Management Acer eRecovery Management Launching Acer eRecovery Management Indicators Touchpad Touchpad basics (with two-click buttons) Using a computer security lock Using the keyboard Lock keys and embedded numeric keypad Windows keys Hotkeys Special keys (only for certain models) Frequently asked questions Requesting service International Travelers Warranty (ITW) Before you call Battery pack Battery pack characteristics Maximizing the battery's life Installing and removing the battery pack Charging the battery Checking the battery level Optimising battery life Battery-low warning Taking your notebook PC with you Disconnecting from the desktop iii iii vii vii vii viii viii viii ix x xiii xiii xiii xiii xiv xiv xv xv 1 1 2 3 4 4 5 6 6 7 8 9 10 12 12 12 13 13 13 14 15 15 15 16 17 17 Moving around Preparing the computer What to bring to meetings Taking the computer home Preparing the computer What to take with you Special considerations Setting up a home office Traveling with the computer Preparing the computer What to take with you Special considerations Traveling internationally with the computer Preparing the computer What to bring with you Special considerations Securing your computer Using a computer security lock Using passwords Entering passwords Setting passwords Expanding through options Connectivity options Built-in network feature Universal Serial Bus (USB) BIOS utility Boot sequence Enable disk-to-disk recovery Password Power management Troubleshooting Troubleshooting tips Error messages Regulations and safety notices FCC notice LCD pixel statement Radio device regulatory notice General European Union (EU) The FCC RF safety requirement Canada Low-power license-exempt radio communication devices (RSS-210) LCD panel ergonomic specifications Index 17 17 18 18 18 18 19 19 19 19 19 20 20 20 20 20 21 21 21 22 22 23 23 23 24 24 24 24 25 25 26 26 26 28 28 29 29 29 30 30 32 32 33 Acer eRecovery Management 1 E n g l i s h Note: The following content is for general reference only. Actual product specifications may vary. Acer eRecovery Management backs up and recovers data flexibly, reliably and completely. Acer eRecovery Management Acer eRecovery Management allows you to restore or reinstall applications and drivers. Acer eRecovery Management provides you with:
Restore system to factory default Reinstall applications/drivers 2 h s i l g n E Launching Acer eRecovery Management 1 You may also launch Acer eRecovery Management by running the program from the Acer program group in the Start menu, or by double-clicking the icon if you have created a desktop shortcut. 2 3 You can choose to restore the system from a factory default image or reinstall applications and drivers. Follow the instructions on screen to complete the process. Indicators The computer has serveral easy-to-read status indicators.The front panel indicators are visible even when the computer cover is closed up. Icon Function Description Bluetooth Indicates the status of Bluetooth communication. 3 E n g l i s h HDD Indicates when the hard disk drive is active. Num Lock Lights up when Num Lock is activated. Caps Lock Lights up when Caps Lock is activated. Battery Indicates the computer's batttery status. 1. Charging: The light shows amber when the battery is charging. 2. Fully charged: The light shows green when in AC mode. h s i l g n E 4 Touchpad The built-in touchpad is a pointing device that senses movement on its surface. This means the cursor responds as you move your finger across the surface of the touchpad. The central location on the palmrest provides optimum comfort and support. Touchpad basics (with two-click buttons) The following items show you how to use the touchpad with two-click buttons. 1 2 3
Move your finger across the touchpad (1) to move the cursor.
Press the left (2) and right (3) buttons located beneath the touchpad to perform selection and execution functions. These two buttons are similar to the left and right buttons on a mouse. Tapping on the touchpad is the same as clicking the left button. Function Left button (2) Right button (3) Main touchpad (1) Execute Quickly click twice. Select Drag Click once. Click and hold, then use finger on the touchpad to drag the cursor. Tap twice (at the same speed as double-clicking a mouse button). Tap once. Tap twice (at the same speed as double-clicking a mouse button); rest your finger on the touchpad on the second tap and drag the cursor. Access context menu Click once. Note: Illustrations for reference only. The exact configuration of your PC depends on the model purchased. 5 E n g l i s h Note: When using the touchpad, keep it and your fingers dry and clean. The touchpad is sensitive to finger movement; hence, the lighter the touch, the better the response. Tapping harder will not increase the touchpad's responsiveness. Note: By default, vertical and horizontal scrolling is enabled on your touchpad. It can be disabled under Mouse settings in Windows Control Panel. Using a computer security lock The notebook comes with a Kensington-compatible security slot for a security lock. Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. h s i l g n E 6 Using the keyboard The keyboard has full-sized keys and an embedded numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys and embedded numeric keypad The keyboard has three lock keys which you can toggle on and off. Lock key Caps Lock When Caps Lock is on, all alphabetic characters typed are in uppercase. Description Num Lock
<Fn> + <F11>
When Num Lock is on, the embedded keypad is in numeric mode. The keys function as a calculator (complete with the arithmetic operators
+, -, *, and /). Use this mode when you need to do a lot of numeric data entry. A better solution would be to connect an external keypad. Note: <Fn> + <F11> only for certain models. Scroll Lock
<Fn> + <F12>
When Scroll Lock is on, the screen moves one line up or down when you press the up or down arrow keys respectively. Scroll Lock does not work with some applications. The embedded numeric keypad functions like a desktop numeric keypad. It is indicated by small characters located on the upper right corner of the keycaps. To simplify the keyboard legend, cursor-control key symbols are not printed on the keys. Desired access Number keys on embedded keypad Cursor-control keys on embedded keypad Main keyboard keys Hold <Shift> while using cursor-
control keys. Type numbers in a normal manner. Hold <Fn> while using cursor-control keys. Num Lock off Num Lock on Hold <Fn> while typing letters on embedded keypad. Type the letters in a normal manner. 7 E n g l i s h Windows keys The keyboard has two keys that perform Windows-specific functions. Key Description Windows key Pressed alone, this key has the same effect as clicking on the Windows Start button; it launches the Start menu. It can also be used with other keys to provide a variety of functions:
> : Open or close the Start menu
> + <D>: Display the desktop
> + <E>: Open Windows Explore
> + <F>: Search for a file or folder
> + <L>: Lock your computer (if you are connected to a
network domain), or switch users (if you're not connected to a network domain)
> + <M>: Minimizes all windows
> + <R>: Open the Run dialog box
> + <U>: Open Ease of Access Center
> + <BREAK>: Display the System Properties dialog box
> + <TAB>: Cycle through programs on the taskbar
<CTRL> + <
network)
> + <F>: Search for computers (if you are on a Note: Depending on your edition of Windows XP, some shortcuts may not function as described. Application key This key has the same effect as clicking the right mouse button;
it opens the application's context menu. 8 h s i l g n E Hotkeys The computer employs hotkeys or key combinations to access most of the computer's controls like screen brightness, volume output and the BIOS utility. To activate hotkeys, press and hold the <Fn> key before pressing the other key in the hotkey combination. Hotkey
<Fn> + <F1>
Icon Function Hotkey help Description Displays help on hotkeys.
<Fn> + <F2>
<Fn> + <F3>
System Properties Display the System Properties dialog box. Power Options Properties Display the Power Options Properties dialog box.
<Fn> + <F4>
Sleep Puts the computer in Sleep mode.
<Fn> + <F5>
Display toggle
<Fn> + <F6>
Screen blank Switches display output between the display screen, external monitor (if connected) and both. Turns the display screen backlight off to save power. Press any key to return.
<Fn> + <F7>
Touchpad toggle Turns the internal touchpad on and off.
<Fn> + <F8>
Speaker toggle Turns the speakers on and off.
<Fn> + < >
Brightness up Increases the screen brightness.
<Fn> + < >
Brightness down Decreases the screen brightness.
<Fn> + < >
<Fn> + < >
Volume up Volume down Increases the sound volume
(only for certain models). Decreases the sound volume
(only for certain models). Special keys (only for certain models) You can locate the Euro symbol and the US dollar sign at the upper-center and/or bottom-right of your keyboard. E n g l i s h 9 The Euro symbol 1 2 Open a text editor or word processor. Either press <
and then press the <5> key at the upper-center of the keyboard.
> at the bottom-right of the keyboard, or hold <Alt Gr>
Note: Some fonts and software do not support the Euro symbol. Please refer to www.microsoft.com/typography/faq/faq12.htm for more information. The US dollar sign 1 2 Open a text editor or word processor. Either press <
and then press the <4> key at the upper-center of the keyboard.
> at the bottom-right of the keyboard, or hold <Shift>
Note: This function varies according to the language settings. 10 h s i l g n E Frequently asked questions The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up. Look at the power indicator:
If it is not lit, no power is being supplied to the computer. Check the following:
If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack.
Make sure that the AC adapter is properly plugged into the computer
and to the power outlet. If it is lit, check the following:
Is a non-bootable (non-system) disk in the external USB floppy drive?
Remove or replace it with a system disk and press <Ctrl> + <Alt> +
<Del> to restart the system. Nothing appears on the screen. The computer's power management system automatically blanks the screen to save power. Press any key to turn the display back on. If pressing a key does not turn the display back on, three things might be the cause:
The brightness level might be too low. Press <Fn> + <> (increase) to adjust the brightness level. The display device might be set to an external monitor. Press the display toggle hotkey <Fn> + <F5> to toggle the display back to the computer. If the Sleep indicator is lit, the computer is in Sleep mode. Press and release the power button to resume.
No audio is heard from the computer. Check the following:
The volume may be muted. In Windows, look at the volume control
(speaker) icon on the taskbar. If it is crossed-out, click on the icon and deselect the Mute all option. The volume level may be too low. In Windows, look at the volume control icon on the taskbar. You can also use the volume control buttons to adjust the volume. See "Hotkeys" on page 8 for more detail.
E n g l i s h 11
If headphones, earphones or external speakers are connected to the line-
out port on the computer, the internal speakers automatically turn off. The keyboard does not respond. Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work. Check the following:
Make sure that the printer is connected to a power outlet and that it is turned on.
Make sure that the printer cable is connected securely to the computer's parallel port or a USB port and the corresponding port on the printer. I want to restore my computer to its original settings without recovery CDs. Note: If your system is the multilingual version, the operating system and language you choose when you first turn on the system will be the only option for future recovery operations. This recovery process helps you restore the C: drive with the original software content that is installed when you purchase your notebook. Follow the steps below to rebuild your C: drive. (Your C: drive will be reformatted and all data will be erased.) It is important to back up all data files before using this option. Before performing a restore operation, please check the BIOS settings. Check to see if Acer disk-to-disk recovery is enabled or not. 1 2 Make sure the D2D Recovery setting in Main is Enabled. 3 Exit the BIOS utility and save changes. The system will reboot. Note: To activate the BIOS utility, press <F2> during POST. To start the recovery process:
1 2 While the Acer logo is showing, press <Alt> + <F10> at the same time to Restart the system. enter the recovery process. Refer to the onscreen instructions to perform system recovery. 3 12 h s i l g n E Important! This feature occupies 15 GB in a hidden partition on your hard disk Requesting service International Travelers Warranty (ITW) Your computer is backed by an International Travelers Warranty (ITW) that gives you security and peace of mind when traveling. Our worldwide network of service centers are there to give you a helping hand. An ITW passport comes with your computer. This passport contains all you need to know about the ITW program. A list of available, authorized service centers is in this handy booklet. Read this passport thoroughly. Always have your ITW passport on hand, especially when you travel, to receive the benefits from our support centers. Place your proof-of-purchase in the flap located inside the front cover of the ITW passport. If the country you are traveling in does not have an Acer-authorized ITW service site, you can still get in contact with our offices worldwide. Please consult http://global.acer.com. Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps). You are required to provide the following information:
Name: __________________________________________________________________ Address: _________________________________________________________________ Telephone number: ______________________________________________________ Machine and model type: _________________________________________________ Serial number: ___________________________________________________________ Date of purchase: ________________________________________________________ Battery pack The computer uses a battery pack that gives you long use between charges. 13 E n g l i s h Battery pack characteristics The battery pack has the following characteristics:
Employs current battery technology standards. Delivers a battery-low warning. The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer. However, recharging with the computer turned off results in a significantly faster charge time. The battery will come in handy when you travel or during a power failure. It is advisable to have an extra fully charged battery pack available as backup. Contact your dealer for details on ordering a spare battery pack. Maximizing the battery's life Like all other batteries, your computer's battery will degrade over time. This means that the battery's performance will diminish with time and use. To maximize your battery's life, you are advised to adhere to the recommendations set out below. Conditioning a new battery pack Before you use a battery pack for the first time, there is a
"conditioning" process that you should follow:
1 Insert the new battery without turning the computer on. 2 Connect the AC adapter and fully charge the battery. 3 Disconnect the AC adapter. 4 Turn on the computer and operate using battery power. 5 6 Fully deplete the battery until the battery-low warning appears. Reconnect the AC adapter and fully charge the battery again. 14 h s i l g n E Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. If the computer is to be stored for more than two weeks, you are advised to remove the battery pack from the unit. Warning: Do not expose battery packs to temperatures below 0C
(32F) or above 45C (113F). Extreme temperatures may adversely affect the battery pack. By following the battery conditioning process you condition your battery to accept the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns:
Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged. Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. A standard computer battery has a life span of about 300 charges. Installing and removing the battery pack Important! Before removing the battery from the unit, connect the AC adapter if you want to continue using your computer. Otherwise, turn off the computer first. To install a battery pack:
1 Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2 Slide the battery into the battery bay and gently push until the battery locks in place. To remove a battery pack:
1 2 Slide the battery release latch to release the battery. Pull the battery from the battery bay. 15 E n g l i s h Charging the battery To charge the battery, first make sure that it is correctly installed in the battery bay. Plug the AC adapter into the computer, and connect to a mains power outlet. You can continue to operate your computer on AC power while your battery is charging. However, charging the battery with the computer turned off results in a significantly faster charge time. Note: You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully charged battery. Checking the battery level The Windows power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level. Optimising battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below:
Purchase an extra battery pack. Use AC power whenever possible, reserving battery for on-the-go use. Eject a PC Card if it is not being used, as it will continue to draw power (for selected model). Store the battery pack in a cool, dry place. The recommended temperature is 10C (50F) to 30C (86F). Higher temperatures cause the battery to self-discharge faster. Excessive recharging decreases the battery life. Look after your AC adapter and battery. 16 h s i l g n E Battery-low warning When using battery power pay attention to the Windows power meter. Warning: Connect the AC adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation:
Situation Recommended Action The AC adapter and a power outlet are available. 1. Plug the AC adapter into the computer, and then connect to the mains power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. An extra fully charged battery pack is available. 1. Save all necessary files. 2. Close all applications. 3. Shut down the operating system to turn off the computer. 4. Replace the battery pack. 5. Turn on the computer and resume work. The AC adapter or a power outlet is unavailable. You have no spare battery pack. 1. Save all necessary files. 2. Close all applications. 3. Shut down the operating system to turn off the computer. Taking your notebook PC with you This section gives you tips and hints to consider when moving around or traveling with your computer. E n g l i s h 17 Disconnecting from the desktop Follow these steps to disconnect your computer from external accessories:
1 2 3 4 5 6 7 Save any open files. Remove any media, floppy disks or compact disks from the drive(s). Shut down the computer. Close the display cover. Disconnect the cord from the AC adapter. Disconnect the keyboard, pointing device, printer, external monitor and other external devices. Disconnect the Kensington lock if you are using one to secure the computer. Moving around When you are just moving within short distances, for example, from your office desk to a meeting room. Preparing the computer Before moving the computer, close and latch the display cover to place it in Sleep mode. You can now safely take the computer anywhere you go within the building. To bring the computer out of Sleep mode, open the display; then press and release the power button. If you are taking the computer to a client's office or a different building, you may choose to shut down the computer:
Click on Start, Turn Off Computer, then click on Turn Off (Windows XP). Or:
You can put the computer in Sleep mode by pressing <Fn> + <F4>. Then close and latch the display. When you are ready to use the computer again, unlatch and open the display;
then press and release the power button. 18 h s i l g n E Note: If the Sleep indicator is off, the computer has entered Hibernation mode and is turned off. If the power indicator is off but the Sleep indicator is on, the computer has entered Sleep mode. In both cases, press and release the power button to turn the computer back on. Note that the computer may enter Hibernation mode after being in Sleep mode for a period of time. What to bring to meetings If your meeting is relatively short, you probably do not need to bring anything with you other than your computer. If your meeting will be longer, or if your battery is not fully charged, you may want to bring the AC adapter with you to plug in your computer in the meeting room. If the meeting room does not have an electrical outlet, reduce the drain on the battery by putting the computer in Sleep mode. Press <Fn> + <F4> or close the display cover whenever you are not actively using the computer. To resume, open the display (if closed), then press and release the power button. Taking the computer home When you are moving from your office to your home or vice versa. Preparing the computer After disconnecting the computer from your desktop, follow these steps to prepare the computer for the trip home:
Check that you have removed all media and compact disks from the drive(s). Failure to remove the media can damage the drive head. Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall.
Caution: Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen. What to take with you Unless you have some items at home, take the following items with you:
AC adapter and power cord The printed User's Guide E n g l i s h 19 Special considerations Follow these guidelines to protect your computer while traveling to and from work:
Minimize the effects of temperature changes by keeping the computer
with you. If you need to stop for an extended period of time and cannot carry the computer with you, leave the computer in the trunk of the car to avoid exposing the computer to excessive heat. Changes in temperature and humidity can cause condensation. Allow the computer to return to room temperature, and inspect the screen for condensation before turning on the computer. If the temperature change is greater than 10 C (18 F), allow the computer to come to room temperature slowly. If possible, leave the computer for 30 minutes in an environment with a temperature between outside and room temperature. Setting up a home office If you frequently work on your computer at home, you may want to purchase a second AC adapter for use at home. With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse. Traveling with the computer When you are moving within a larger distance, for instance, from your office building to a client's office building or traveling locally. Preparing the computer Prepare the computer as if you were taking it home. Make sure that the battery in the computer is charged. Airport security may require you to turn on your computer when carrying it into the gate area. What to take with you Take the following items with you:
AC adapter Spare, fully-charged battery pack(s) Additional printer driver files if you plan to use another printer h s i l g n E 20 Special considerations In addition to the guidelines for taking the computer home, follow these guidelines to protect your computer while traveling:
Always take the computer as carry-on luggage. If possible, have the computer inspected by hand. Airport security X-ray machines are safe, but do not put the computer through a metal detector. Avoid exposing floppy disks to hand-held metal detectors.
Traveling internationally with the computer When you are moving from country to country. Preparing the computer Prepare the computer as you would normally prepare it for traveling. What to bring with you Bring the following items with you:
AC adapter Power cords that are appropriate for the country to which you are traveling Spare, fully-charged battery packs Additional printer driver files if you plan to use another printer Proof of purchase, in case you need to show it to customs officials International Travelers Warranty passport
Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the AC adapter power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. If you are using the modem, check if the modem and connector is compatible with the telecommunications system of the country you are traveling in.
Securing your computer Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks a security notch and passwords. 21 E n g l i s h Using a computer security lock The notebook comes with a Kensington-compatible security slot for a security lock. Wrap a computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See "BIOS utility" on page 24. User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation for maximum security. Password on Boot secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation for maximum security.
Important! Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center. h s i l g n E 22 Entering passwords When a password is set, a password prompt appears in the center of the display screen.
When the Supervisor Password is set, a prompt appears when you press
<F2> to enter the BIOS utility at boot-up. Type the Supervisor Password and press <Enter> to access the BIOS utility. If you enter the password incorrectly, a warning message appears. Try again and press <Enter>.
When the User Password is set and the password on boot parameter is
enabled, a prompt appears at boot-up. Type the User Password and press <Enter> to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press <Enter>. Important! You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again. Setting passwords You can set passwords using the BIOS utility. Expanding through options Your notebook PC offers you a complete mobile computing experience. 23 E n g l i s h Connectivity options Ports allow you to connect peripheral devices to your computer as you would with a desktop PC. For instructions on how to connect different external devices to the computer, read the following section. Built-in network feature The built-in network feature allows you to connect your computer to an Ethernet-based network. To use the network feature, connect an Ethernet cable from the Ethernet
(RJ-45) port on the chassis of the computer to a network jack or hub on your network. 24 Universal Serial Bus (USB) The USB 2.0 port is a high-speed serial bus which allows you to connect USB peripherals without taking up precious system resources. h s i l g n E BIOS utility The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press <F2> during the POST; while the notebook PC logo is being displayed. Boot sequence To set the boot sequence in the BIOS utility, activate the BIOS utility, then select Boot from the categories listed at the top of the screen. Enable disk-to-disk recovery To enable disk-to-disk recovery (hard disk recovery), activate the BIOS utility, then select Main from the categories listed at the top of the screen. Find D2D Recovery at the bottom of the screen and use the <F5> and <F6> keys to set this value to Enabled. E n g l i s h 25 Password To set a password on boot, activate the BIOS utility, then select Security from the categories listed at the top of the screen. Find Password on boot: and use the <F5> and <F6> keys to enable this feature. Power management This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time
(called an inactivity timeout), the computer stops some or all of these devices in order to conserve energy. This computer employs a power management scheme that supports the advanced configuration and power interface (ACPI), which allows for maximum power conservation and maximum performance at the same time. Windows handles all power-saving chores for your computer. h s i l g n E 26 Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer. Do not attempt to open the computer yourself; contact your dealer or authorized service center for assistance. Troubleshooting tips This notebook PC incorporates an advanced design that delivers onscreen error message reports to help you solve problems. If the system reports an error message or an error symptom occurs, see "Error messages" below. If the problem cannot be resolved, contact your dealer. See
"Requesting service" on page 12. Error messages If you receive an error message, note the message and take the corrective action. The following table lists the error messages in alphabetical order together with the recommended course of action. Error messages Corrective action CMOS battery bad Contact your dealer or an authorized service center. CMOS checksum error Contact your dealer or an authorized service center. Disk boot failure Insert a system (bootable) disk into the floppy drive
(A:), then press <Enter> to reboot. Equipment configuration error Press <F2> (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. Hard disk 0 error Contact your dealer or an authorized service center. Hard disk 0 extended type error Contact your dealer or an authorized service center. I/O parity error Contact your dealer or an authorized service center. Keyboard error or no keyboard connected Keyboard interface error Contact your dealer or an authorized service center. Contact your dealer or an authorized service center. Memory size mismatch Press <F2> (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. If you still encounter problems after going through the corrective measures, please contact your dealer or an authorized service center for assistance. Some problems may be solved using the BIOS utility. E n g l i s h 27 h s i l g n E 28 Regulations and safety notices FCC notice This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio or television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the device and receiver. Connect the device into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/television technician for help. Notice: Shielded cables All connections to other computing devices must be made using shielded cables to maintain compliance with FCC regulations. Notice: Peripheral devices Only peripherals (input/output devices, terminals, printers, etc.) certified to comply with the Class B limits may be attached to this equipment. Operation with non-certified peripherals is likely to result in interference to radio and TV reception. Caution Changes or modifications not expressly approved by the manufacturer could void the user's authority, which is granted by the Federal Communications Commission, to operate this computer. Operation conditions This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. 29 E n g l i s h Notice: Canadian users This Class B digital apparatus complies with Canadian ICES-003. Remarque l'intention des utilisateurs canadiens Cet appareil numrique de la classe B est conforme a la norme NMB-003 du Canada. Declaration of Conformity for EU countries Hereby, Acer, declares that this notebook PC series is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.
(Please visit http://global.acer.com/products/notebook/reg-nb/index.htm for complete documents.) Compliant with Russian regulatory certification LCD pixel statement The LCD unit is produced with high-precision manufacturing techniques. Nevertheless, some pixels may occasionally misfire or appear as black or red dots. This has no effect on the recorded image and does not constitute a malfunction. Radio device regulatory notice Note: Below regulatory information is for models with wireless LAN and / or Bluetooth only. General This product complies with the radio frequency and safety standards of any country or region in which it has been approved for wireless use. Depending on configurations, this product may or may not contain wireless radio devices (such as wireless LAN and/or Bluetooth modules). Below information is for products with such devices. h s i l g n E European Union (EU) R&TTE Directive 1999/5/EC as attested by conformity with the followingharmonized standard:
30 EN301 489-1 V1.6.1 EN301 489-3 V1.4.1 EN301 489-17 V1.2.1 Article 3.1(a) Health and Safety EN60950-1:2001+ A11:2004 EN50371:2002 Article 3.1(b) EMC Article 3.2 Spectrum Usages EN300 220-3 V1.1.1 EN300 328 V1.7.1 EN300 440-2 V1.1.2 EN301 893 V1.2.3 List of applicable countries EU member states as of May 2004 are: Belgium, Denmark, Germany, Greece, Spain, France, Ireland, Italy, Luxembourg, the Netherlands, Austria, Portugal, Finland, Sweden, United Kingdom Estonia, Latvia, Lithuania, Poland, Hungary, Czech Republic, Slovak Republic, Slovenia, Cyprus and Malta. Usage allowed in the countries of European Union, as well as Norway, Switzerland, Iceland and Liechtenstein. This device must be used in strict accordance with the regulations and constraints in the country of use. For further information, please contact local office in the country of use. The FCC RF safety requirement The radiated output power of the wireless LAN Mini PCI Card and Bluetooth card is far below the FCC radio frequency exposure limits. Nevertheless, the notebook PC series shall be used in such a manner that the potential for human contact during normal operation is minimized as follows:
1 Users are requested to follow the RF safety instructions on wireless option devices that are included in the user's manual of each RF option device. Index A AC adapter caring for xiv audio troubleshooting 10 B battery pack battery-low warning 16 caring for xv characteristics 13 charging 15 checking charge level 15 installing 14 low conditions 16 maximizing life 13 optimizing 15 removing 15 using the first time 13 BIOS utility 24 brightness hotkeys 8 C caps lock 6 care on indicator 3 AC adapter xiv battery pack xv computer xiv charging checking level 15 cleaning computer xv computer caring for xiv cleaning xv disconnecting 17 indicators 3 keyboards 6 moving around 17 security 21 setting up a home office 19 taking home 18 traveling internationally 20 traveling on local trips 19 troubleshooting 26 turning off xiv 33 connections network 23 D display hotkeys 8 troubleshooting 10 E error messages 26 Euro 9 F FAQ. See frequently-asked questions frequently-asked questions 10 H Hibernation mode hotkey 8 hotkeys 8 K keyboard 6 embedded numeric keypad 6 hotkeys 8 lock keys 6 troubleshooting 11 Windows keys 7 M media access on indicator 3 messages error 26 N network 23 num lock 6 on indicator 3 numeric keypad embedded 6 P password 21 types 21 ports 23 printer troubleshooting 11 problems 10 display 10 keyboard 11 printer 11 startup 10 troubleshooting 26 34 S scroll lock 6 security keylock 5, 21 passwords 21 speakers hotkey 8 troubleshooting 10 support information 12 T touchpad 4 hotkey 8 travel international flights 20 local trips 19 troubleshooting 26 tips 26 U universal serial bus 24 W Windows keys 7
1 2 3 | User manual of module | Users Manual | 360.85 KiB | June 03 2009 |
802.11b/g Adapter Model AR5BHB63 802.11b/g Adapter Dec 2007 Atheros Communications, Inc. COMPANY CONFIDENTIAL March 2009 i Document Conventions Text Conventions bold Bold type within paragraph text indicates commands, file names, directory names, paths, output, or returned values. Example: The DK_Client package will not function unless you use the wdreg_install batch file. italic Within commands, italics indicate a variable that the user must specify. Example: mem_alloc size_in_bytes Titles of manuals or other published documents are also set in italics. Courier The Courier font indicates output or display. Example:
Menu Error:Unable to allocate memory for transfer!
The Menu character tag is used for menu items. Example: Choose Edit > Copy.
Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit. Within commands, items enclosed in braces are options from which the user must choose. Within commands, the vertical bar separates options. An ellipsis indicates a repetition of the preceding parameter. The right angle bracket separates successive menu selections. Example: Start > Programs > DK > wdreg_install. Notices NOTE: This message denotes neutral or positive information that calls out important points to the text. A note provides information that may apply only in special cases. ii Dec 2007 COMPANY CONFIDENTIAL Atheros Communications, Inc. Revision History Revision Dec 2007 Description of Changes Initial Release Contents Introduction............................................................................................................... 5 System Requirements ........................................................................................ 5 Profile Management ................................................................................................. 5 Create or Modify a Configuration Profile ...................................................... 5 Remove a Configuration Profile ...................................................................... 5 Auto Profile Selection Management....................................................................... 5 Switching to a Different Configuration Profile..................................................... 5 Import and Export Profiles...................................................................................... 5 Importing a Profile.................................................................................................... 5 Exporting a Profile.................................................................................................... 5 TCP/IP Configuration ............................................................................................. 5 Configuring the TCP/IP Address for the network device:................................. 5 General Tab................................................................................................................ 5 Advanced Tab ........................................................................................................... 5 Security Tab ............................................................................................................... 5 Using EAP-TLS Security ................................................................................... 5 Using EAP-TTLS Security................................................................................. 5 Using PEAP (EAP-GTC) Security.................................................................... 5 Using PEAP-MSCHAP V2 Security ................................................................ 5 Using LEAP Security ......................................................................................... 5 Configuring LEAP .................................................................................................... 5 Pre-Shared Encryption Keys ................................................................................... 5 Defining pre-shared encryption keys:.................................................................... 5 Overwriting an Existing Static WEP Key .............................................................. 5 Disabling Static WEP................................................................................................ 5 Using WPA Passphrase Security ............................................................................ 5 Zero Configuration................................................................................................... 5 Wireless Network Configuration ........................................................................... 5 Check the Status Information or Diagnostics ....................................................... 5 iv Dec 2007 COMPANY CONFIDENTIAL Atheros Communications, Inc. Current Status.....................................................................................................5 Adapter Information Button....................................................................................5 Diagnostics Tab .........................................................................................................5 Transmitted Frames..................................................................................................5 Received Frames........................................................................................................5 Scan Available Networks.........................................................................................5 Connecting to a different network..........................................................................5 Display Settings.........................................................................................................5 ACU Tools..................................................................................................................5 Tray Icon.....................................................................................................................5 Color ...........................................................................................................................5 Quality........................................................................................................................5 RSSI*............................................................................................................................5 Ad Hoc Mode ............................................................................................................5 Ad Hoc Mode Profile Configuration...............................................................5 Infrastructure (Access Point) Mode........................................................................5 Infrastructure (Access Point) Mode Profile Configuration ..........................5 Uninstall an Old Driver............................................................................................5 Additional Security Features...................................................................................5 Message Integrity Check (MIC) ..............................................................................5 Advanced Status Information .................................................................................5 Compliance ................................................................................................................5 Industry Canada Notice:...................................................... !
Avis de Conformit la Rglementation dIndustrie Canada:...!
European Community CE Notice:.....................................................................5 Introduction The 802.11b/g Adapter supports 802.11bg operation. The card uses the Atheros Client Utility (ACU) which is a user-mode utility designed to edit and add profiles for selected Atheros network interface adapters. System Requirements Laptop/ PC containing:
32-bit PCI Express Bus 32 MB memory or greater 300 MHz processor or higher Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6) Profile Management Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility. Add a profile Edit a profile Import a Profile Export a Profile Order profiles Switch to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode (which uses an access point) or ad hoc mode (a group of stations participating in the wireless LAN). Create or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab. To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab. Note that the ACU only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the New button displays an error message. Remove an old profile or modify an existing profile for a new use. Dec 2007 Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button. 2. The Auto Profile Selection Management window appears, with a list of all created profiles in the Available Profiles box. 3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto Selected Profiles box. Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box. 2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority. 3. Click OK. 4. Check the Auto Select Profiles box. 5. Save the modified configuration file. When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the adapter tries the next highest priority profile that matches the SSID, and so on. With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the adapter tries with the next highest priority profile. 8 Switching to a Different Configuration Profile 1. To switch to a different profile, go to the Profile Management tab. 2. Click on the profile name in the Profile List. 3. Click the Activate button. The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength for that profile. Import and Export Profiles Importing a Profile 1. From the Profile Management tab, click the Import button. The Import Profile window appears. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open. The imported profile appears in the profiles list. Exporting a Profile 1. From the Profile Management tab, highlight the profile to export. 2. Click the Export button. The Export Profile window appears. 3. Browse to the directory to export the profile to. 4. Click Save. The profile is exported to the specified location. TCP/IP Configuration Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections. 2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties. 3. Select Internet Protocol (TCP/IP) and click Properties. 4. Click the radio button Use the following IP address, then enter an IP address and Subnet mask. Assigning an IP address and Subnet mask allows stations to operate in access point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click OK to finish. Dec 2007 General Tab In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile. This name must be unique. Profile names are not case sensitive. Client Name Identifies the client machine. Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Configure up to three SSIDs (SSID1, SSID2, and SSID3). Advanced Tab In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. Edit the fields in the Advanced tab of Profile Management to configure the profile. Transmit Power Level Power Save Mode Selects the transmit power level in mW. Actual transmit power may be limited by hardware. Specify:
Maximum mode causes the access point to buffer incoming messages for the wireless adapter. The adapter periodically polls the access point to see if any messages are waiting. Normal uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. Off turns power saving off, thus powering up the wireless adapter continuously for a short message response time. Network Type Specifies the network as either infrastructure or ad hoc. 802.11b Preamble Authentication Mode Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in the 802.11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. Open enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. Shared only allows the adapter to associate with access points that have the same WEP key. For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the adapter should attempt to associate. 10 Security Tab In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window. Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the General and Advanced tabs. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP WPA/WPA2 Passphrase Enables WPA/WPA2 Passphrase security. Click on the Configure button and fill in the WPA/WPA2 Passphrase. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP Pre-Shared Key
(Static WEP) If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Note: If the Lock checkbox is checked, you cannot change any values in this profile. See your system administrator. Enables the use of pre-shared keys that are defined on both the access point and the station. To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-
Shared Keys window. If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. None No security (not recommended). Dec 2007 Using EAP-TLS Security To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list. The server/domain name and the login name are filled in automatically from the certificate information. Click OK. 3. Click OK. 4. Activate the profile. Using EAP-TTLS Security To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA/WPA2 radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TTLS from the drop-down menu. Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user name. 4. Click Advanced and:
OR: Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. Change the login name if needed. 5. Click OK. 6. Enable the profile. 12 Using PEAP (EAP-GTC) Security To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-GTC) from the drop-down menu. To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. To avoid the need to log on again after resuming operation (for example, after your computer goes into standby or hibernate mode), check Always Resume the Secure Session. 3. Select the appropriate network certificate authority from the drop-down list. 4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 5. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication. 6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Dec 2007 Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu. To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 5. Click OK. 6. Enable the profile. 14 Using LEAP Security To use security In the Atheros Client Utility, access the Security tab in the Profile Management window. LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager. Configuring LEAP On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. drop-down menu. 1. Click the Configure button. 2. Specify a user name and password. Select to Use Temporary User Name and Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP user name. OR: Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process. Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use. 3. Enter the user name and password. 4. Confirm the password. 5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server. (default) OR: Enter a specific domain name. 6. If desired, check No Network Connection Unless User Is Logged In to force the wireless adapter to disassociate after logging off. 7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Dec 2007 Pre-Shared Encryption Keys Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces). Encryption Keys WEP Keys
(1-4) Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the key as the default encryption key. WEP Key Size Defines the size for each encryption key. The options include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII) 4. Click OK for the changes to take effect. Overwriting an Existing Static WEP Key 1. Click the Pre-Shared Key radio button on the Security tab. 2. Click on Configure. 3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click in the field of the existing static WEP key to overwrite. 4. Delete the asterisks in that field. 5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP To disable static WEP for a particular profile, Select any other security option on the Profile Management tab to automatically disable static WEP OR: choose None on the Security tab to disable security, and click OK (not recommended). 16 Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. Zero Configuration This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS). Wireless Network Configuration The Windows WZCS is a service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured. To set Zero Configuration on Windows XP, take the following steps:
1. 2. Select the check box Use Windows to configure my wireless network settings to set In Windows XP, open the Wireless Network Configuration Properties dialog box. Zero Configuration. When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles, thus users can not ( create new profiles with different settings while using Windows Zero Configuration. The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Profile Management tab of the ACU. Dec 2007 In Windows XP, open the Wireless Network Configuration Properties dialog box. To turn Zero Configuration off on Windows XP, take the following steps:
1. 2. Clear the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the ACU Profile Management tab. Check the Status Information or Diagnostics The Atheros client utility includes a number of tools to display current diagnostics and status information. Check current status Check driver information Check receive and transmit diagnostics Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Current Status screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the General tab. Link Status Shows whether the station is associated to the wireless network. Wireless Mode Displays the wireless mode. Configure the wireless mode on the Advanced tab. IP Address Displays the computer's IP address. Network Type The type of network the station is connected to. Options include:
Infrastructure (access point) Ad Hoc Configure the network type on the Advanced tab. Current Channel Shows the currently connected channel. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Signal Strength Shows the strength of the signal. Click the Advanced button to see the advanced status diagnostics. 18 Adapter Information Button The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name Name of the wireless network adapter. MAC Address MAC address of the wireless network adapter. Driver Driver name and path of the wireless network adapter driver. Driver Version Version of the wireless network adapter driver. Driver Date Creation date of the wireless network adapter driver. Client Name Name of the client computer. Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The Diagnostics tab does not require any configuration. It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received Broadcast packets transmitted and received Unicast packets transmitted and received Total bytes transmitted and received The Adapter Information button has general information about the wireless network adapter and NDIS driver. The Advanced Statistics button to shows statistics for diagnostics for frames received by or transmitted to the wireless network adapter:
Dec 2007 Transmitted Frames Frames transmitted OK Frames retried Frames dropped No ACK frames ACK frames RTS frames Clear-to-send (CTS) frames No CTS frames Retried RTS frames Retried data frames Received Frames Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile for that network. Infrastructure
(AP) Network Connected Infrastructure
(AP) Network 20 Ad Hoc Network Connected Ad Hoc Network Encryption Active Dec 2007 Display Settings To change the display settings, choose Options > Display Settings from the menu. The display settings dialog box contains tools to set the:
Signal Strength Display Units Sets the units used when displaying signal strength: percentage (%) or dBm. Refresh Interval Use the up/down arrows to set the display refresh interval in seconds. Data Display Sets the display to cumulative or relative:
Relative displays the change in statistical data since the last update. Cumulative displays statistical data collected since opening the profile. ACU Tools Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio Enable or disable the RF Signal on all Atheros station reference designs. Enable/Disable Tray Icon Enable or disable the tray icon. Troubleshooting Run the optional Troubleshooting Utility. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Atheros Client Utility application. 22 Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address. Right-click on the tray icon to:
Help Open the online help. Open Atheros Client Utility Launch the Atheros Client Utility (ACU). Use the ACU to configure a profile or view status and statistics information. Troubleshooting Run the Troubleshooting Utility. Preferences Set the ACU startup and menu options. Check to start the program automatically when Windows starts, and check menu items that should appear on the popup menu. Enable/Disable Radio Enable or disable the RF signal. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to the access point. Select Profile Click a configuration profile name to switch to. If no Show Connection Status Shows whether auto profile selection is enabled. configuration profile exists for a connection, add a profile. This window displays connection information:
Active Profile Displays the active configuration profile name. Auto Profile Selection Connection Status Link Quality SSID Access Point Name Access Point IP Address Link Speed Adapter IP Address Displays whether the adapter is connected to a wireless network. Lists the quality of the link connection. Displays the SSID of the associated network. Shows the name of the AP the wireless adapter is connected to. Shows the IP address of the access point the wireless adapter is connected to. Lists the speed of the link connection. Displays the IP address of the wireless adapter. Exit Exit the Atheros Client Utility application. Dec 2007 The colors are defined as follows:
Color Green Green Yellow Red Gray Quality Excellent Good Poor Poor RSSI*
20 dB +
10-20 dB +
5-10 dB
< 5 dB No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage. Enable or disable the tray icon in the Action menu. Ad Hoc Mode In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP). To connect to an ad hoc network, configure the profile for ad hoc mode. Ad Hoc operation may be limited by Hardware to meet regulatory requirements. Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab) Transmit Power Level 802.11b Preamble (if using 802.11b) Wireless Mode When Starting an Ad Hoc Network Make sure to also edit the General and Security tabs. 24 Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here. To connect to an access point network, configure the profile for access point mode. Infrastructure (Access Point) Mode Profile Configuration To configure a profile in infrastructure (access point) mode, change the Network Type in the Advanced tab. For access point mode, modify the settings:
Power Save Mode 802.11b Preamble (if using 802.11b) Wireless Mode 802.11 Authentication Mode Make sure to also edit the General and Security tabs. Dec 2007 Uninstall an Old Driver Uninstall an old driver before upgrading to a new NDIS driver release. To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4. 1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros AR500x Wireless Network Adapter, and choose Uninstall. 2. Click OK to uninstall the device. 3. When the device is uninstalled from Device Manager, search for and delete the driver files that reside in the system. a. Go to the Start menu and choose Search > For Files or Folders. b. Enter oem*.inf in the Search for files or folders named: field, and enter Atheros in the Containing text: field. c. Click Search Now. A few files matching these criteria are possible, if previous drivers have not been removed properly. d. Choose the files that have been found and delete them from the system. 4. To complete the uninstallation, remove the file ar5211.sys from the folder
\WINNT\system32\drivers. Additional Security Features These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point. Message Integrity Check (MIC) MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering. Temporal Key Integrity Protocol (TKIP) This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys. Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. 26 Advanced Status Information Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen. Network Name (SSID) Displays the wireless network name. Configure the network name on the General tab. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Authentication Type Displays the authentication mode. Message Integrity Check Configure the authentication mode on the General tab. Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets. Associated AP Name Displays the name of the access point the wireless adapter is Associated AP IP Address Associated AP MAC Address associated to. Shows the IP address of the access point the wireless adapter is associated to. Displays the MAC address of the access point the wireless adapter is associated to. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. Configure the power save mode on the Advanced tab. Current Power Level Displays the transmit power level rate in mW. Current Signal Strength Shows the current signal strength in dBm. Current Noise Level Displays the current noise level in dBm. Up Time Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds. 802.11b Preamble Displays the 802.11b preamble format. Configure the preamble format on the Advanced tab. Current Receive Rate Shows the current receive rate in Mbps. Current Transmit Rate Displays the current transmit rate in Mbps. Channel Shows the currently connected channel. Frequency Displays frequency the station is using. Channel Set Shows the current channel set. Dec 2007 Regulatory Compliance Notices USA-Federal Communications Commission (FCC) FCC Radio-Frequency Exposure & Approval Conditions:
FCC ID#: HLZAR5BHB63 1. Antennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of user during normal operating condition. This device must not be co-located or operating in conjunction with any other antenna or transmitter. 2. Only those antennas filed under FCC ID:HLZAR5BHB63 can be used with this device. 3. When the Minicard is installed in a system where the antenna location is less than 20 cm separation distance to the body of the user, additional equipment authorization is required. 4. The regulatory label on the final system must include the statement: Contains FCC ID:HLZAR5BHB63 . 5. The final system integrator must ensure there is no instruction provided in the user manual or customer documentation indicating how to install or remove the transmitter module. 6. AR5BHB63 must be installed and used in strict accordance with the manufacturers instructions as described in the user documentation that comes with the product. This device complies with the following radio frequency and safety standards. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna
-Increase the distance between the equipment and the receiver.
-Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. Caution: Exposure to Radio Frequency Radiation. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. This device must not be co-located or operating in conjunction with any other antenna or transmitter 28 Canada Industry Canada (IC) This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. L utilisation de ce dispositif est autorise seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l utilisateur du dispositif doit tre prt accepter tout brouillage radiolectrique reu, mme si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. The term "IC" before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Pour empecher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit etre utilize a l'interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal. Si le matriel (ou son antenne d'emission) est installe a l'exterieur, il doit faire l'objet d'une licence. Caution: Exposure to Radio Frequency Radiation. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canadas website www.hc-sc.gc.ca/rpb. European Community CE Notice:
The CE! mark indicates compliance with the essential requirements of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
EN 300 328 EN 301 489-17 EN 60950 Marking by the symbol: ! indicates that usage restrictions apply in countries listed on this products packaging. Dec 2007 Taiwan DGT Radio Compliance:
2.4GHz Operation 30 Dec 2007
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2009-06-04 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 2009-05-08 | 2412 ~ 2462 | DTS - Digital Transmission System | |
3 | 2009-03-06 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 | Effective |
2009-06-04
|
||||
1 2 3 |
2009-05-08
|
|||||
1 2 3 |
2009-03-06
|
|||||
1 2 3 | Applicant's complete, legal business name |
Acer Incorporated
|
||||
1 2 3 | FCC Registration Number (FRN) |
0013355508
|
||||
1 2 3 | Physical Address |
8F, 88, Sec 1, Hsin Tai Wu Rd
|
||||
1 2 3 |
Hsichih, Taipei Hsien, N/A 221
|
|||||
1 2 3 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 2 3 | TCB Application Email Address |
T******@TIMCOENGR.COM
|
||||
1 2 3 |
m******@ccsemc.com
|
|||||
1 2 3 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 3 | Grantee Code |
HLZ
|
||||
1 2 3 | Equipment Product Code |
AR5BHB63
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 | Name |
H**** S****** L******
|
||||
1 2 3 | Title |
Manager
|
||||
1 2 3 | Telephone Number |
886-2******** Extension:
|
||||
1 2 3 | Fax Number |
886-2********
|
||||
1 2 3 |
H******@acer.com.tw
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 3 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | No | |||||
1 2 3 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 07/19/2009 | ||||
1 2 3 | 06/21/2009 | |||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | WLAN MODULE | ||||
1 2 3 | WLAN Module | |||||
1 2 3 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 | Modular Equipment Type | Limited Single Modular Approval | ||||
1 2 3 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 3 | Original Equipment | |||||
1 2 3 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 3 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | Yes | ||||
1 2 3 | No | |||||
1 2 3 | Grant Comments | Limited modular Approval. Power listed is conducted. Approval is limited to the specific configuration described in this filing. Only antenna(s) documented in this filing may be used with this transmitter and must not be co-located or operating in conjunction with any other antenna or transmitter. Approval is limited to OEM installation only. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. Highest reported body SAR is 0.00879W/kg. (Original grant notes 03/06/2009) This class 2 permissive change adds a new laptop configuration model ZA3/Aspire one/AO751. This device is approved for collocation with Bluetooth module FCCID: QDS-BRCM1018. Highest reported body SAR value is: 0.044 W/kg. | ||||
1 2 3 | Limited modular Approval. Power listed is conducted. Approval is limited to the specific configuration described in this filing. Only antenna(s) documented in this filing may be used with this transmitter and must not be co-located or operating in conjunction with any other antenna or transmitter. Approval is limited to OEM installation only. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. Highest reported body SAR is 0.00879W/kg. (03/06/2009) CLASS II CHANGE: No circuit changes: Highest reported body SAR is: 0.044 W/kg. | |||||
1 2 3 | Limited modular Approval. Power listed is conducted. Approval is limited to the specific configuration described in this filing. Only antenna(s) documented in this filing may be used with this transmitter and must not be co-located or operating in conjunction with any other antenna or transmitter. Approval is limited to OEM installation only. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. Highest reported body SAR is 0.00879W/kg. | |||||
1 2 3 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 | Firm Name |
Sporton International Inc.
|
||||
1 2 3 |
Sporton International Inc
|
|||||
1 2 3 | Name |
A******** C******
|
||||
1 2 3 | Telephone Number |
886-3******** Extension:
|
||||
1 2 3 |
886-2******** Extension:
|
|||||
1 2 3 | Fax Number |
886-3********
|
||||
1 2 3 |
886-2********
|
|||||
1 2 3 |
a******@sporton.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.1170000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.1170000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.1170000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC