all | frequencies |
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
EUT Host Specifications | Users Manual | 125.69 KiB | ||||
1 |
|
EUT Host User Manual | Users Manual | 2.89 MiB | ||||
1 |
|
EUT User Manual | Users Manual | 498.31 KiB | ||||
1 | Test Report | |||||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | Test Report | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | Test Report | |||||||
1 | ID Label/Location Info | |||||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | Internal Photos | |||||||
1 | Test Setup Photos |
1 | EUT Host Specifications | Users Manual | 125.69 KiB |
FCC ID: EJE-WL0001 (IC: 337J-WL0001) Report No. M030725_Certification_Mace_Calexico EMC Technologies Pty Ltd - Report No. M030725_Certification_Mace_Calexico ANNEX K EUT HOST SPECIFICATIONS EMC Technologies Pty Ltd. 57 Assembly Drive, Tullamarine VIC 3043 Australia www.emctech.com 28 Jul 03 Rev 3.0
(FJ Spec Rev 1.4) Mace Latest Intel Centrino Mobile Technology Seamless Wi-Fi Connectivity 12.1" XGA TFT Active Digitizer 2GB Maximum Memory support Programmable Security Feature CPU Secondary Cache Chipset Memory Hard Disk Drive Display LCD Type Digitizer Graphics Sound Communication Wireless LAN External I/O Interface Port Replicator Security Panel Mace T3010 Intel Pentium M Processor 1.4GHz 1MB Intel 855GM 256MB SDRAM, Max. 2GB (DDR266) 40GB (Ultra DMA/100 and S.M.A.R.T. Support) 12.1" XGA TFT Colour (Max 1024x768 dots) Transmissive Active (Electromagnetic) Integrated Intel Graphics w/ Dynamic Video Memory Technology with 3D Graphics Accelerator and AGP and MPEG-2 Support (for DVD) AC Link Audio (AC97 compliance: ALC202) with Internal Speaker, Internal Microphone V.90 Modem & 10/100Mbps LAN Intel PRO/Wireless 2100 - 802.11b with Dual Antenna OR Broadcom Wireless 11b/11g 1xVGA, 2xUSB 2.0, 1xRJ11, 1xRJ45, Audio (Headphone-out, Microphone-in), Docking for Port Replicator, AC Adapter Power Input 1xVGA, 2xUSB 2.0, 1xRJ45, AC Adapter Power Input Application Mode:
Application Launch Buttons and 2 programmable buttons Security Mode:
Unique Numeric Buttons for Security Lock (More than 800,000 possible password combinations) Keyboard Pointing Device Card Slot IR Interface AC Adapter Battery*
OS Supported Other Software Bundled Dimensions Weight 82-key w/ 19mm Key Pitch, 3mm Key Stroke Touch Pad with Scroll button PC Card Slot Type I/II x 2 IrDA1.1 ( Max. 4Mbps ) Input: AC100-240V, Output: DC16V 60W Approx. 4.4 hours, Lithium-Ion Microsoft Windows XP Tablet PC Edition Norman Virus Control Norman Personal FireWall 293mm(W) x 236mm(D) x 27.4mm min. (H) Approx. 1.9Kg
1 | EUT Host User Manual | Users Manual | 2.89 MiB |
T Series.book Page 1 Thursday, July 31, 2003 10:49 AM Copyright Fujitsu PC Corporation has made every effort to ensure the accuracy and completeness of this document. However, as ongoing development efforts are continually improving the capabilities of our products, we cannot guarantee the accuracy of the contents of this document. We disclaim liability for errors, omissions, or future changes. Fujitsu, the Fujitsu logo, and LifeBook are registered trademarks of Fujitsu Limited. The following are registered trademarks of Microsoft Corporation: MS, MS-DOS, Windows. PCMCIA is a trademark of the Personal Computer Memory Card International Association. Intel and Pentium are registered trademarks of Intel Corporation. Adobe Acrobat Reader is a registered trademark of Adobe System Inc. C o p y r i g h t PowerQuest and Drive Image are registered trademarks of PowerQuest Corporation. All other trademarks mentioned herein are the property of their respective owners. Copyright 2003 Fujitsu PC Corporation. All rights reserved. No part of this publication may be copied, reproduced, or translated, without prior written consent of Fujitsu PC Corporation. No part of this publication may be stored or transmitted in any electronic form without the written consent of Fujitsu PC Corporation. B5FH-9011-01EN-00 DECLARATION OF CONFORMITY according to FCC Part 15 Responsible Party Name:
Fujitsu PC Corporation Address:
5200 Patrick Henry Drive Santa Clara, CA 95054 Telephone:
(408) 982-9500 Declares that product:
Model Configuration:
LifeBook T3010 Tablet PC LifeBook T3010D Tablet PC Complies with Part 15 of the FCC Rules. This device complies with Part 15 of the FCC rules. Operations are subject to the following two conditions:
(1) This device must not be allowed to cause harmful interference, (2) This device must accept any interference received, including interference that may cause undesired operation. T Series.book Page 2 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C T Series.book Page 3 Thursday, July 31, 2003 10:49 AM T a b l e o f C o n t e n t s Fujitsu LifeBook T Series Tablet PC Table of Contents 1 PREFACE Preface About This Guide . 3 FPC Contact Information . 3 Warranty . 3 Keyboard Using the Keyboard . 19 Numeric Keypad. 19 Windows Keys . 19 Cursor Keys . 20 Function Keys. 20 LifeBook Security/Tablet PC Buttons Changing Tablet PC Button Functions . 22 Setting up LifeBook Security Panel . 22 Passwords . 22 Using Your LifeBook Security Panel . 23 Uninstalling the Security Panel Application . 24 Touchpad Pointing Device Clicking . 25 Double-Clicking . 25 Dragging . 26 Scrolling . 26 Touchpad Control Adjustment . 26 Pen and Active Digitizer Using the Pen. 27 Calibrating the Pen. 27 Replacing the Pen Tip. 28 Using the Active Digitizer . 28 Volume Control Controlling the Volume . 29 3 USING YOUR TABLET PC Power Sources Connecting the Power Adapters . 33 Starting Your Tablet PC Power On. 34 Boot Sequence . 34 BIOS Setup Utility. 34 Booting the System . 34 2 GETTING TO KNOW YOUR TABLET PC Overview Unpacking . 7 Optional Accessories . 8 Locating the Controls and Connectors Top and Front Components . 10 Left-Side Panel Components . 11 Right-Side Panel Components . 12 Rear Panel Components . 13 Bottom Components . 14 Status Indicator Panel Power Indicator . 15 AC Adapter Indicator . 15 Battery Level Indicators . 15 Battery Charging Indicator . 16 Hard Drive Access Indicator . 16 NumLk Indicator. 16 CapsLock Indicator . 16 ScrLk Indicator . 16 Security Indicator . 16 Display Panel Opening the Display Panel . 17 Using the System as a Tablet . 17 Adjusting Display Panel Brightness . 18 T Series.book Page 4 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C Activating Additional Utilities . 35 Registering Your LifeBook T Series Tablet PC . 35 Power Management Suspend/Resume Button . 36 Standby Mode . 36 Hibernate Mode. 37 Display Timeout . 37 Hard Disk Timeout . 37 Windows Power Management . 37 Restarting the System. 37 Power Off . 38 4 USER-INSTALLABLE FEATURES Lithium ion Battery Recharging the Battery. 41 Replacing the Battery . 42 Memory Upgrade Module Installing Memory Upgrade Modules . 43 To Remove a Memory Upgrade Module . 43 Checking the Memory Capacity . 44 PC Cards Installing PC Cards . 45 Removing PC Cards . 45 Smart Card Reader . 45 Port Replicator Rear Panel Components. 46 Front Panel Components . 47 Attaching the Port Replicator . 47 Detaching the Port Replicator. 47 Device Ports Modem (RJ-11) Jack . 48 Internal LAN (RJ-45) jack . 48 Docking Port . 48 Universal Serial Bus Ports . 48 Infrared Port. 48 Microphone Jack . 49 Headphone Jack. 49 External Monitor Port. 49 5 TROUBLESHOOTING Troubleshooting Identifying the Problem . 53 Specific Problems . 53 Troubleshooting Table . 54 Power On Self Test Messages . 61 Modem Result Codes. 62 Restoring Your Pre-installed Software Drive Image Special Edition (DISE) . 63 6 CARE AND MAINTENANCE Care and Maintenance LifeBook T Series Tablet PC . 67 Keyboard . 68 Batteries. 68 Optional Floppy Disk Drive and Floppy Disks. 68 Optional CD Drive and CDs. 68 PC Cards . 69 7 SPECIFICATIONS Specifications Configuration Label . 73 Physical Specifications . 73 Processing Specifications . 73 Memory/Storage Specifications . 73 Display Specifications. 73 Interface Specifications . 73 Power Specifications . 74 Environmental Specifications . 74 Agency Approval Specifications . 74 Additional Specifications . 74 Regulatory Information . 75 T Series.book Page 5 Thursday, July 31, 2003 10:49 AM T a b l e o f C o n t e n t s 8 GLOSSARY Glossary . 81 APPENDIX:
INTEGRATED WIRELESS LAN USERS GUIDE FCC Regulatory Information. 89 Before Using the Wireless LAN For Better Communications . 91 Stopping Transmission . 92 Starting Transmission . 92 Connection Using Windows XP Flow of Operations. 93 Preparation for Wireless LAN Connection. 93 Connection to the Network . 95 Other settings Setting of Power-saving Function . 99 Troubleshooting Troubleshooting the Wireless LAN . 100 IP address information About IP Addresses . 102 Specifications Wireless LAN Specifications . 103 T Series.book Page 6 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C T Series.book Page 1 Thursday, July 31, 2003 10:49 AM 1 Preface 1 T Series.book Page 2 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C 2 T Series.book Page 3 Thursday, July 31, 2003 10:49 AM Preface ABOUT THIS GUIDE The LifeBook T Series Tablet PC from Fujitsu PC Corporation is a powerful convertible computer. It can be used either as a standard notebook using keyboard input, or in tablet configuration using pen input. It is powered by an Intel microprocessor, has a built-in color display with an active digitizer, and brings the computing power of desktop personal computers (PCs) to a portable and versatile environment. This manual explains how to operate your LifeBook T Series Tablet PCs hardware and built-in system soft-
ware. Your LifeBook T Series Tablet PC is compatible with the IBM PC AT, and it comes with Windows XP Tablet Edition pre-installed. Your LifeBook T Series Tablet PC is a completely self-
contained unit with an active-matrix (TFT) color LCD display. It has a powerful interface that enables it to support a variety of optional features. Conventions Used in the Guide Keyboard keys appear in brackets. Example: [Fn], [F1], [Esc], [Enter] and [Ctrl]. Pages with additional information about a specific topic are cross-referenced within the text. Example: (See page xx.) On screen buttons or menu items appear in bold. Example: Click OK to restart your Tablet PC. DOS commands you enter appear in Courier type. Example: Shutdown the computer?
The information icon highlights information that will enhance your understanding of the subject material. The caution icon highlights information that is important to the safe operation of your computer, or to the integrity of your files. Please read all caution information carefully. The warning icon highlights information that can be hazardous to either you, your LifeBook T Series Tablet PC, or your files. Please read all warning information carefully. P r e f a c e FPC CONTACT INFORMATION Service and Support You can contact FPC Service and Support the following ways:
Toll free: 1-800-8Fujitsu (1-800-838-5487) Fax: 1-408-764-2724 E-mail: 8fujitsu@fujitsupc.com Web site: http://www.fujitsupc.com Before you place the call, you should have the following information ready so that the customer support representative can provide you with the fastest possible solution:
Product name Product configuration number Product serial number Purchase date Conditions under which the problem occurred Any error messages that have occurred Hardware configuration Type of device connected, if any Fujitsu Online You can go directly to the online Fujitsu Product catalog for your Tablet PC. Go to Start -> All Programs ->
Service & Support Software, and click on Pen Accesso-
ries Web site. You can also reach Fujitsu Service and Support online by going to Start -> All Programs -> Service & Support Software, and clicking on Fujitsu Service & Support Web site. You must have an active internet connection to use the online URL links. WARRANTY Your LifeBook T Series Tablet PC is backed by an Inter-
national Limited Warranty and includes toll-free tech-
nical support. Check the service kit that came with your Tablet PC for warranty terms and conditions. 3 T Series.book Page 4 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - P r e f a c e 4 T Series.book Page 5 Thursday, July 31, 2003 10:49 AM 2 Getting to Know Your Tablet PC 5 T Series.book Page 6 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C 6 T Series.book Page 7 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Overview Figure 2-1. Fujitsu LifeBook T Series Tablet PC This section describes the components of your Fujitsu LifeBook T Series Tablet PC. We strongly recommend that you read it before using your Tablet PC, even if you are already familiar with mobile computers. UNPACKING When you receive your LifeBook T Series Tablet PC, unpack it carefully, and compare the parts you have received with the items listed below. For a pre-configured model you should have:
LifeBook T Series Tablet PC (Figure 2-1) AC adapter with AC power cord (Figure 2-2) Phone/Modem (RJ-11) telephone cable Pen (located in pen holder) Driver and Application Restore (DAR) CD Getting Started Guide Users Guide (this document) International Limited Warranty Booklet Microsoft Windows Manual and Certificate of Authenticity Lithium ion battery (pre-installed) You may also have one or more of the following optional devices in the box:
Port Replicator (Figure 2-3) External USB Floppy Disk Drive External DVD/CD-ROM Combo Drive External USB CD-ROM Drive Figure 2-2. AC Adapter Figure 2-3. Optional Port Replicator 7 T Series.book Page 8 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n 2 OPTIONAL ACCESSORIES The following optional accessories can be used with the LifeBook T Series Tablet PC. Refer to the instructions provided with these accessories for details on their use. For the latest list of accessories available for your LifeBook T Series Tablet PC, be sure to frequently check the Fujitsu Web site at: www.fujitsupc.com Peripheral/Accessory Fujitsu Part Number Docking Options LifeBook T Series Tablet PC port replicator FPCPR39AP Carrying Cases Duo Travel Bag Director leather carrying case Diplomat carrying case Propak backpack Storage Options External USB floppy disk drive External DVD/CD-RW combo drive External CD-ROM drive Memory 256 MB SDRAM, DDR266 512 MB SDRAM, DDR 266 1.0 GB SDRAM, DDR 266 128 MB Compact Flash card 256 MB Compact Flash card 128 MB Secure Digital memory card Power Options AC Adapter with US cord Main battery Auto/airline adapter Battery charger Input Accessories Replacement pen set (2-pack) USB optical mouse Additional Accessories Smart Card holder Wireless LAN card, 802.11b Compact Flash card adapter Notebook Guardian Lock Logitech wireless keyboard and mouse FPCCC16 FPCCC22 FPCCC02 FPCCC07 FPCFDD12 FPCDVR26 FPCCD33AP FPCEM51AP FPCEM55AP FPCEM87AP FPCEMC02 FPCEMC03 FPCEMC01 FPCAC23 FPCBP73AP FPCAA02 FPCBC06 FPCPN11AP FPCMO08AP FPCSCH01 FPCWL08 FPCCFA01 FPCLCK02 FPCKB04 Table 2-1. Optional Accessories for LifeBook T Series Tablet PC 8 T Series.book Page 9 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Locating the Controls and Connectors Connectors and peripheral interfaces on the LifeBook T Series Tablet PC and the optional port replicator allow you to connect a variety of devices. Specific locations are illustrated in Figures 2-4 through 2-8. The table below provides a short description of each icon on the Life-
Book T Series Tablet PC. Each of the icons is either molded into or printed on the Tablet PC chassis. Connection Tablet PC Icon Purpose DC in connector Connect an external power source such as the AC adapter or auto/airline adapter. USB Port PCMCIA Card slot Microphone jack Headphone jack IrDA/FIR port Modem Tablet Dock port Security lock slot Suspend/Resume button Local Area Network (LAN) Battery Release Latch Wireless LAN On-Off Switch Connect Universal Serial Bus 2.0 or 1.1 compliant devices to the Tablet PC. Install Type I, Type II, or Type III PC Cards. Connect an external microphone. The internal microphone is disabled when you plug in an external microphone. Connect stereo headphones or powered external speakers. The internal speaker is disabled when you plug in external headphones or powered speakers. An infrared transceiver built into the Tablet PC allows you to communicate with other devices that are compliant with IrDA Standard Rev. 1.1. Effective range for infrared communication is about 3 feet, and within 15 degrees off center. A clear line-of-sight path must exist between the IrDA port on the computer and the IrDA transceiver on the other device. Connect a telephone line to the internal modem using a standard RJ-11 telephone plug. Connect the LifeBook T Series Tablet PC port replicator or other approved docking device. Refer to documentation accompanying the docking device for more information. The security slot allows you to secure the Tablet PC using Kensington-compatible locking devices. The Suspend/Resume button allows you to suspend Tablet PC activity without powering off, resume your Tablet PC from suspend mode, and power on the system when it has been shut down from Windows. The LAN (RJ-45) jack is used to connect the internal Fast Ethernet (10/100 Base-T/
TX) to a Local Area Network (LAN) in your office or home, or broadband devices such as a cable modem, DSL, or satellite Internet. The battery release latch allows you to remove the battery from your system for storage or replacement. The wireless LAN switch allows you to turn power to the optional wireless LAN device on and off. Table 2-2. System icons 9 T Series.book Page 10 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n 2 Pen/
Pen Holder Status Indicator Panel Rotation Hinge Display Panel Latch Display Panel Closed Cover Switch LifeBook Security/
Tablet PC Buttons Speaker Keyboard Touchpad Pointing Device Scroll Button Figure 2-4. LifeBook T Series Tablet PC with display open Touchpad Pointing Device The Touchpad pointing device consists of two mouse-
like buttons and one scroll button. See Touchpad Pointing Device on page 25. Keyboard A full-function keyboard with dedicated Windows keys. See Keyboard on page 19. Display Panel The display panel is a color LCD panel with back lighting for the display of text and graphics and active digitizer functionality. Rotation Hinge The rotation hinge allows you to transform your Tablet PC from a notebook configuration into a tablet configu-
ration. For more information, see See Using the System as a Tablet on page 17. TOP AND FRONT COMPONENTS The following is a brief description of the top and front features of the LifeBook T Series Tablet PC. (Figure 2-4) Pen/Pen Holder The pen is used as the interface with the active digitizer display. Closed Cover Switch The closed cover switch turns off the LCD back lighting when the display panel is closed. Display Panel Latch The display panel latch locks and releases the display panel. Status Indicator Panel The Status Indicator Panel displays symbols that corre-
spond to specific components of your LifeBook T Series Tablet PC. See Status Indicator Panel on page 15. LifeBook Security/Tablet PC Buttons The LifeBook T Series Tablet PC Security/Tablet PC Buttons provide hardware security and application launch capabilities. See LifeBook Security/ Tablet PC Buttons on page 21. 10 T Series.book Page 11 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Headphone Jack Air Vents PC Card Slots Microphone Jack PC Card Eject/Lock Button Figure 2-5. LifeBook T Series Tablet PC left-side panel LEFT-SIDE PANEL COMPONENTS Following is a brief description of your Tablet PCs left-
side components. (Figure 2-5) PC Card Slots The PC Card Slots allow you to install two Type II or one Type III PC Card. The PC Card Eject Button is used when ejecting a PC Card from the slot. See PC Cards on page 45. Headphone Jack The headphone jack allows you to connect headphones or powered external speakers. See Headphone Jack on page 49. Microphone Jack The microphone jack allows you to connect an external mono microphone. See Microphone Jack on page 49. 11 T Series.book Page 12 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n 2 Anti-theft Lock Slot Suspend/Resume Button Figure 2-6. LifeBook T Series Tablet PC right-side panel Modem (RJ-11) Port RIGHT-SIDE PANEL COMPONENTS Following is a brief description of your Tablet PCs right-
side components. Suspend/Resume Button The Suspend/Resume button allows you to suspend Tablet PC activity without powering off, resume your Tablet PC from standby mode, and power on your system when it has been shut down from the Windows operating system. See Power On on page 34. Modem (RJ-11) Telephone Port The Modem (RJ-11) telephone port is for attaching a telephone line to the internal multinational 56K modem. The internal multinational modem is not intended for use with Digital PBX systems. Do not connect the internal modem to a Digital PBX as it may cause serious damage to the internal modem or your entire LifeBook T Series Tablet PC. Consult your PBX manufacturers documentation for details. Some hotels have Digital PBX systems. Be sure to find out BEFORE you connect your modem. The internal modem is designed to the ITU-T V.90 standard. Its maximum speed of 53000 bps is the highest allowed by FCC, and its actual connection rate depends on the line conditions. The maximum speed is 33600 bps at upload. Anti-theft Lock Slot The anti-theft lock slot allows you to attach a optional physical lock-down device. 12 T Series.book Page 13 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Built-in Microphone Infrared Port WLAN On/Off Switch DC Power Jack External Monitor Port
(cover removed) LAN (RJ-45) Jack USB 2.0 Ports Figure 2-7. LifeBook T Series Tablet PC rear panel REAR PANEL COMPONENTS DC Power Jack The DC power jack allows you to plug in the AC adapter or the optional Auto/Airline adapter to power your Tablet PC and charge the internal Lithium ion Battery. External Monitor Port The external monitor port allows you to connect an external VGA or SVGA CRT monitor. Note that when the optional Port Replicator is attached to the system, you must use the external monitor port on the Port Replicator rather than the port on the system. See External Monitor Port on page 49. USB 2.0 Ports The two USB 2.0 ports allow you to connect Universal Serial Bus devices. See Universal Serial Bus Ports on page 48. Infrared Port The fast IrDA compatible port allows you to communi-
cate with another IrDA compatible infrared device without a cable. LAN (RJ-45) Jack The internal LAN (RJ-45) port is used for an internal Fast Ethernet (10/100 Base-T/TX) connection. See Internal LAN (RJ-45) jack on page 48. Built-in Microphone The built-in microphone allows mono audio input. WLAN On/Off Switch The wireless LAN On/Off Switch is used to power off the wireless antenna when not in use. 13 T Series.book Page 14 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n 2 Battery Pack Latch Lithium ion Battery Compartment Battery Pack Latch Port Replicator Connector Memory Upgrade Compartment Main Unit and Configuration Label (approximate location) Figure 2-8. LifeBook T Series Tablet PC bottom panel BOTTOM COMPONENTS Following is a brief description of your Tablet PCs bottom panel components. (Figure 2-8) Lithium ion Battery Compartment The battery compartment contains the internal Lithium ion battery. The battery should be removed when the computer is stored over a long period of time or for swapping a discharged battery with a charged Lithium ion battery. See Lithium ion Battery on page 41. Port Replicator Connector This connector allows you to connect the optional port replicator. Main Unit and Configuration Label The configuration label shows the model number and other information about your LifeBook T Series Tablet PC. In addition, the configuration portion of the label has the serial number and manufacturer information that you will need to give your support representative. It identifies the exact version of various components of your Tablet PC. Memory Upgrade Compartment Your Tablet PC comes with high speed Synchronous Dynamic RAM (SDRAM). The memory upgrade compartment allows you to expand the system memory capacity of your Tablet PC, hence improving overall performance. See Memory Upgrade Module on page 43. 14 T Series.book Page 15 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C 1 A Power Battery Charging AC Adapter Battery Level Hard Drive Access NumLk CapsLk ScrLk Security Indicator Figure 2-9. Status Indicator Panel Status Indicator Panel The Status Indicator Panel displays symbols that corre-
spond to specific components of your LifeBook T Series Tablet PC. These symbols tell you how each of those components is operating. (Figure 2-9) POWER INDICATOR The Power indicator symbol states whether your system is operational. It has several different states, each of which tells you what mode your Tablet PC is in at that time. Steady On: This means that there is power to your Tablet PC and that it is ready for use. Flashing: This means that your Tablet PC is in Standby mode. Steady Off: This means that your system is either in Hibernate mode, or that your Tablet PC has been turned off. If you are charging your battery, the Power indicator symbol will remain on even if your LifeBook T Series Tablet PC is shut off. The Power indicator symbol will also remain on if you have either adapter connected and are shut down from Windows. AC ADAPTER INDICATOR The AC adapter indicator states whether your notebook is operating from the AC adapter, the auto/airline adapter or the batteries. This icon has two different states that can tell you what power source your LifeBook notebook is using. On: This means that either of the adapters are currently in use. Off: Power is only coming from the batteries, and you do not have an adapter connected. BATTERY LEVEL INDICATORS The Battery Level indicators state whether or not the Lithium ion battery is installed and how much charge is available within the battery. (Figure 2-10) Additionally, this indicator displays when an overcur-
rent is detected. If an overcurrent is detected, the battery stops charging and the Battery Level indicator blinks at the rate of once per second. To stop the indicator from blinking, you must disconnect the power adapter. 15 If you are using the optional external numerical keypad, pressing the [NumLk]
key will activate the external keypad. The indicator will come on, however it will not change any of the functionality of your keyboard keys. CAPSLOCK INDICATOR The CapsLock indicator states that your keyboard is set to type in all capital letters. SCRLK INDICATOR The ScrLk indicator states that your scroll lock is active. SECURITY INDICATOR The Security Indicator flashes (if a password was set) when the system resumes from Off or Standby modes. You must enter the password that was set in the Security Panel before your system will resume operation. T Series.book Page 16 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o 76%100% Charging 76%100%
51%75%
26%50%
11%25%
Low Warning <11%
Critical Low or Dead Battery Shorted Battery Figure 2-10. Battery Level Indicator A shorted battery is damaged and must be replaced. (Figure 2-10) If there is no battery activity and the power adapters are not connected, the Battery Level indicators will also be off. BATTERY CHARGING INDICATOR Located to the left of the Battery Level indicator is a small arrow symbol. This symbol states whether the battery is charging. This indicator will flash if the battery is too hot or cold to charge. Batteries subjected to shocks, vibration or extreme temperatures can be permanently damaged. HARD DRIVE ACCESS INDICATOR The Hard Drive Access indicator states whether your internal hard drive is being accessed. NUMLK INDICATOR The NumLk indicator states that the integral keyboard is set in ten-key numeric keypad mode. If there is no battery activity and the power adapters are not connected, the Battery Level indicators will also be off. 16 T Series.book Page 17 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Latch Release Display Panel Latch Figure 2-11. Opening the display Display Panel Your LifeBook T Series Tablet PC contains a display panel that is backlit for easier viewing in bright environ-
ments. The convertible design of your Tablet PC allows you to open the display fully, rotate it 180 degrees, and lay it face up on the keyboard. This allows you to use the system as a tablet, much as you would a pad of paper. OPENING THE DISPLAY PANEL 1. Slide the latch release to the right. This releases the locking mechanism. While holding the latch release, lift display cover. 2. Lift the display backwards, being careful not to touch the screen, until it is at a comfortable viewing angle. (Figure 2-11) USING THE SYSTEM AS A TABLET If you would like to use the system as a tablet, perform the following steps. Rotate the system display only in the direction indicated in the procedure. Turning the display in the incorrect direction could cause hinge damage. In the following step, be sure to position the display perpendicular to the keyboard, otherwise the keyboard or display cover could get scratched. 1. Lift the display until it is perpendicular to the keyboard. (Figure 2-13). 2. When the display is perpendicular to the keyboard, rotate it clockwise (when viewed from the top). Be very careful to rotate it in the direction indicated.
(Figure 2-14). Turn the display 180 degrees so that it is facing backwards. (Figure 2-15) 3. Holding the top edge of the display panel, pull it forward until it is lying nearly atop the keyboard. 4. Push the latch towards the display (See "A" in Figure 2-12). The latch will pivot so the top latch disappears, and the bottom latch appears (See "B" in Figure 2-12). Holding the latch down, lay the display flush against the system so that the latch engages. You can now use your system as a tablet. (Figure 2-
16) Top latch A Display Side Bottom latch B Figure 2-12. Latching/Unlatching 5. To return the system to notebook configuration, repeat step 3 and 2. Be sure to turn the display in the opposite direction when performing step 2. 90o Figure 2-13. Fully open display 17 T Series.book Page 18 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o Figure 2-14. Rotating the display Figure 2-15. Display rotated completely Figure 2-16. System in tablet configuration 18 ADJUSTING DISPLAY PANEL BRIGHTNESS Once you have turned on your Tablet PC, you may want to adjust the brightness level of the screen to a more comfortable viewing level. There are two ways to adjust the brightness, keyboard and power management utility. Using Keyboard to Adjust Brightness Adjusting the brightness using the keyboard changes the system setting (i.e., the settings you make via the func-
tion keys automatically changes the brightness settings in the systems Pen and Tablet Settings).
[Fn+F6]: Pressing repeatedly will lower the brightness of your display.
[Fn+F7]: Pressing repeatedly will increase the brightness of the display. Using Power Management to Adjust Brightness To adjust brightness with the power management utility, click Start -> Control Panel -> Tablet and Pen Settings. Select the Display tab and set the screen brightness slider for battery and AC power scenarios. Using the Fujitsu Menu to Adjust Brightness To adjust brightness using the Fujitsu menu, click on the Fujitsu Menu icon in the system tray in the lower right corner of the screen. From the menu that appears, select Brightness Control. The Tablet and Pen Settings window will open. Select the Display tab and set the screen brightness slider for battery and AC power scenarios. If using AC power your brightness setting is set to its highest level by default. If using battery power your brightness settings is set to approximately mid-level by default. The higher the brightness level, the more power the LifeBook T Series Tablet PC will consume and the faster your batteries will discharge. For maximum battery life, make sure that the brightness is set as low as possible. T Series.book Page 19 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Function Keys Fn Key Start Key Numeric Keypad
(outlined with thick black line) Application Key Cursor Keys Figure 2-17. Keyboard Keyboard USING THE KEYBOARD Your LifeBook T Series Tablet PC has an integral 83-key keyboard. The keys perform all the standard functions of a 101-key keyboard, including the Windows keys and other special function keys. This section describes the following keys. (Figure 2-17) Numeric keypad: Your Tablet PC allows certain keys to serve dual purposes, both as standard characters and as numeric and mathematical keys. The ability to tog-
gle between the standard character and numerical keys is controlled through the [NumLk] key. Cursor keys: Your keyboard contains four arrow keys for moving the cursor or insertion point to the right, left, up, or down within windows, applications and documents. Function keys: The keys labeled [F1] through [F12], are used in conjunction with the [Fn] key to produce special actions that vary depending on what program is running. Windows keys: These keys work with your Windows operating system and function the same as the onscreen Start menu button, or the right button on your pointing device. NUMERIC KEYPAD Certain keys on the keyboard perform dual functions as both standard character keys and numeric keypad keys. NumLk can be activated by pressing the [NumLk] key. Turning off the NumLk feature is done the same way. Once this feature is activated you can enter numerals 0 through 9, perform addition ( + ), subtraction ( - ), multiplication ( * ), or division ( / ), and enter decimal points ( . ) using the keys designated as ten-key function keys. The keys in the numeric keypad are marked on the front edge of the key to indicate their secondary func-
tions. (Figure 2-17) If you are using the optional external numerical keypad, pressing the [NumLk]
key will activate the external keypad. The indicator will come on, however it will not change any of the functionality of your keyboard keys. WINDOWS KEYS Your LifeBook T Series Tablet PC has two Windows keys: a Start key and an Application key. The Start key displays the Start menu. This button functions the same as your onscreen Start menu button. The Application key functions the same as your right mouse button and displays shortcut menus for the selected item. (Please refer to your Windows documentation for additional information regarding the Windows keys.) (Figure 2-17) 19 T Series.book Page 20 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o CURSOR KEYS The cursor keys are the four arrow keys on the keyboard which allow you to move the cursor up, down, left, and right in applications. In programs such as Windows Explorer, it moves the focus (selects the next item up, down, left, or right). (Figure 2-17) FUNCTION KEYS Your Tablet PC has 12 function keys, F1 through F12. The functions assigned to these keys differ for each application. You should refer to your software documen-
tation to find out how these keys are used.
(Figure 2-17)
[Fn] Key The [Fn] key provides extended functions for the Tablet PC and is always used in conjunction with another key.
[Fn+F3]: Pressing [F3] while holding [Fn] will toggle the Audio Mute on and off.
[Fn+F4]: Pressing [F4] while holding [Fn] will toggle the built-in pointing device on and off. Note that the
[Fn+F4] combination only works if Manual Setting is selected in the BIOS. (See Entering the BIOS Setup Utility on page 34)
[Fn +F5]: Pressing [F5] while holding [Fn] allows you to toggle between video compensation and no compensation. (Video compensation controls spacing on the display. When it is enabled, displays with less than 1024 x 768 or 800 x 600 pixel resolution will still cover the entire screen.)
[Fn+F6]: Pressing [F6] repeatedly while holding [Fn]
will lower the brightness of your display. Note that adjusting the brightness using the keyboard changes the system setting.
[Fn+F7]: Pressing [F7] repeatedly while holding [Fn]
will increase the brightness of the display.
[Fn+F8]: Pressing [F8] repeatedly while holding [Fn]
will decrease the volume of your Tablet PC.
[Fn+F9]: Pressing [F9] repeatedly while holding [Fn]
will increase the volume of your Tablet PC.
[Fn+F10]: Pressing [F10] while holding [Fn] allows you to change your selection of where to send your display video. Each time you press the combination of keys you will step to the next choice. The choices, in order, are: built-in display panel only, both built-in display panel, and external monitor or external moni-
tor only. 20 T Series.book Page 21 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C
(1) Application A Button
(2) Application B Button
(3) Button 3
(4) Button 4 Enter Button Figure 2-18. LifeBook T Series Tablet PC Security/Tablet PC Buttons LifeBook Security/
Tablet PC Buttons A unique feature of your LifeBook T Series Tablet PC is the array of Security and Tablet PC buttons. These buttons allow you to secure your Tablet PC from unauthorized use and to launch specific applications with the touch of a button. If the security system is activated, upon starting your Tablet PC or resuming from Standby, Hibernate, or shut-
down mode the security system will require you to enter a password code using the security buttons. After you enter the correct password, your Tablet PC will resume operation. The five security/Tablet PC buttons are located on the bottom right-hand side of the display when it is config-
ured to be used as a notebook. (Figure 2-18) Security functions: All five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. See the right-hand column of Table 2-3. Tablet PC functions: All five of the buttons have primary functions. Four of the buttons have secondary functions when used as application buttons. The secondary functions are activated by pressing the Func-
tion (Fn) button while pressing the application button. See Table 2-3 for specific functions. The secondary func-
tions of the Application A and B buttons can be changed to launch any application. See Changing Tablet PC Button Functions on page 22 When the system is logging on or when it is locked (i.e., when you have the Logon or Computer Locked window showing on your desktop), the A and B buttons act as [Tab]
and [Enter] keys, respectively. Button Icon Primary Function Page Down Page Up Secondary Function
(Fn + Button) Security Panel Function
(Pre-boot and resuming from suspend) User-defined Application A
(Default = Calculator) Security Button 1 User-Defined Application B
(Default = MS Journal) Security Button 2 Screen Rotation VGA-Out Security Button 3 Secondary Function Selection Fujitsu Menu Utility Security Button 4 Ctl+Alt+Del Button None Security Enter Button Table 2-3. Security/Tablet PC Button Functions 21 T Series.book Page 22 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o Page Down / Application A Button When you press the Page Down button when the system is running, each press of the button will scroll the screen down one frame. This allows you to navigate quickly through large documents. When you press the Fn button while you press then release the Page Down/Application A button, you will automatically start whichever program is assigned to the button. The default application for this button is Calcu-
lator. See Changing Tablet PC Button Functions on page 22 to select a different application for this button. Page Up / Application B Button When you press the Page Up button when the system is running, each press of the button will scroll the screen up one frame. This allows you to navigate quickly through large documents. When you press the Fn button while you press then release the Page Up/Application A button, you will auto-
matically start whichever program is assigned to the button. The default application for this button is Microsoft Journal. See Changing Tablet PC Button Functions on page 22 to select a different application for this button. Screen Rotation / VGA-Out Button The screen rotation feature would normally be used only when the system is configured as a tablet. When you would like to use the tablet as an eBook, for example, you would use the portrait orientation; when accessing spreadsheets or using the system as a notebook, you would more typically use landscape orientation. When the system is changed to tablet configuration, the orientation automatically changes to portrait mode by default. The screen orientation default can be changed by going to the Control Panel and double-clicking on the Fujitsu Display Control icon and selecting the desired defaults from the Display Orientation section. After changing the defaults, click
[OK]. When you press the Screen Rotation / VGA-Out button, the system screen orientation changes from portrait
(vertical) to landscape (horizontal) or from landscape to portrait. Function / Fujitsu Menu Utility Button The Function button works in conjunction with the other application buttons to provide additional func-
tionality for the buttons. Refer to specific details above. 22 Pressing the Fn button twice in succession causes the Fujitsu Menu Utility to appear on your screen, allowing you to modify certain system settings. Ctl+Alt+Del Button Pressing and holding the Ctl-Alt-Del button for up to 750 msecs launches the Logon screen or the Windows Task Manager (if the system hasnt yet been configured). CHANGING TABLET PC BUTTON FUNCTIONS The Application A and B buttons can be changed to launch a program or perform an action you select. By default, the Application A button launches the Calcu-
lator, and the Application B button launches MS Journal. To launch different applications or cause the Application A or B buttons to perform a specific action:
1. Double-click on the Tablet and Pen Settings icon in the Control Panel. 2. Select the Tablet Buttons tab and select the button you would like to change from the list. 3. Click [Change] and open the drop down list in the Action: field. 4. Select the action you would like the button to perform. If you want to launch a program, click on Launch an Application then browse to the location of the program. 5. Click [OK], then click [OK] again. The buttons will now perform the actions you have assigned to them. SETTING UP LIFEBOOK SECURITY PANEL When you receive your Tablet PC, the security panel application is pre-installed without any passwords. The following sections provide detailed information on your security panel, how to set, change or remove passwords. Numbered Buttons Use these buttons to enter your password.(Figure 2-18) Enter Button After entering the button strokes, push this button to enter the password into the Tablet PC. (Figure 2-18) PASSWORDS The user and supervisor password may be set on this Tablet PC. A supervisor password is typically the same for all Tablet PCs and notebooks in a work group, office, or company to allow for system management. Individual computers in a group environment should not use a common password. A password consists of one to five button strokes plus the enter button. A valid stroke consists of pushing one or up to four buttons simulta-
neously. T Series.book Page 23 Thursday, July 31, 2003 10:49 AM The following are valid button strokes:
Pushing [4] by itself Pushing [2] and [3] at the same time Pushing [1], [2], and [4] at the same time Pushing [1], [2], [3], and [4] at the same time The following are valid passwords. The numbers within braces ({ }) are button strokes using more than one button.
{[2]+[3]}, [1], [Enter]
[4], [enter]
{[1]+[3]}, {[2]+[3]+[4]}, [1], [4], [2], [Enter]
Setting Passwords When shipped from the factory, no passwords are set. You have a choice of having no password or setting a supervisor and user password. You must set the super-
visor password before the user password. The purpose of supervisor password is to be able to bypass the user password in case the user password is forgotten. The supervisor password alone will not lock the system. You must set the supervisor and user passwords for the security panel to work. Setting Supervisor Password You must have set a supervisor password before setting any user passwords. The supervisor password can bypass the user password. 1. Go to the Start menu. 2. Click on Run. 3. Type in:
C:\Program Files\Fujitsu\Security Panel Application\Supervisor\
FJSECS.EXE, then press [Enter]
4. Follow the on-screen instructions to set the Supervisor password. Setting User Password 1 Go to the Start menu. 2. Click on All Programs. 3. Click on Security Panel Application -> Security Panel Application. 4. Follow the on-screen instructions to set the user password. You may change or remove the supervisor or user password by repeating the steps defined above. G e t t i n g t o K n o w Y o u r T a b l e t P C USING YOUR LIFEBOOK SECURITY PANEL The security lock feature is in effect both when the system resumes from Off, Standby, or Hibernation state. You always need to push the Security Panel buttons to input the user password. Your system will not begin the boot sequence until you enter your supervisor/user password. From Off State 1. Turn on your system. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. For example, if the password is 22222, first press Button 2 five times and press the Enter button. The Tablet PC will boot to normal operation. From Standby/Hibernation State 1. Press your Suspend/Resume button. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. The Tablet PC should resume normal operation. Incorrect Password Entry If an invalid supervisor or user password is entered three times in succession, the system will beep for about one minute. If a valid password is entered within a minute
(while system beeps), the beeping will stop and the Tablet PC will resume normal operation. If no password is entered or an invalid password is entered while the system beeps, the system will return to its previous locked state (standby or off) and the Security Indicator will go off. To reactivate the Tablet PC after a password failure, you must press the Suspend/Resume button, then enter a correct password. Remember the user password you specified on the Security Panel Application. If you forget the password you will not be able to use your computer. The supervisor pass-
word can override the user password. PRECAUTIONS Opening and Closing the Cover By default, closing the cover automatically places your system into Standby mode. (You can change the action the system takes when the cover is closed by opening the Power Options Properties icon in the Control Panel, and selecting the Advanced tab. Make a choice from the drop down menu for When I close the lid of my portable computer: and click the [OK] button.) Opening the cover does not automatically place the Tablet PC into normal operation. Instead, you must enter the proper security password after pushing the Suspend/Resume button. 23 T Series.book Page 24 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o Low Battery Operations If your Tablet PC has a low battery, pushing the suspend/
resume button only turns on the Security Indicator. Your Tablet PC does not unlock, the Security Indicator turns off after one minute. To resume normal operation, first attach a power supply to the Tablet PC. Then you may unlock the Tablet PC. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application for Supervisor in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Reinstalling the Security Panel Application To reinstall supervisor or user security application, you will need your Drivers and Applications CD. The Utilities\Security Panel Application folder contains two separate folders: Supervisor and User. The setup files for supervisor and user security applications are contained in those folders. 1. Go to the Utilities\Security Panel Applica-
tion\Supervisor folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instruc-
tions on the screen. 2. Go to the Utilities\Security Panel Application\User folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instructions on the screen. Supervisor and user passwords can be set via Windows software using the FJSECS.exe and FJSECU.exe files, respectively. FJSECU.exe for the user password cannot run without first setting a supervisor password. You need to run FJSECS.exe first to set the supervisor pass-
word. Follow instructions under Setting Passwords on page 23. If you forget both passwords, please contact Fujitsu PC Corporation Service and Support at 1-800-8FUJITSU
(1-800-838-5487). Fujitsu PC Corporation charges a service fee for unlocking a password-restricted Tablet PC. When calling please have a valid credit card and provide proof of ownership. You will then be given instructions on where to ship your Tablet PC. UNINSTALLING THE SECURITY PANEL APPLICATION You have two options when uninstalling the security panel application:
Remove passwords and uninstall the security panel application software. This will disable all security features. Uninstall the security panel application with password still active. This will not allow any changes to the password. Uninstalling the Security Panel Application Software Remove passwords when User wants no password protection whatsoever and doesnt want to give anybody the utility to set a password on their computer. In this case, if passwords (supervisor, user, or both) are set, the passwords must first be cleared BEFORE removing the application. To clear passwords, follow same procedure in SETTING PASSWORD CODES except this time, select REMOVE, enter current password then click Next. When asked to confirm select Yes. Removing Security Panel Application with Passwords Still Active Using this feature will not allow any changes to the password. Removing the applications does not remove the password. It simply removes the utility to change/add/remove passwords. To change your password you must reinstall the application. User:
1. Go to Start -> Control Panel. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Supervisor:
1. Go to Start -> Control Panel. 24 T Series.book Page 25 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Cursor Control Scroll Button Left Button Right Button Figure 2-19. Touchpad pointing device Touchpad Pointing Device The Touchpad pointing device built into your Tablet PC is used to control the movement of the cursor to select items on your display panel. The Touchpad is composed of a cursor control, left and right buttons, and a scroll button. The cursor control works the same way a mouse does, and moves the cursor around the display. It only requires light pressure with the tip of your finger. The left and right buttons function the same as left and right mouse buttons. The scroll button allows you to navigate through pages quickly without using the scroll bars. The actual functionality of the buttons may vary depending on the application that is being used. (Figure 2-19) CLICKING Clicking means pushing and releasing a button. To left-
click, move the cursor to the item you wish to select, press the left button once, and then immediately release it. To right-click, move the cursor to the item you wish to select, press the right button once, and then immedi-
ately release it. (Figure 2-20) DOUBLE-CLICKING Double-clicking means pushing and releasing the left button twice in rapid succession. This procedure does not function with the right button. To double-click, move the cursor to the item you wish to select, press and release the left button twice. (Figure 2-21) Figure 2-21. Double-clicking If the interval between clicks is too long, the double-click will not be executed. Parameters for the Touchpad can be adjusted from the Mouse dialog box located in the Windows Control Panel. Figure 2-20. Clicking 25 T Series.book Page 26 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o DRAGGING Dragging means pressing and holding the left button while moving the cursor. To drag, move the cursor to the item you wish to move. Press and hold the left button while moving the item to its new location and then release it. (Figure 2-22) Figure 2-22. Dragging SCROLLING Using the scroll button allows you to navigate through a document quickly without having to use the scroll bars. This is particularly useful when you are navigating through online pages. To use the scroll button, press the raised horizontal line at the top or bottom of the button to scroll up or down a page. When you have reached the desired section of the page, release the button.
(Figure 2-23) Figure 2-23. Scrolling TOUCHPAD CONTROL ADJUSTMENT The Windows Control Panel allows you to customize your Touchpad with selections made from within the Mouse Properties dialog box. There are several aspects of Touchpad operation, which you can adjust. To access the Mouse Properties window, open the Control Panel and double-click the Mouse icon. In the window that appears, you will see a variety of different mouse functions that you can change. 26 T Series.book Page 27 Thursday, July 31, 2003 10:49 AM Pen and Active Digitizer USING THE PEN You can use the LifeBook T Series Tablet PC pen to generate and create electronic ink, to select items, and to navigate through programs on the Tablet PC. Programs that support handwriting recognition also allow you to write characters directly on the screen with the pen. You can also use the pen as a drawing tool. You are advised to use a screen protector on your system display to minimize the chance of its being scratched. Screen protectors are available from the Fujitsu Web site at www.fujitsupc.com. G e t t i n g t o K n o w Y o u r T a b l e t P C sponds to the right mouse button (when used in combi-
nation with the tip switch). The rear toggle of the barrel button switch acts as an electronic ink "eraser". The functions of the rear toggle and the tip click pres-
sure can be changed by clicking [Start] -> Control Pane, and double-clicking the Fujitsu Pen Settings icon. To change the rear toggle function, select the drop-down list to select a new function, then click [Apply]. If you dont want the rear toggle to have any function, select Ignore from the list. Adjusting the click pressure determines how much pres-
sure must be put on the pen tip in order for the screen to react. The softer it is set, less pressure is required; the harder it is set, more pressure is required. To change the click pressure, use the slider bar to make the click pres-
sure harder or softer, then click [Apply]. Tip Switch Use only the pen provided with your Tablet PC. Do not use substitutes that were not designed for the LifeBook T Series Tablet PC. Barrel Switch Figure 2-24. LifeBook T Series Pen The LifeBook T Series Tablet PC pen is a high-quality electronic instrument that can be damaged if used improperly. Treat the pen as you would any precision device. Observe the following guidelines:
Do not gesture with the pen, use it as a pointer, or tap it on surfaces other than the Tablet PC screen.
Do not try to turn the thumb grip on the pen; it is designed for inserting and removing the pen from the pen holder.
Never store the pen with the tip bearing the weight of the pen (e.g., sitting tip down in a pencil cup). Storing the pen tip down could distort the internal mechanism over a period of time
(especially in higher temperatures), causing the tip to act as if it is always depressed. The pen should be stored in the pen holder when not in use. The screen reacts when the pen tip is approximately 1/8 inch (3-5 mm) from the screen. The pen has three switches: a tip switch and a barrel button toggle switch with switches at both ends. By default, the tip switch corresponds to the left mouse button, and the front toggle (closest to the pen tip) barrel button switch corre-
Here are some hints that may help you use the pen more effectively:
To activate the tip switch, tap or hold the pen tip against the screen.
To activate the barrel button switch, press and hold the end of the button you wish to use (front toggle is the right mouse button switch; the rear toggle acts as an electronic eraser).
To move the cursor, hold the pen tip within 1/8 inch
(3 - 5 mm) from the screen and move the pen.
To start a program, double-tap the pen tip (tap the pen tip twice rapidly) on the program icon as you would double-click a mouse.
To select an object, tap the pen tip on the object once.
To double-click an object, quickly tap the object twice. CALIBRATING THE PEN In order to ensure accurate tracking between the pen and cursor, you must run the Touch Screen Calibration Utility before you use the active digitizer for the first time, or after you change the display resolution. To run the calibration utility:
1. Go to Start -> Control Panel and double-click on the Tablet and Pen Settings icon. 2. Click Calibrate. 3. Adjust the display of your Tablet PC to a comfort-
able angle. 27 T Series.book Page 28 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o 4. Using the pen, firmly touch the screen directly on the (+) symbol; the (+) symbol will move to the next location. 5. Repeat step 4 in the four corners, then click OK. REPLACING THE PEN TIP With use, the pen tip may become worn or may pick up foreign particles that can scratch the screen. A damaged or worn tip may not move freely, causing unpredictable results when using the pen. If your pen exhibits these problems, you should replace the pen tip. To do so, use the pen tip removal tool included with your pen. Gap Figure 2-25. Tip Removal Tool To remove the tip, position the tip in the gap between the two ends of the tool (Figure 2-25). Pinch the tool together so the tip is firmly clasped, then pull it from the barrel. If the tip is worn or damaged, discard it. To replace the tip, retrieve one of the new tips that accompanied your pen. Insert the flat end of the tip into the barrel and push it in firmly until it is seated. If you need more tips, they can be ordered from the Fujitsu Web site at: www.fujitsupc.com. USING THE ACTIVE DIGITIZER The integrated active digitizer allows you to use the included pen as a pointing device. You can use the pen to click, double-click, drag items and icons, or to draw like a pen or pencil in applications that support this behavior, such as drawing or painting programs. See the documentation that came with your application for details. (Figure 2-26) To avoid potential scratching and damage, never use anything but the included pen with the display. To purchase additional or replacement pens, visit the Fujitsu accessories Web site at: http://www.fujitsupc.com. Clicking To left-click, touch the object you wish to select and then lift the pen tip immediately. (Figure 2-27) To right-click, press the front button on the barrel switch or touch the pen to the screen for a couple of seconds until the right mouse icon appears at the tip. Figure 2-27. Clicking the screen Double-Clicking To double-click, touch the item twice, and then immedi-
ately remove the pen tip. (Figure 2-28) Figure 2-28. Double-clicking the screen If the interval between taps is too long, the double-click will not be executed. Parameters for the screen can be adjusted from the Mouse Properties dia-
log box located in the Windows Control Panel. Figure 2-26. Using the pen with the screen 28 T Series.book Page 29 Thursday, July 31, 2003 10:49 AM G e t t i n g t o K n o w Y o u r T a b l e t P C Volume Control Your Fujitsu Tablet PC has multiple volume controls which interact with each other. Any software that contains audio files will also contain a volume control of its own. If you install an external audio device that has an independent volume control, the hardware volume control and the software volume control will interact with each other. It should be noted that if you set your software volume to Off, you will override the external volume control setting. CONTROLLING THE VOLUME The volume can be controlled in several different ways:
Volume can be set from within the Volume Control on the Taskbar. Volume can be controlled with the [F8] and [F9] func-
tions keys. Pressing [F8] repeatedly while holding [Fn]
will decrease the volume of your Tablet PC. Pressing
[F9] repeatedly while holding [Fn] will increase the volume of your Tablet PC. There are twenty-six levels through which the function keys cycle. Volume can be controlled by many volume controls that are set within individual applications. Certain external audio devices you might connect to your system may have hardware volume controls. Each source discussed above puts an upper limit on the volume level that must then be followed by the other sources. We recommend that you experiment with the various volume controls to discover the optimal sound level. 29 T Series.book Page 30 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T w o 30 T Series.book Page 31 Thursday, July 31, 2003 10:49 AM 3 Using Your Tablet PC 31 T Series.book Page 32 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T h r e e 32 T Series.book Page 33 Thursday, July 31, 2003 10:49 AM G e t t i n g S t a r t e d DC Power Plug DC Output Cable AC Cable AC Adapter Figure 3-1. Connecting the AC Adapter Power Sources Your LifeBook T Series Tablet PC has three possible power sources: a primary Lithium ion battery, an AC adapter or an optional Auto/Airline adapter. CONNECTING THE POWER ADAPTERS The AC adapter or optional Auto/Airline adapter provides power for operating your Tablet PC and charging the battery. Connecting the AC Adapter 1. Plug the DC output cable into the DC power jack of your Tablet PC. 2. Plug the AC adapter into an AC electrical outlet.
(Figure 3-1) Connecting the Optional Auto/Airline Adapter 1. Plug the DC output cable into the DC power jack on your Tablet PC. 2. Plug the Auto/Airline adapter into the cigarette lighter of an automobile with the ignition key in the On or Accessories position. OR 3. Plug the Auto/Airline adapter into the DC power jack on an airplane seat. Switching from AC Adapter Power or the Auto/Airline Adapter to Battery Power 1. Be sure that you have a charged battery installed. 2. Remove the AC adapter or the Auto/Airline adapter. The Lithium ion battery is not charged upon purchase. Initially, you will need to connect either the AC adapter or the Auto/Airline adapter to use your Tablet PC. 33 T Series.book Page 34 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T h r e e Starting Your Tablet PC POWER ON The Suspend/Resume button is used to turn on your LifeBook T Series Tablet PC from its off state. Once you have connected your AC adapter or charged the internal Lithium ion battery, you can power on your Tablet PC.
(See figure 2-6 on page 12 for location) When you turn on your Tablet PC be sure you have a power source. This means that a battery is installed and charged, or that the AC or Auto/Airline adapter is connected and has power. Press the Suspend/Resume button to start your system. When you are done working you can either leave your Tablet PC in Standby mode, See Standby Mode on page 36, or you can turn it off. See Power Off on page 38 When you Power On your Tablet PC, it will perform a Power On Self Test (POST) to check the internal parts and configuration for correct functionality. If a fault is found, your Tablet PC will emit an audio warning and/
or an error message will be displayed. See Power On Self Test Messages on page 61 Depending on the nature of the problem, you may be able to continue by starting the operating system or by entering the BIOS setup utility and revising the settings. After satisfactory completion of the Power On Self Test
(POST), your Tablet PC will load your operating system. Never turn off your Tablet PC during the Power On Self Test (POST) or it will cause an error message to be displayed when you turn your Tablet PC on the next time. See Power On Self Test Messages on page 61 BOOT SEQUENCE The procedure for starting-up your Tablet PC is termed the Bootup sequence and involves your Tablet PCs BIOS. When your Tablet PC is first turned on, the main system memory is empty, and it needs to find instruc-
tions to start up your Tablet PC. This information is in the BIOS program. Each time you power up or restart your Tablet PC, it goes through a boot sequence which displays a Fujitsu logo until your operating system is loaded. During booting, your Tablet PC is performing a standard boot sequence including a Power On Self Test
(POST). When the boot sequence is completed without a failure and without a request for the BIOS Setup 34 Utility, the system displays the operating systems opening screen. The boot sequence is executed when:
You turn on the power to your Tablet PC. You restart your Tablet PC from the Windows Shut Down dialog box. The software initiates a system restart. Example:
When you install a new application. BIOS SETUP UTILITY The BIOS Setup Utility is a program that sets up the operating environment for your Tablet PC. Your BIOS is set at the factory for normal operating conditions, therefore there is no need to set or change the BIOS environment to operate your Tablet PC. The BIOS Setup Utility configures:
Device control feature parameters, such as changing I/O addresses and boot devices. System Data Security feature parameters, such as passwords. Entering the BIOS Setup Utility To enter the BIOS Setup Utility do the following:
1. Turn on or restart your Tablet PC. 2. Press the [F2] key once the Fujitsu logo appears on the screen. This will open the main menu of the BIOS Setup Utility with the current settings displayed. 3. Press the [RIGHT ARROW] or [LEFT ARROW] key to scroll through the other setup menus to review or alter the current settings. BIOS Guide A guide to your Tablet PCs BIOS is available online. Please visit our service and support Web site at www.fujitsupc.com. Once there, select Support, then select Tablet PCs under Users Guides. Select LifeBook Tablet PC BIOS Guides from the pull-down menu for your Tablet PC series. If you are unsure of your Tablet PCs BIOS number, refer to your packing slip. If your data security settings require it, you may be asked for a password before the BIOS main menu will appear. BOOTING THE SYSTEM We strongly recommend that you not attach any external devices until you have gone through the initial power-on sequence. When you turn on your LifeBook T Series Tablet PC for the first time, it will display a Fujitsu logo on the screen. T Series.book Page 35 Thursday, July 31, 2003 10:49 AM If you do nothing the system will load the operating system, and then the Windows Welcome will begin. Designed to accommodate the needs of many users, in many different countries, Windows needs to be config-
ured the first time you use them. Windows has two parts:
Getting Started: You have the opportunity to set up your modem so that your Tablet PC will be prepared to dial out. Windows License Agreement and Final Settings:
You have the opportunity to review the Windows License Agreement. You may click Cancel at any time within this process to shut down Windows. You may restart this process at any time in the future, but you must complete it in order to use your computer. Getting Started Read the instructions on the screens carefully and fill in the information as directed. You will be asked for such items as the language you wish to use, the country in which you live, your first and last name, and about how you dial out from where you will be using your Tablet PC. For the modem settings, enter your current location information where you will be using your Tablet PC. If you are not connected to a phone line and plan to register at a later time, you may click the Skip button, and you will go directly to the condition of use page. Once you have set up your Tablet PC to dial out, Windows will make a free telephone call to test the settings. If the call is unsuccessful, you will be returned to the phone settings page where you may try to fix them. If you are unable to fix the settings please contact Fujitsu Service and Support. See FPC Contact Informa-
tion on page 3 If you would simply like to move on, and register at a later time, you may click the Skip button, and you will go directly to the Condition of Use page. Registration If your connection is successful, you will go to the Registration Confirmation page. On this page simply enter the requested information, and then check the box at the bottom to register your copy of Windows with Microsoft. Once you have finished, click the Next button to continue. G e t t i n g S t a r t e d Final Settings The first part of your final settings is the Windows End User License Agreement. Read the agreement carefully. When you finish reading you must accept or reject the terms of the agreement and then click on the Next button. If you reject the terms of the license agreement you will be asked to review the license agreement for information on returning Windows or to shut down your Tablet PC. You cannot use your Tablet PC until you have accepted the License Agreement. If you stop the process, your Tablet PC will return to the beginning of the Windows Welcome Process, even if you power down your system and start it up again. ACTIVATING ADDITIONAL UTILITIES The first time you boot up your system, you will see a Click Me! icon on the system desktop. When you double-click the Click Me! icon, your system will automatically add appropriate utilities based on your systems configuration. The ClickMe! icon disappears after it has been run the first time. REGISTERING YOUR LIFEBOOK T SERIES TABLET PC What are the benefits of registering?
You will receive an identification label for your Tablet PC, which, if your Tablet PC is ever lost, may help in getting it returned to you. You will also receive technical support access and useful product mailings. How do I register?
To register your system, visit our Web site at:
www.fujitsupc.com/support. 35 T Series.book Page 36 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T h r e e Power Management Your LifeBook T Series Tablet PC has many options and features for conserving battery power. Some of these features are automatic and need no user intervention, such as those for the internal modem. However, others depend on the parameters you set to best suit your oper-
ating conditions, such as those for the display bright-
ness. Internal power management for your Tablet PC may be controlled from settings made in your operating system, pre-bundled power management application, or from settings made in BIOS setup utility. Besides the options available for conserving battery power, there are also some things that you can do to prevent your Tablet PC battery from running down as quickly. For example, you can create an appropriate power saving profile, put your Tablet PC into Standby mode when it is not performing an operation, and you can limit the use of high power devices. As with all mobile, battery powered computers, there is a trade-off between performance and power savings. Power Mode Fully On Mode Standby Mode
(Suspend-to-RAM) Hibernation Mode
(Suspend-to-Disk) Power Off System Activity Events causing system to enter mode state System is running. CPU, system bus, and all other interfaces operate at full speed. Resume system logic remains powered and RAM remains powered to maintain active data. All other devices are turned off. From Standby mode: System operation resumed
(Suspend/Resume button pressed, resume on modem ring, resume on time). From Hibernation mode: Suspend/Resume button pressed. From Off mode: Suspend/Resume button pressed. Standby timeout occurs. Suspend request issued by software or by pressing the Suspend/Resume button. Low battery. Windows saves desktop state (including open files and documents) to hard disk. CPU stops. All other devices are turned off. Suspend timeout occurs. Clicking Start -> Shut Down -> Hibernate
(It may be necessary to Enable Hibernate Support from Windows Power Options.) System is fully powered off except for logic components required for Suspend/
Resume button and real-time clock operation. Low battery condition System shutdown. Low battery condition Table 3-1. System Power States SUSPEND/RESUME BUTTON When your Tablet PC is active, the Suspend/Resume button can be used to manually put your Tablet PC into Standby mode. Push the Suspend/Resume button when your Tablet PC is active, but not actively accessing anything, and immediately release the button. You will hear two short beeps and your system will enter Standby mode. (See figure 2-6 on page 12 for location). If your Tablet PC is suspended, pushing the Suspend/
Resume button will return your Tablet PC to active operation. You can tell whether or not your system is in Standby mode by looking at the Power indicator. See Power Indicator on page 15. If the indicator is visible and not flashing, your Tablet PC is fully operational. If the indicator is both visible and flashing, your Tablet PC is in Standby mode. If the indicator is not visible at all, the power is off or your Tablet PC is in Hibernate mode
(See Hibernate Mode) 36 STANDBY MODE Standby mode in Windows saves the contents of your Tablet PCs system memory during periods of inactivity by maintaining power to critical parts. This mode will turn off the CPU, the display, the hard drive, and all of the other internal components except those necessary to maintain system memory and allow for restarting. Your Tablet PC can be put in Standby mode by:
Pressing the Suspend/Resume button when your system is turned on. Selecting Standby from the Windows Shut Down menu. Timing out from lack of activity. Allowing the battery to reach the Dead Battery Warning condition. Closing the system cover. Your Tablet PCs system memory typically stores the file(s) on which you are working, open application(s) information, and any other data required to support the operation(s) in progress. When you resume operation T Series.book Page 37 Thursday, July 31, 2003 10:49 AM from Standby mode, your Tablet PC will return to the point where it left off. To resume operation, you must use the Suspend/Resume button to resume operation, and there must be an adequate power source available, or your Tablet PC will not resume. If you are running your Tablet PC on battery power, be aware that the battery continues to discharge while your Tablet PC is in Standby mode, though not as fast as when fully operational. HIBERNATE MODE The Hibernate mode saves the contents of your Tablet PCs system memory to the hard drive as a part of the Suspend/Resume mode. Your Tablet PC is pre-
configured to perform this function. The Hibernate mode can also be configured through the system BIOS to run in other ways depending on what you need to accomplish. See BIOS Setup Utility on page 34. Standby or Hibernate modes should not be used with certain PC Cards. Check your PC Card documentation for more information. Disabling the Suspend/Resume button prevents it from being used to put your Tablet PC in Standby or Hibernate mode. The resume function of the button cannot be disabled. If your Tablet PC is actively accessing information when you enter Standby or Hibernate mode, changes to open files are not lost. The files are left open and memory is kept active during Standby mode or the memory is transferred to the hard drive during Hibernate mode. When PC Cards or external devices are in use, Save-to-Disk mode cannot return to the exact state prior to suspension, because all peripheral devices will be re-
initialized when the system restarts. The main advantage of using Hibernate mode is that power is not required to maintain your data. This is very impor-
tant if you will be leaving your Tablet PC in a suspended state for a prolonged period of time. The drawback of using Hibernate mode is that it lengthens the power down and power up sequences and resets peripheral devices. G e t t i n g S t a r t e d Using Hibernate Mode Hibernate default setting is enabled for Windows XP. To enable or disable the Hibernation feature follow these easy steps:
1. From the Start menu, select Settings, and then select Control Panel -> Power Options. 2. Select Hibernation, and then select the box to enable or disable this feature. To use Hibernate mode with Windows XP systems:
1. Click on the Start button, click Shut Down. 2. Select Hibernate option from the What do you want the computer to do list. DISPLAY TIMEOUT The Video Timeout is one of the power management parameters. This feature saves power by turning off the display if there is no keyboard or pointer activity for the user selected timeout period. Any keyboard or pointer activity will cause the display to restart automatically. This feature is independent of the Suspend/Resume button and can be enabled and disabled in Windows Power Management. HARD DISK TIMEOUT The Hard Disk Timeout is another one of the power management parameters. This feature saves power by turning off the hard drive if there is no hard drive activity for the user selected timeout period. Any attempt to access the hard drive will cause it to restart automatically. This feature is independent of the Suspend/Resume button and can be enabled and disabled in Windows. WINDOWS POWER MANAGEMENT The Power Options icon located in the Windows Control Panel allows you to configure some of the power management settings. For example, you can use the Power Options to set the timeout values for turning off the display and hard disks whether you are running the Tablet PC on battery power or one of the adapters. RESTARTING THE SYSTEM If your system is on and you need to restart it, be sure that you use the following procedure. 1. Click the Start button, and then click Shut Down. 2. Select the Restart option from within the Windows Shut Down dialog box. 3. Click OK. Your Tablet PC will shut down and reboot. 37 T Series.book Page 38 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n T h r e e Turning off your Tablet PC without exiting Windows or turning on your Tablet PC within 10 seconds of the Tablet PC being shut off may cause an error when you start the next time. POWER OFF Before turning off the power by choosing Shut Down from the Windows Start menu, check that the Hard Drive, CD-ROM, PC Card and the Floppy Disk Drive Access indicators are all Off. (See Figure 2-9 on page 15) If you turn off the power while accessing a disk or PC Card there is a risk of data loss. To assure that your Tablet PC shuts down without error, use the Windows shut down procedure. Using the correct procedure to shut down from Windows, allows your Tablet PC to complete its opera-
tions and turn off power in the proper sequence to avoid errors. The proper sequence is:
1. Click the Start button, and then click Shut Down. 2. Select the Shut Down option from within the Windows Shut Down dialog box. 3. Click OK. If you are going to store your Tablet PC for a month or more see the Care and Maintenance section. 38 T Series.book Page 39 Thursday, July 31, 2003 10:49 AM 4 User-Installable Features 39 T Series.book Page 40 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r 40 T Series.book Page 41 Thursday, July 31, 2003 10:49 AM Lithium ion Battery Your LifeBook T Series Tablet PC has a Lithium ion battery that provides power for operating your Tablet PC when no external power source is available. The battery is durable and long lasting, but should not be exposed to extreme temperatures, high voltages, chemi-
cals or other hazards. The Lithium ion battery operating time may become shorter if it is used under the following conditions:
When used at temperatures lower than 41 F (5 C) or higher than 95 F (35 C). Extreme temperatures not only reduce charging efficiency, but can also cause battery deterioration. The Charging icon on the Status Indicator panel will flash when you try to charge a battery that is outside its operating temperature range. See Battery Charging Indicator on page 16. When using a high current device such as a modem, CD-ROM drive, or hard drive, using the AC adapter will conserve your battery life. Do not leave a faulty battery in your Tablet PC. It may damage your AC adapter, optional Auto/Airline adapter, another battery or your Tablet PC itself. It may also prevent operation of your Tablet PC by draining all available cur-
rent into the bad battery. Under federal, state, or local law it may be illegal to dispose of batteries by putting them in the trash. Please take care of our environment and dispose of batteries properly. Check with your local government authority for details regarding recycling or disposing of old batteries. If you cannot find this infor-
mation elsewhere, contact your support representative at 1-800-8Fujitsu. Actual battery life will vary based on screen brightness, applications, features, power management settings, battery condition and other customer preferences. CD-ROM drive or hard drive usage may also have a significant impact on battery life. The battery charging capacity is reduced as the battery ages. If your battery is running low quickly, you should replace it with a new one. RECHARGING THE BATTERY If you want to know the condition of the Lithium ion battery, check the Battery Level indicator located on the Status Indicator panel. The indicator changes as the battery level changes. U s e r - I n s t a l l a b l e F e a t u r e s The Lithium ion battery is recharged internally using the AC adapter or Auto/Airline adapter. To recharge the battery make sure the battery that needs to be charged is installed in your Tablet PC and connect the AC or Auto/Airline adapter. Make sure that the Battery Charging indicator and the percentage charge is shown inside the Battery Level icon on the Status Indicator Panel. There is no memory effect on the Lithium ion battery, therefore you do not need to discharge the battery completely before recharging. The charge times will be longer if your Tablet PC is in use while the battery is charging. If you want to charge the battery more quickly, put your Tablet PC into Standby mode, or turn it off while the adapter is charging the battery. See Power Management on page 36. Using heavy current devices such as a modem or frequent CD-ROM and PCMCIA powered external device accesses may prevent charging completely. Low Battery State When the battery is running low, your Tablet PC will beep every 15 seconds and the Battery Level indicator will flash. If you do not respond to the low battery alarm, the batteries will continue to discharge until they are too low to operate. When this happens there will be a multiple beep alarm and the Battery Level indicator will show a dead battery. Your Tablet PC will then go into Standby mode to try and protect your data for as long as possible. There is no guarantee that your data will not be lost once the Tablet PC reaches this point. You may not be able to hear the alarm if the volume control is set too low or is turned off by the hardware or software. However, you will be able to see the Battery Level indicator flash. Once the low battery alarm occurs you must save all your data and put your Tablet PC into Standby mode until you can provide a new power source. You should provide a charged battery or AC or Auto/Airline Adapter as soon as possible. When you are in Standby mode there must always be at least one power source active. If you remove all power sources while your Tablet PC is in Standby mode, any data that has not been saved to the hard drive will be lost. 41 T Series.book Page 42 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r Dead Battery Suspend mode shows on the Status indi-
cator just like the normal Standby mode. Once your Tablet PC goes into Dead Battery Suspend mode you will be unable to resume operation until you provide a source of power either from an adapter, or a charged battery. Once you have provided power, you will need to press the Suspend/Resume button to resume operation. In the Dead Battery Suspend mode, your data can be maintained for some time, but if a power source is not provided promptly, the Power indicator will stop flashing and go out, meaning that you have lost the data that was not stored. Once you provide power, you can continue to use your Tablet PC while an adapter is charging the battery. Shorted Batteries The Status Indicator panel uses a symbol inside the battery outline of the Battery Level indicator to display the operating level available in that battery.
(See figure on page 15) If this display shows a Shorted Battery, it means that the battery is damaged and must be replaced so it does not damage any other parts of your Tablet PC. REPLACING THE BATTERY Your LifeBook T Series Tablet PC comes with one battery pack; you might want to consider purchasing a spare. By keeping a spare battery fully charged, you can immediately swap with one that is not charged. There are two ways to swap batteries: cold-swapping and warm-swapping. Cold-swapping means swapping batteries when the system has been powered down;
warm-swapping is performed when the system is in Standby mode. Cold-swapping batteries To cold-swap batteries in your battery compartment, follow these easy steps: (Figure 4-1) 1. Have a charged battery ready to install. 2. Shut down your notebook and disconnect the AC adapter. 3. Press the battery release latches to open the compartment. 4. Remove the battery from the compartment. 5. Slide the new battery into the compartment. 6. Close the compartment and the battery release latches will click into place. 7. Plug in the AC adapter and turn the power on. 42 Battery Release Latches Battery Compartment Figure 4-1. Removing the Battery Warm-swapping Batteries To warm-swap batteries in your battery compartment follow these easy steps: (Figure 4-1) You have only a few minutes to perform a warm-swapping before the internal bridge battery runs out of power. Have the charged battery nearby when performing a warm battery swap. 1. Close any open files and put your Tablet PC into Standby mode. 2. Press the battery release latches to open the compartment. 3. Remove the battery from the compartment. 4. Slide the new battery into the compartment. 5. Close the compartment and the battery release latches will click into place. 6. Press the Suspend/Resume button to return your Tablet PC to normal operation. If the Lithium ion battery connector is not fully seated, you may not be able to use your Tablet PC or charge your battery. T Series.book Page 43 Thursday, July 31, 2003 10:49 AM Memory Upgrade Module Your Fujitsu LifeBook T Series Tablet PC comes with a minimum of 256 MB of high speed Double Data Rate Synchronous Dynamic RAM (DDR SDRAM), 266 MHz factory installed. To increase your systems memory capacity, you may install an additional memory upgrade module. The memory upgrade must be a dual-in-line
(DIMM) SDRAM module. To ensure 100% compati-
bility, purchase the SDRAM module only from the Fujitsu web store at www.fujitsupc.com. If you are installing a 1 GB memory upgrade module by itself or with a smaller module, it must be installed in slot 1 (Figure 4-2). Do not remove any screws from the memory upgrade module compart-
ment except those specifically shown in the directions for installing and removing the module. INSTALLING MEMORY UPGRADE MODULES 1. Turn off power to your LifeBook Tablet PC and remove any power adapter (AC or auto/airline). 2. Make sure that all the connector covers are closed. 3. Turn the Tablet PC bottom side up, and remove the screws of the memory upgrade module compart-
ment. (Figure 4-2) 4. Remove the cover. Slot 1 Slot 2 Figure 4-2. Opening the Memory Upgrade Compartment 5. Remove the memory upgrade module from the static guarded sleeve. As noted above, if you are installing a 1 GB memory module by itself or with a smaller module, it must be installed in slot 1. 6. Align the memory upgrade module with the component side up. Align the connector edge of the memory upgrade module with the connector slot in the compartment. (Figure 4-3) U s e r - I n s t a l l a b l e F e a t u r e s 7. Insert the memory upgrade module at a 45 angle. Press the connector edge of the module firmly down and into the connector until it lodges under the retaining clip. You will hear a click when it is prop-
erly in place. Figure 4-3. Installing a Second Memory Module 8. Replace the cover. (Figure 4-4) 9. Replace the screws. Figure 4-4. Replacing the Memory Compartment Cover The memory upgrade module is not something you routinely remove from your notebook. Once it is installed, you should leave it in place unless you want to change system memory capacity. TO REMOVE A MEMORY UPGRADE MODULE 1. Perform steps 1 through 4 of Installing a Memory Upgrade Module. 2. Pull the clips sideways away from each side of the memory upgrade module at the same time. 3. While holding the clips out, remove the module from the slot by lifting it up and pulling towards the rear of your notebook. (Figure 4-5) Figure 4-5. Removing a Memory Upgrade Module 43 T Series.book Page 44 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r 4. Store the memory upgrade module in a static guarded sleeve. 5. Replace the cover. (Figure 4-4) 6. Replace the screws. CHECKING THE MEMORY CAPACITY Once you have changed the system memory capacity by either adding or removing a memory upgrade module, be sure to check that your notebook has recognized the change. Your Tablet PC uses Dynamic Video Memory Technology (DVMT), which allows the video driver to dynamically determine the amount of memory that is used. Your Tablet PC can use a maximum of 64 MB of system memory for video functions. You can check the memory capacity by clicking [Start]
-> Control Panel, then double-clicking the System icon. Select the General tab and check the amount of memory under Computer. The amount of memory displayed should be approxi-
mately the total of all memory modules installed. There may be a discrepancy of 8 MB which is allocated for fixed video memory. If the total memory displayed is incorrect, check that your memory upgrade module is properly installed. (If the module is properly installed and the capacity is still not correctly recognized, see Troubleshooting on page 54. 44 T Series.book Page 45 Thursday, July 31, 2003 10:49 AM U s e r - I n s t a l l a b l e F e a t u r e s PC Card Slots PC Card Figure 4-6. Installing/Removing PC Cards Eject Buttons PC Cards Your LifeBook T Series Tablet PC supports Type I, II, and Type III PC Cards, which can perform a variety of functions. Some available PC Cards include:
Fax/data modem cards. Local area network (LAN) cards. IDE solid-state disk cards. SCSI cards. Other PC Cards that conform to PCMCIA 2.1 or CardBus standards. Optional SmartCard adapter For further information, refer to the instructions supplied with your PC Card. INSTALLING PC CARDS PC Cards are installed in the PC Card slot. To install a PC Card, follow these easy steps: (Figure 4-6) Installing or removing a PC Card during your Tablet PCs shutdown or bootup process may damage the card and/or your Tablet PC. Do not insert a PC Card into a slot if there is water or any other substance on the card as you may permanently dam-
age the card, your Tablet PC, or both. 1. See your PC Card manual for specific instructions on the installation of your card. Some PC Cards may require your Tablet PC to be Off while installing them. 2. Make sure there is no PC Card currently in the slot. If there is, see Removing PC Cards. 3. Insert your PC Card into the slot, with the product label facing up. 4. Push the card into the slot firmly until it is seated in the opening. REMOVING PC CARDS To remove a PC Card, follow these easy steps:
1. See your PC Card manual for specific instructions on removing your card. Some PC Cards may require your Tablet PC to be in Standby Mode or Off while removing them. If the dialog box states that the device cant be removed, you must save all open files, close any open applications and shut down your Tablet PC. 2. Push the Eject button until it pops out, and then push it in to eject the card. This will allow you to remove the card. If the PC Card has an external connector and cable, do not pull the cable when removing the card. SMART CARD READER An embedded Smart Card Reader is provided on your Tablet PC. Smart Cards are the same size and shape as credit cards, but they contain an integrated micropro-
cessor chip. The chip can hold a variety of information, and provides the user with many possible options, such as allowing them to make secure purchases, pay for phone calls, store security information, and provide identification and information. In order to use the embedded Smart Card Reader, you must purchase an optional Smart Card holder for instal-
lation into an available Type II PC Card slot. 45 T Series.book Page 46 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r DC Power Jack External Monitor Port USB Ports LAN (RJ-45) Jack Figure 4-7. Port Replicator rear panel Port Replicator An optional Port Replicator is available from Fujitsu to support your LifeBook T Series Tablet PC. The Port Replicator extends the functionality of your Tablet PC by providing ports to connect USB devices, an external monitor, or a LAN device. The Port Replicator connects to the bottom of your Tablet PC. See Device Ports on page 48. REAR PANEL COMPONENTS Following is a brief description of the optional Port Replicators rear panel components. External Monitor Port The external monitor port allows you to connect an external VGA or SVGA monitor. Note that if a Port Replicator is attached, you must use the external monitor port on the Port Replicator. (Figure 4-7) LAN (RJ-45) Jack The LAN jack allows you to connect a LAN to the Port Replicator. Note that when the system is attached to the Port Replicator, the LAN Jack on the Port Replicator should be used, not the one on the system. DC Power Jack The DC power jack allows you to plug in the AC adapter to power your Tablet PC and charge the internal Lithium ion battery. USB 2.0 Ports The two USB 2.0 ports allow you to connect USB devices such as game pads, pointing devices, and keyboards. USB 2.0 is downward-compatible with USB 1.1 devices, so older USB devices will work with these ports. USB 2.0 is a much faster design, running 40 times faster than USB 1.1. 46 T Series.book Page 47 Thursday, July 31, 2003 10:49 AM U s e r - I n s t a l l a b l e F e a t u r e s Port Replicator Release Latch Docking Port Figure 4-8. Port Replicator front panel FRONT PANEL COMPONENTS Following is a brief description of the optional Port Replicators front panel components Docking Port The docking port connects the Port Replicator to your Tablet PC. (Figure 4-8) Port Replicator Release Latch Slide the Port Replicator Release Latch sideways to remove the Port Replicator from your Tablet PC.
(Figure 4-8) ATTACHING THE PORT REPLICATOR To attach the Port Replicator, align the Port Replicator connector on the bottom of your Tablet PC with the connector on the Port Replicator and push together at the two corners. (Figure 4-9) Figure 4-10. Unlatching the Port Replicator DETACHING THE PORT REPLICATOR To detach the Port Replicator:
1. Slide the Port Replicator release latch to release the Port Replicator from your Tablet PC. (Figure 4-10) 2. Pull away the Port Replicator to detach it from your Tablet PC. (Figure 4-11) Figure 4-9. Attaching the Port Replicator Figure 4-11. Removing the Port Replicator 47 T Series.book Page 48 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r Device Ports Your LifeBook T Series Tablet PC and the optional Port Replicator come equipped with multiple Device Ports to which you can connect an external device including: disk drives, keyboards, modems, printers, etc. MODEM (RJ-11) JACK The modem (RJ-11) jack is used for an internal modem. To connect the telephone cable follow these easy steps:
(See Figure 2-6 on page 12 for location) 1. Align the connector with the jack opening. 2. Push the connector into the jack until it is seated. 3. Plug the other end of the telephone cable into a telephone outlet. The internal modem is not intended for use with Digital PBX systems. Do not connect the internal modem to a Digital PBX as it may cause serious damage to the internal modem or your entire LifeBook T Series Tablet PC. Consult your PBX manufacturers documentation for details. Some hotels have Digital PBX systems. Be sure to find out BEFORE you connect your modem. The internal modem is designed to the ITU V.90 standard. Its maximum speed of 53000 bps is the highest allowed by FCC, and its actual connection rate depends on the line conditions. The maximum speed is 33600 bps at upload. The internal modem on all LifeBook T Series Tablet PCs from Fujitsu PC Corporation are certified for use in the United States and Canada. Depending upon the configuration of your system, your LifeBook Tablet PC may have either a LAN jack or an IEEE 1394 jack. INTERNAL LAN (RJ-45) JACK The internal LAN (RJ-45) jack is used for an internal Fast Ethernet (10/100 Base-T/Tx) connection. You will need to configure your Tablet PC to work with your particular network. (Please refer to your network administrator for information on your network configu-
ration.) To connect the LAN cable follow these easy steps: (See Figure 2-7 on page 13 for location) 48 Note that the optional Port Replicator is designed to cover the LAN jack located on the system. This design ensures that the LAN jack on the Port Replicator is the only one used when the Port Replicator is installed. 1. Align the connector with the jack opening. 2. Push the connector into the jack until it is seated. 3. Plug the other end of the cable into a LAN outlet. DOCKING PORT The docking port is used for the connection of your Tablet PC to an optional port replicator. In order to connect your Tablet PC to one of these devices follow the instructions that came with your docking port. (See Figure 2-8 on page 14 for location) UNIVERSAL SERIAL BUS PORTS The two Universal Serial Bus 2.0 ports (USB) allow you to connect USB devices such as external floppy disk drives, external CD and DVD drives, game pads, pointing devices, keyboards and/or speakers. USB 2.0 is downward-compatible with USB 1.1 devices, so older USB devices will work with these ports. USB 2.0 is a much faster design, running forty times faster than USB 1.1. In order to connect a USB device, follow these easy steps:
(See Figure 2-7 on page 13 for location) 1. Align the connector with the port opening. 2. Push the connector into the port until it is seated. INFRARED PORT The Infrared IrDA 1.1 (4 Mbps) port allows for wireless data transfer between your Tablet PC and other IrDA-
compatible devices, such as another computer or a printer, without the use of a cable. (See Figure 2-7 on page 13 for location) It is important to keep in mind that while carrying out this form of communication, both devices must be placed so their infrared ports are directly facing each other without obstruction. The devices must also be separated by at least 6" but no more than 36" for maximum performance. The following conditions may interfere with infrared communications:
A television, radio remote control unit, or a wireless headphone is being used nearby. Direct sunlight, fluorescent light, or incandescent light shines directly on the port. T Series.book Page 49 Thursday, July 31, 2003 10:49 AM Do not move either device while com-
munication is active as it may interrupt data transmission. Be careful not to scratch the infrared port lens. Scratches, dirt, or other sur-
face marks can degrade operation. MICROPHONE JACK The microphone jack allows you to connect an external mono microphone. Your microphone must be equipped with a 1/8"(3.5 mm) mono mini-plug in order to fit into the microphone jack of your Tablet PC. In order to connect a microphone follow these easy steps: (See Figure 2-5 on page 11 for location) 1. Align the connector with the port opening. 2. Push the connector into the port until it is seated. HEADPHONE JACK The headphone jack allows you to connect headphones or powered external speakers to your Tablet PC. Your headphones or speakers must be equipped with a 1/8"
(3.5 mm) stereo mini-plug. In order to connect head-
phones or speakers follow these easy steps: (See Figure 2-
5 on page 11 for location) 1. Align the connector with the port opening. 2. Push the connector into the port until it is seated. U s e r - I n s t a l l a b l e F e a t u r e s If you plug headphones into the headphone jack, the built-in stereo speakers will be disabled. EXTERNAL MONITOR PORT The external monitor port allows you to connect an external monitor. In order to connect an external monitor follow these easy steps: (See Figure 2-7 on page 13 for location) 1. Remove the cover from the port opening, if present. 2. Align the connector with the port opening. 3. Push the connector into the port until it is seated. 4. Tighten the two hold-down screws, located on each end of the connector. When an external monitor is plugged in, pressing the [Fn] + [F10] keys allows you to change your selection of where to send your display video. Each time you press the key combination, you will step to the next choice, starting with the built-in display panel only, moving to the external monitor only, finally moving to both the built-in display panel and an external monitor. 49 T Series.book Page 50 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r 50 T Series.book Page 51 Thursday, July 31, 2003 10:49 AM 5 Troubleshooting 51 T Series.book Page 52 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e 52 T Series.book Page 53 Thursday, July 31, 2003 10:49 AM Troubleshooting Your LifeBook T Series Tablet PC is sturdy and subject to few problems in the field. However, you may encounter simple setup or operating problems that you can solve on the spot, or problems with peripheral devices, that you can solve by replacing the device. The information in this section helps you isolate and resolve some of these straightforward problems and identify failures that require service. IDENTIFYING THE PROBLEM If you encounter a problem that you are having diffi-
culty in solving, go through the following procedure before pursuing further troubleshooting:
1. Turn off your Tablet PC. 2. Make sure the AC adapter is plugged into your Tablet PC and to an active AC power source. 3. Make sure that any card installed in the PC Card slot is seated properly. You can also remove the card from the slot, thus eliminating it as a possible cause of failure. 4. Make sure that any devices connected to the external connectors are plugged in properly. You can also disconnect such devices, thus eliminating them as possible causes of failure. 5. Turn on your Tablet PC. Make sure it has been off at least 10 seconds before you turn it on. 6. Go through the boot sequence. 7. If the problem has not been resolved, refer to the Troubleshooting Table, that follows, for more detailed troubleshooting information. 8. If you still have the problem after taking all of the above approaches, please check our Web site at www.fujitsupc.com for possible known support issues. If you keep notes about what you have tried, your support representative may be able to help you more quickly by giv-
ing additional suggestions over the phone. Do not return a failed Tablet PC to your supplier until you have talked to a sup-
port representative. 8. If you have tried the solutions suggested in the Troubleshooting Table and checked our Web site for possible solutions without success, contact your support representative:
Toll free: 1-800-8Fujitsu Fax: 1-901-259-5700 E-mail: 8fujitsu@fujitsupc.com Web site: http://www.fujitsupc.com. T r o u b l e s h o o t i n g Before you place the call, you should have the following information ready so that the customer support repre-
sentative can provide you with the fastest possible solu-
tion:
Product name Product configuration number Product serial number Purchase date Conditions under which the problem occurred Any error messages that have occurred Hardware configuration Type of device connected, if any See the Configuration Label on the bottom of your Tablet PC for configuration and serial numbers. (See figure 2-8 on page 14 for location) SPECIFIC PROBLEMS Using the Troubleshooting Table When you have problems with your Tablet PC, try to find the symptoms under the Problem column of the troubleshooting table for the feature giving you diffi-
culty. You will find a description of common causes for that symptom under the column Possible Cause and what, if anything, you can do to correct the condition under Possible Solutions. All possible causes or solutions may not apply to your Tablet PC. 53 T Series.book Page 54 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e TROUBLESHOOTING TABLE Problem Page Audio Problems . page 54 Docking Problems . page 54 Hard Drive Problems . page 54 Keyboard or Mouse Problems. page 54 Pen Input Problems . page 55 Infrared Problems . page 55 Memory Problems . page 55 Problem Page Modem Problems. page 55 USB Device Problems . page 56 PC Card Problems . page 56 Power Failures . page 56 Shutdown and Startup Problems . page 58 Video Problems . page 59 Miscellaneous Problems . page 60 Problem Possible Cause Possible Solutions Audio Problems There is no sound coming from the built-in speakers. The software volume control is set too low. Adjust the sound volume control settings in your software, operating system and applications. Port Replicator Problems Tablet PC does not turn on when installed in optional Port Replicator Hard Drive Problems You cannot access your hard drive. Headphones are plugged into your Tablet PC. Plugging in headphones disables the built-in speakers, remove the headphones. Software driver is not config-
ured correctly. Refer to your application and operating system documentation for help. Sound could have been muted with function keys. Press [F3] while holding the [Fn] key to toggle the sound on and off. Port Replicator AC adapter is not plugged in. Tablet PC is not properly seated in the Port Replicator. Provide power to the Port Replicator. Remove and re-dock your Tablet PC. The setup utility is incorrectly set for your internal (Primary Master) hard drive. Revise BIOS settings to set the Primary Master correctly. See BIOS Setup Utility on page 34. The wrong drive designator was used by an application when a bootable CD-ROM was used to start the Tablet PC. Verify drive designator used by application is in use by the operating system. When the operating system is booted from a CD, drive designations are automatically adjusted. Security is set so your oper-
ating system cannot be started without a password. Verify your password and security settings. Keyboard or Mouse Problems The built-in keyboard does not seem to work. The Tablet PC has gone into Standby mode. Push the Suspend/Resume button. Your application has locked out your keyboard. Try to use your integrated pointing device to restart your system. If this fails, turn your Tablet PC off by pressing the suspend/resume button for 10 seconds or more, and then turn it back on. 54 T Series.book Page 55 Thursday, July 31, 2003 10:49 AM T r o u b l e s h o o t i n g Problem Possible Cause Possible Solutions You have installed an external keyboard or mouse, and it does not seem to work. You have connected an external keyboard or a mouse and it seems to be locking up the system. Your external device is not properly installed. Your operating system soft-
ware is not set up with the correct driver for that device. Your operating system soft-
ware is not set up with the correct driver for that device. Your system has crashed. Pen Input Problems Cursor is not tracking the pen The system may be uncalibrated Re-install your device. See Device Ports on page 48. Check your device and operating system docu-
mentation and activate the proper driver. Check your device and operating system documentation and activate the proper driver. Try to restart your Tablet PC. If that fails, turn off the power by pressing the suspend/resume button for at least 10 seconds, and then power back on. If the cursor on the screen appears to be misaligned with the pen or is not accurately tracking the pen, calibrate the pen. See Calibrating the Pen on page 27. Infrared Problems Infrared data transfer is not working Memory Problems Your Power On screen, or Info menu of the BIOS setup utility information, does not show the correct amount of installed memory. Modem Problems Messages about modem operation. The IrDA port on the system cant see the IrDA port on the other device. The system and the other device are too far from each other. The viewing angle between the devices is too great. Move the system so that there is a direct line-of-sight path between the two ports. Move the system and the device so that they are three feet or less from each other. The viewing angle between the system port and the device port cannot be more than 15 degrees from a center line between the IrDA port on the Tablet PC and the IrDA port on the other device. You are using an old version of IrDA. The device with which you are trying to communi-
cate must be compliant with IrDA standard 1.1. There are possibly problems in one or both devices. Go to Start -> (All) Programs -> Accessories ->
Communications -> New Connection Wizard. Verify that "Set up an advanced connection" is checked and follow the on-screen instructions. Your memory upgrade module is not properly installed. Turn off your Tablet PC. Remove and re-install your memory upgrade module. See Memory Upgrade Module on page 43. You have a memory failure. Check for Power On Self Test (POST) messages. See Power On Self Test Messages on page 61. Messages about modem operation are generated by whichever modem application is in use. See your application software documentation for additional information. 55 T Series.book Page 56 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e Problem Possible Cause Possible Solutions Modem does not appear to work. Modem may not have been intialized. Verify that the modem has been initialized by the operating system. TO do so, right-click on My Computer and select the Hardware tab. Click
[Device Manager] and click on the "+" symbol that appears next to Modems. Verify that your device is listed as installed. The device is not properly installed. Remove and re-install the device. See Device Ports on page 48. The device may have been installed while an application was running, so your Tablet PC is not aware of its installation. Your software may not have the correct software driver active. Close the application and restart your Tablet PC. See your software documentation and activate the correct driver. Your device and another device are assigned the same I/O address. Check all I/O addresses located within the BIOS setup utility and any other installed hardware or software to make sure there are no duplications. The card is not properly installed. Remove and re-install the card. See PC Cards on page 45. The card may have been installed while an application was running, so your Tablet PC is not aware of its installation. Your software may not have the correct software driver active. Close the application and restart your Tablet PC. See your software documentation and activate the correct driver. Your PC Card device and another device are assigned the same I/O address. Check all I/O addresses located within the BIOS setup utility and any other installed hardware or software to make sure there are no duplications. The installed battery is completely discharged or there is no power adapter (AC or Auto/Airline) installed. Check the Status Indicator Panel to determine the presence and condition of the battery. See Status Indicator Panel on page 15. Install a charged battery or a Power adapter. The battery is installed but is faulty. Use the Status Indicator Panel to verify the presence and condition of the battery. See Status Indicator Panel on page 15. If a battery is indicating a short, remove that battery and operate from another power source or replace that battery. USB Device Problems You have installed a USB device, but your Tablet PC does not recognize the device, or the device does not seem to work properly. PC Card Problems A card inserted in the PC Card slot does not work or is locking up the system. Power Failures You turn on your Tablet PC and nothing seems to happen. 56 T Series.book Page 57 Thursday, July 31, 2003 10:49 AM T r o u b l e s h o o t i n g Problem Possible Cause Possible Solutions The battery is low. You turn on your Tablet PC and nothing seems to happen.
(continued) Check the Status Indicator Panel to determine the presence and condition of the battery. See Status Indicator Panel on page 15. Use a Power adapter until the battery is charged. The AC or auto/airline adapter is not plugged in properly. Verify that your adapter is connected correctly. See Power Sources on page 33. The Power adapter (AC or auto/airline) is faulty. Try a different Power adapter or install a charged optional second battery. The Power adapter (AC or auto/airline) has no power from the AC outlet, airplane seat jack, or the cars cigarette lighter. Move the AC cord to a different outlet, check for a line switch or tripped circuit breaker for the AC outlet. If you are using an auto/airline adapter in a car make sure the ignition switch is in the On or Accessories position. Your Tablet PC turns off all by itself. The power management parameters are set for auto timeouts which are too short for your operating needs. You are operating on battery power only and have ignored a low battery alarm until the battery is at the dead battery state and your machine has gone into Dead Battery Suspend mode. You have a battery failure. Press any button on the keyboard, or move the mouse to restore operation. If that fails, push the Suspend/Resume button. Check your power management settings, or close your applications and go to the Power Savings menu of the setup utility to adjust the timeout values to better suit your operation needs. Install a power adapter and then push the Suspend/
Resume button. See Power Sources on page 33. Verify the condition of the battery using the Status Indicator panel, and replace or remove any battery that is shorted. See Status Indicator Panel on page 15. Your power adapter has failed or lost its power source. Make sure the adapter is plugged in and the outlet has power. Your Tablet PC will not work on battery alone. The battery is dead. Replace the battery with a charged one or install a Power adapter. The battery seems to discharge too quickly. No battery is installed. Install a charged battery. The battery is improperly installed. Verify that the battery is properly connected by re-installing them. Your battery is faulty. You are running an application that uses a great deal of power due to frequent hard drive or CD-ROM access, or use of a modem or LAN PC card. Verify the battery condition using the Status Indi-
cator panel and replace or remove any battery that is shorted. See Status Indicator Panel on page 15. Use a power adapter for this application when at all possible. 57 T Series.book Page 58 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e Problem Possible Cause Possible Solutions The battery seems to discharge too quickly. The power savings features may be disabled.
(continued) Check the power management and/or setup utility settings in the Power Savings menu and adjust according to your operating needs. The brightness is turned all the way up. Turn down the brightness adjustment. The higher the brightness the more power your display uses. The battery is very old. Replace the battery. The battery has been exposed to high temperatures. The battery is too hot or too cold. The AC Adapter is defective. Replace the battery. Restore the Tablet PC to normal operating tempera-
ture. The Charging icon on the Status Indicator panel will flash when the battery is outside its operating range. Replace with another AC Adapter to see if the problem persists. Replace any defective AC Adapters. Shutdown and Startup Problems The Suspend/Resume button does not work. The Suspend/Resume button is disabled from the Advanced submenu of the Power menu of the setup utility. You did not hold the button in long enough. There may be a conflict with the application software. Enable the button from the setup utility. Hold the button longer. This may need to be a few seconds if your application is preventing the CPU from checking for button pushes. Close all applications and try the button again. The system powers up, and displays power-on informa-
tion, but fails to load the operating system. The boot sequence settings of the setup utility are not compatible with your configuration. Set the operating source by pressing the [F2] key while the Fujitsu logo is on screen, entering the setup utility and adjusting the source settings from the Boot menu. See BIOS Setup Utility on page 34. You have a secured system requiring a password to load your operating system. Power On Self Test (POST) has detected a problem. The system may be password-
protected. Make sure you have the right password. Enter the setup utility and verify the Security settings and modify them as accordingly. See BIOS Setup Utility on page 34. See the Power On Self Test (POST) messages to determine the meaning and severity of the problem. Not all messages are errors; some are simply status indicators. See Power On Self Test Messages on page 61. Check the status indicator panel to verify that the Security icon is blinking. If it is blinking, enter your password. An error message is displayed on the screen during the Tablet PC boot sequence. Your system display wont turn on when the system is turned on or when the system has resumed. 58 T Series.book Page 59 Thursday, July 31, 2003 10:49 AM T r o u b l e s h o o t i n g Problem Possible Cause Possible Solutions Your Tablet PC appears to change setup parameters when you start it. BIOS setup changes were not saved when you made them and exited the BIOS setup utility returning it to previous settings. Make sure you select Save Changes And Exit when exiting the BIOS setup utility. The BIOS CMOS back-up battery has failed. Contact your support representative for repairs. This is not a user-serviceable part. Video Problems The built-in display is blank when you turn on your Tablet PC. The angle of the display and the brightness settings are not adequate for your lighting conditions. The optional Port Replicator is attached, an external monitor is plugged in, and the Tablet PC is set for an external monitor only. The power management timeouts may be set for very short intervals and you failed to notice the display come on and go off again. The Tablet PC turned on with a series of beeps and your built-in display is blank. Power On Self Test (POST) has detected a failure which does not allow the display to operate. Move the display and the brightness control until you have adequate visibility. Pressing [F10] while holding down the [Fn] key allows you to change your selection of where to send your display video. Each time you press the combination of keys you will step to the next choice. The choices, in order are: built-in display only, external monitor only, both built-in display and external monitor. Press any button the keyboard, or move the mouse to restore operation. If that fails, push the Suspend/
Resume button. (The display may be shut off by Standy mode, Auto Suspend or Video Timeout) Contact your support representative. Your system display wont turn on when the system is turned on or when the system has resumed. The display goes blank by itself after you have been using it. The display does not close. The system may be password-
protected. Check the status indicator panel to verify that the Security icon is blinking. If it is blinking, enter your password. The Tablet PC has gone into Video Timeout, Standby Mode, or Hibernate Mode because you have not used it for a period of time. The power management time-
outs may be set for very short intervals and you failed to notice the display come on and go off again. A foreign object, such as a paper clip, is stuck between the display and the keyboard. Press a button on the keyboard, or move the mouse to restore operation. If that fails, push the Suspend/
Resume button. Check your power management settings, or close your applications and go to the Power Savings menu of the setup utility to adjust the timeout values to better suit your operation needs. See BIOS Setup Utility on page 34. Press any button on the keyboard, or move the mouse to restore operation. If that fails, push the Suspend/
Resume button. (The display may be shut off by Standby Mode, Auto Suspend or Video Timeout) Remove all foreign objects from the keyboard. 59 T Series.book Page 60 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e Problem Possible Cause Possible Solutions The display has bright or dark spots. The application display uses only a portion of your screen and is surrounded by a dark frame. If the spots are very tiny and few in number, this is normal for a large LCD display. If the spots are numerous or large enough to interfere with your operation needs. You are running an application that does not support 800 x 600/1024 x 768 pixel resolution display and display compres-
sion is enabled. You have connected an external monitor and it does not display any information. Your BIOS setup is not set to enable your external monitor. This is normal; do nothing. The display needs technical diagnosis; contact your support representative. When compensation is disabled, a clearer but smaller display for applications that do not support 800 x 600/1024 x 768 pixel resolution will result. You can fill the screen but have less resolution by changing your compensation setting. (See the Video Features submenu, located within the Advanced menu of the BIOS. See BIOS Setup Utility on page 34. Try toggling the video destination by pressing [Fn]
and [F10] together, or check your BIOS setup and enable your external monitor. (See the Video Features submenu, located within the Advanced Menu of the BIOS. See BIOS Setup Utility on page 34. Your external monitor is not properly installed. Reinstall your device. See External Monitor Port on page 49. Your operating system soft-
ware is not set up with the correct software driver for that device. Check your device and operating system documentation and activate the proper driver. You have connected an external monitor and it does not come on. Your external monitor may not be compatible with your Tablet PC. See your monitor documentation and the External Monitor Support portions of the Specifications section. See Specifications on page 73. Miscellaneous Problems An error message is displayed on the screen during the operation of an application. Application software often has its own set of error message displays. See your application manual and help displays screens for more information. Not all messages are errors some may simply be status. 60 T Series.book Page 61 Thursday, July 31, 2003 10:49 AM POWER ON SELF TEST MESSAGES The following is an alphabetic list of error-and-status messages that Phoenix BIOS and/or your operating system can generate and an explanation of each message. Error messages are marked with an *. If an error message is displayed that is not in this list, write it down and check your operating system documentation both on screen and in the manual. If you can find no reference to the message and its meaning is not clear, contact your support representative for assistance. nnnn Cache SRAM Passed Where nnnn is the amount of system cache in kilobytes successfully tested by the Power On Self Test. (This can only appear if you have an SRAM PC Card installed.)
*Extended RAM Failed at offset: nnnn Extended memory not working or not configured prop-
erly. If you have an installed memory upgrade module, verify that the module is properly installed. If it is prop-
erly installed, you may want to check your Windows Setup to be sure it is not using unavailable memory until you can contact your support representative. nnnn Extended RAM Passed Where nnnn is the amount of memory in kilobytes successfully tested. T r o u b l e s h o o t i n g
*Keyboard controller error The keyboard controller test failed. You may have to replace your keyboard or keyboard controller but may be able to use an external keyboard until then. Contact your support representative.
*Keyboard error Keyboard not working. You may have to replace your keyboard or keyboard controller but may be able to use an external keyboard until then. Contact your support representative.
*Keyboard error nn BIOS discovered a stuck key and displays the scan code for the stuck key. You may have to replace your keyboard but may be able to use an external keyboard until then. Contact your support representative.
*Operating system not found Operating system cannot be located on either drive A: or drive C: Enter the setup utility and see if both the fixed disk, and drive A: are properly identified and that the boot sequence is set correctly. Unless you have changed your installation greatly, the operating system should be on drive C:. If the setup utility is correctly set, your hard drive may be corrupted and your system may have to be re-installed from your back up media.
*Failing Bits: nnnn The hex number nnnn This is a map of the bits at the memory address (in System, Extended, or Shadow memory) which failed the memory test. Each 1 (one) in the map indicates a failed bit. This is a serious fault that may cause you to lose data if you continue. Contact your support representative.
*Parity Check 1 nnnn Parity error found in the system bus. BIOS attempts to locate the address and display it on the screen. If it cannot locate the address, it displays "????". This is a potentially data destroying failure. Contact your support representative.
*Fixed Disk x Failure or Fixed Disk Controller Failure (where x = 1-4) The fixed disk is not working or not configured prop-
erly. This may mean that the hard drive type identified in your setup utility does not agree with the type detected by the Power On Self Test. Run the setup utility to check for the hard drive type settings and correct them if necessary. If the settings are OK and the message appears when you restart the system, there may be a serious fault which might cause you to lose data if you continue. Contact your support representative.
*Invalid NVRAM media type Problem with NVRAM access. In the unlikely case that you see this message you may have some display prob-
lems. You can continue operating but should contact your support representative for more information.
*Parity Check 2 nnnn Parity error found in the I/O bus. BIOS attempts to locate the address and display it on the screen. If it cannot locate the address, it displays "????". This is a potentially data destroying failure. Contact your support representative.
*Press <F1> to resume, <F2> to SETUP Displayed after any recoverable error message. Press the [F1] key to continue the boot process or the [F2]
key to enter Setup and change any settings.
*Previous boot incomplete Default configuration used Previous Power On Self Test did not complete success-
fully. The Power On Self Test will load default values and offer to run Setup. If the previous failure was caused by incorrect values and they are not corrected, the next boot will likely fail also. If using the default settings does not allow you to complete a successful boot sequence, you should turn off the power and contact your support representative. 61 MODEM RESULT CODES The operating system and application software that is factory installed detects the modem characteristics and provides the necessary command strings to operate the modem. The internal modem operation is controlled by generic AT commands from the operating system and application software. The standard long form result codes may, in some cases, be displayed on your screen to keep you informed of the actions of your modem. The operating system and application software may suppress display of the result codes. Examples of result codes are:
OK NO CARRIER NO DIALTONE CONNECT 53000 (Connection complete at 53,000 bps.) ERROR FAX RING (This means an incoming call.) BUSY NO ANSWER When using the internal modem with applications that are not factory installed refer to the application documentation. T Series.book Page 62 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F i v e
*Real time clock error Real-time clock fails BIOS test. May require board repair. Contact your support representative.
*Shadow RAM Failed at offset: nnnn Shadow RAM failed at offset nnnn of the 64k block at which the error was detected. You are risking data corruption if you continue. Contact your support repre-
sentative. nnnn Shadow RAM Passed Where nnnn is the amount of shadow RAM in kilobytes successfully tested.
*System battery is dead Replace and run SETUP The BIOS CMOS RAM memory hold up battery is dead. This is part of your BIOS and is a board mounted battery which requires a support representative to change. You can continue operating but you will have to use setup utility default values or reconfigure your setup utility every time you turn off your Tablet PC. System BIOS shadowed System BIOS copied to shadow RAM.
*System CMOS checksum bad run SETUP BIOS CMOS RAM has been corrupted or modified incorrectly, perhaps by an application program that changes data stored in BIOS memory. Run Setup and reconfigure the system.
*System RAM Failed at offset: nnnn System memory failed at offset nnnn of in the 64k block at which the error was detected. This means that there is a fault in your built-in memory. If you continue to operate, you risk corrupting your data. Contact your support representative for repairs. nnnn System RAM Passed Where nnnn is the amount of system memory in kilobytes successfully tested.
*System timer error The timer test failed. The main clock that operates the computer is faulty. Requires repair of system board. Contact your support representative for repairs. UMB upper limit segment address: nnnn Displays the address of the upper limit of Upper Memory Blocks, indicating released segments of the BIOS memory which may be reclaimed by a virtual memory manager. Video BIOS shadowed Video BIOS successfully copied to shadow RAM. 62 T Series.book Page 63 Thursday, July 31, 2003 10:49 AM Restoring Your Pre-installed Software The Drivers and Applications Restore (DAR) CD contains:
Sets of device drivers and Fujitsu utilities (in specific directories) that are unique to your LifeBook note-
book configuration for use as documented below. A link to the Drive Image Special Edition (DISE) utility on your hard disk drive. Read-me files that provide additional use information for items on this CD-ROM. In order to install applications and/or drivers from the DAR CD, you will need to connect an external CD drive to your system. If the DAR CD is in the drive when you boot up the system, and the Boot Sequence is set in the BIOS to boot from the CD drive first (see Creating a backup image when booting up on page 63), a message will appear informing you that if you proceed, you will have a choice of:
creating a new backup of drive C:, restor-
ing a previous backup, or restoring the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. If you wish to install drivers or applications only from the CD, remove the disk from the drive, reboot the system, and insert the CD after Windows has started. If you have access to the internet, visit the Fujitsu Support web site at www.fujitsupc.com to check for the most current information, drivers and hints on how to perform recovery and system updates. DRIVE IMAGE SPECIAL EDITION (DISE) PowerQuest Drive Image Special Edition (DISE) provides a way to restore your computer if you experi-
ence a hard disk crash or other system failure. Fujitsu has used DISE to create an image of everything installed on the computer at the time you purchased it. The image is saved on a separate partition on the hard disk. You can use DISE to restore the factory image and return your computer to the state in which it was shipped from Fujitsu. T r o u b l e s h o o t i n g Although it is not necessary, you can use DISE to store additional image files you create. For example, if you install several applications and save data files on your hard disk, you can create a new image that includes them and then save that image file on the hard disk. Then, in the event of a hard disk failure, you can restore the image that includes the applications and data files you use. Using the DISE feature will reduce the amount of usable disk space on your hard disk drive. Creating a Backup Image You can create a system backup image of your C:\ drive at any time. The C:\ partition must be a FAT, FAT32, or NTFS partition, and it must be directly before the backup partition on your hard disk. There are two ways to implement the DISE utility: when booting up the system, or from the desktop. Creating a backup image when booting up Before creating an image at boot-up, you must first change the boot-up priority in the BIOS so that the system will go to the media drive first, rather than trying to boot-up from the hard drive or an external floppy disk drive. To change the boot-up priority:
1. Start your system and press the [F2] key when the Fujitsu logo appears. You will enter the BIOS Setup Utility. 2. Using the arrow keys, go to the Boot menu. 3. Arrow down to the Boot Device Priority submenu and press [Enter]. 4. Arrow down to the CD-ROM drive in the list, and press the space bar (or the + key) to move the CD-
ROM drive to the top of the list. (The system attempts to boot from the devices in the order in which they are listed.) 5. Press [F10], then click on [Yes] to exit the BIOS Setup Utility and return to the boot process. After you have changed the boot priority, you can create a backup image when you are booting up:
1. Install the DAR CD in the drive prior to booting up. When bootup begins, a message appears informing you that if you proceed, you will be able to:
Create a new backup of drive C Restore a previous backup, or, Restore the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. 63 T Series.book Page 64 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n F o u r 2. After you click [Y]es. You will be presented with two 1. Disable virus protection software. If virus protection options: [Create New Backup] and [Restore Backup]. After you click [Create New Backup], follow the on-
screen instructions. By selecting [Create New Backup], a new image will be written to your backup partition. This will overwrite any previously created image. Creating a backup image from the desktop To create a backup image from the desktop, select Drive Image SE from the Program list. You will initially be prompted to create a backup diskette. It is not necessary to create the backup diskette, since the DAR CD performs the same function. 1. At the Drive Image Special Edition main screen, click Options> Create New Backup. DISE displays a warning that it must go to DOS to create the image. 2. Click Yes. DISE creates an image file in the backup partition. If you created a backup image previously, the new image overwrites the old one. Enlarging the Backup Partition If there is not enough unused space in the backup parti-
tion on your hard disk, DISE will resize the partition. DISE will display the minimum, maximum, and recom-
mended sizes for the backup partition. You choose the size you want. DISE takes the space from the FAT, FAT32, or NTFS partition that you are backing up. If there is not enough unused space in that partition to take, you will not be able to resize the backup partition and create an image file. You can delete files from the FAT, FAT32, or NTFS partition to create more unused space on the hard disk. Restoring a Backup Image You can restore either a factory image or a backup image you created. Be aware that restoring a backup image will replace the contents of the C:\ partition with the image you restore. software is enabled, DISE will lock up. 2. From the DISE main window, click Options >
Restore Backup to restore an image you created, or click Options > Restore Factory Backup to restore the factory image. DISE shuts down to DOS and restores the image file. Re-Installing Individual Drivers and Applications The Drivers and Application CD can be used to selec-
tively re-install drivers and/or applications that may have been un-installed or corrupted. To re-install drivers and/or applications:
1. Boot up the system and insert the DAR CD after Windows has started. A Fujitsu Welcome screen is displayed after the CD is inserted. 2. From the left frame of the Welcome screen, System Components and 3rd Party Applications can be selected. System Components are those drivers and utilities that have been developed by Fujitsu; 3rd Party Applications are applications developed by other vendors. Installing System Components 1. To install system components, click on System Components in the left frame of the Welcome screen. A list of utilities and drivers will be displayed. Select one or more items from the list, or click
[Select All] to select all items in the list. (To de-select your choices, click the [Clear All] button. 2. Click [Install Selected Subsystems] to install the selected items. Installing 3rd Party Applications 1. To install 3rd party applications, click on 3rd Party Applications in the left frame of the Welcome screen. A list of applications will be displayed. 2. Select one of the items from the list, and follow the instructions that appear on the screen. Note that only one application may be installed at a time. 3. Repeat step 2 to install additional applications. 64 T Series.book Page 65 Thursday, July 31, 2003 10:49 AM 6 Care and Maintenance 65 T Series.book Page 66 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S i x 66 T Series.book Page 67 Thursday, July 31, 2003 10:49 AM Care and Maintenance If you use your LifeBook T Series Tablet PC carefully, you will increase its life and reliability. This section provides some tips for looking after the Tablet PC and its devices. Electrical equipment may be hazardous if misused. Operations of this product or similar products, must always be supervised by an adult. Do not allow children access to the interior of any electrical products and do not permit them to handle any cables. LIFEBOOK T SERIES TABLET PC Caring for your Tablet PC Your Tablet PC is a durable but sensitive electronic device. Treat it with care. Make a habit of transporting it in a suitable carrying case. Do not attempt to service the computer yourself. Any unauthorized service performed on the computer will void the warranty. Always follow installation instructions closely. Keep it away from food and beverages. If you accidentally spill liquid on your Tablet PC:
1. Turn it off. 2. Position it so that the liquid can run out. 3. Let it dry out for 24 hours, or longer if needed. 4. If your Tablet PC will not boot after it has dried out, call your support representative. Do not use your Tablet PC in a wet environment (near a bathtub, swimming pool). Always use the AC adapter and batteries that are approved for your Tablet PC. Avoid exposure to sand, dust and other environmental hazards. Do not expose your Tablet PC to direct sunlight for long periods of time as temperatures above 140 F (60 C) may damage your Tablet PC. Keep the covers closed on the connectors and slots when they are not in use. Do not put heavy or sharp objects on the computer. If you are carrying your Tablet PC in a briefcase, or any other carrying case, make sure that there are no objects in the case pressing on the lid. Do not drop your Tablet PC. Do not touch the screen with any sharp objects. C a r e a n d M a i n t e n a n c e Cleaning your Tablet PC Always disconnect the power plug. (Pull the plug, not the cord.) Clean your Tablet PC with a damp, lint-free cloth. Do not use abrasives or solvents. Use a soft cloth to remove dust from the screen. Never use glass cleaners. Storing your Tablet PC If storing your Tablet PC for a month or longer, turn the Tablet PC off, fully charge the battery, then remove and store all Lithium ion batteries. Store your Tablet PC and batteries separately. If you store your Tablet PC with a battery installed, the bat-
tery will discharge, and battery life will be reduced. In addition, a faulty battery might damage the Tablet PC. Store your Tablet PC in a cool, dry location. Temperatures should remain between 13 F (-25 C) and 140 F (60 C). Traveling with your Tablet PC Do not transport your Tablet PC while it is turned on. Do not check your Tablet PC as baggage. Carry it with you. When traveling with the hard drive removed, wrap the drive in a non-conducting materials (cloth or paper). If you have the drive checked by hand, be ready to install the drive if needed. Never put your hard drive through a metal detector. Have your hard drive hand-
inspected by security personnel. You can however, put your hard drive through a properly tuned X-ray machine. Take the necessary plug adapters if you're traveling overseas. Check the following diagram to determine which adapter you'll need or ask your travel agent. Outlet Type Location United States, Canada, Mexico, parts of Latin America, Japan, Korea, the Philippines, Taiwan Russia and the Commonwealth of Independent States (CIS), most of Europe, parts of Latin America, the Middle East, parts of Africa, Hong Kong, India, most of South Asia United Kingdom, Ireland, Malaysia, Singapore, parts of Africa China, Australia, New Zealand Figure 6-1. 67 T Series.book Page 68 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S I x KEYBOARD Caring for your Keyboard The keyboard of your computer is a very sensitive instrument. It is made up of many switches that are activated when you press on the keys. The keyboard is a major component of the heat dissipation system in a Tablet PC. Due to heat and size considerations the keyboard is not sealed. Because the keys are so close together, it is not easy for the user to see when liquids have fallen onto the circuitry below the keys. Attempting to clean the keyboard with a spray on cleaner or rag soaked with cleaner the liquid can drip onto the circuitry sight unseen. Once the liquid seeps between the layers of circuitry, it can cause corrosion or other damage to the circuits. This can result in keys which no longer operate, or which, when pressed, record the wrong characters and other similar failures. There is no repair for this problem other than replace-
ment. The solution is to become aware of the issue and take appropriate steps to protect your keyboard. To clean the keyboard, use a rag dampened slightly with cleaning solution. Use extreme care to prevent liquid from dripping between the keys. Spraying directly on the keys should be avoided. The spray should be applied first to the cloth, and then the cloth wiped over the keys. BATTERIES Caring for your Batteries Always handle batteries carefully. Do not short-circuit the battery terminals (that is, do not touch both terminals with a metal object). Do not carry lose batteries in a pocket or purse where they may mix with coins, keys, or other metal objects. Doing so may cause an explosion or fire. Do not drop, puncture, disassemble, mutilate or incin-
erate the battery. Recharge batteries only as described in this manual and only in ventilated areas. Do not leave batteries in hot locations for more than a day or two. Intense heat can shorten battery life. Do not leave a battery in storage for longer than 6 months without recharging it. Increasing Battery Life Keep brightness to the lowest comfortable level. Set the power management for maximum battery life. Put your Tablet PC in Standby mode when it is turned on and you are not actually using it. Limit your CD-ROM access. Disable the Windows CD auto insert function. Always use fully charged batteries. Eject PCMCIA cards when not in use. 68 OPTIONAL FLOPPY DISK DRIVE AND FLOPPY DISKS Caring for your Floppy Disks Avoid using the floppy disks in damp and dusty locations. Never store a floppy disk near a magnet or magnetic field. Do not use a pencil or an eraser on a disk or disk label. Avoid storing the floppy disks in extremely hot or cold locations, or in locations subject to severe temperature changes. Store at temperatures between 50 F (10 C) and 125 F (52 C). Do not touch the exposed part of the disk behind the metal shutter. Caring for your optional Optional Floppy Disk Drive To clean, wipe the floppy disk drive clean with a dry soft cloth, or with a soft cloth dampened with water or a solution of neutral detergent. Never use benzene, paint thinner or other volatile material. Avoid storing the floppy disk drive in extremely hot or cold locations, or in locations subject to severe tem-
perature changes. Store at temperatures between 50 F (10 C) and 125 F (52 C). Keep the floppy disk drive out of direct sunlight and away from heating equipment. Avoid storing the floppy disk drive in locations subject to shock and vibration. Never use the floppy disk drive with any liquid, metal, or other foreign matter inside the floppy disk drive or disk. Never disassemble or dismantle your floppy disk drive. OPTIONAL CD DRIVE AND CDs Caring for your CDs CDs are precision devices and will function reliably if given reasonable care. Always store your CDs in its case when it is not in use. Always handle CDs by the edges and avoid touching the surface. Avoid storing any CDs in extreme temperatures. Do not bend CDs or set heavy objects on them. Do not spill liquids on CDs. Do not scratch CDs. Do not put a label on CDs. Do not get dust on CDs. Never write on the label surface with a ballpoint pen or pencil. Always use a felt pen. If a CD is subjected to a sudden change in tempera-
ture, cold to warm condensation may form on the sur-
T Series.book Page 69 Thursday, July 31, 2003 10:49 AM C a r e a n d M a i n t e n a n c e face. Wipe the moisture off with a clean, soft, lint free cloth and let it dry at room temperature. DO NOT use a hair dryer or heater to dry CDs. If a CD is dirty, use only a CD cleaner or wipe it with a clean, soft, lint free cloth starting from the inner edge and wiping to the outer edge. Caring for your Optional CD-ROM Drive Your CD-ROM drive is durable but you must treat it with care. Please pay attention to the following points:
The drive rotates the compact disk at a very high speed. Do not carry it around or subject it to shock or vibration with the power on. Avoid using or storing the drive where it will be exposed to extreme temperatures. Avoid using or storing the drive where it is damp or dusty. Use of a commercially-available lens cleaner kit is recommended to maintain the drive lens. Avoid using or storing the drive near magnets or devices that generate strong magnetic fields. Avoid using or storing the drive where it will be subjected to shock or vibration. Do not disassemble or dismantle the CD-ROM drive. PC CARDS Caring for your PC Card Slots PC Cards are durable, but you must treat them with care. The documentation supplied with your PC Cards provides specific information for caring for the cards. When you dont have a PC Card installed in your system, you should be sure to install the PC Card slot inserts that came with your system. These will help to keep dust and dirt out of your system. 69 T Series.book Page 70 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S I x 70 T Series.book Page 71 Thursday, July 31, 2003 10:49 AM 7 Specifications 71 T Series.book Page 72 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S e v e n 72 T Series.book Page 73 Thursday, July 31, 2003 10:49 AM Specifications This section provides the hardware and environmental specifications for your LifeBook T Series Tablet PC. Specifications of particular configurations will vary. CONFIGURATION LABEL Your LifeBook T Series Tablet PC has a configuration label located on the bottom. (See figure 2-8 on page 14 for location). This label contains specific information regarding the options youve chosen for your Tablet PC. Following is an example label and information on how to read your own configuration label. Part Number Configuration ID Configuration P/N: ATEXXXXXXXXXXXX FPC P/N: FPCXXXXXX T3010, PM 1.4G, 12.1 XGA, XPTE, 40G, 256M Processor Operating System Memory Hard Drive Screen Size Model Figure 7-1. Configuration Label LifeBook T Series Tablet PC Specifications The specifications for your particular model may vary. To determine the specifications for your system, please visit our Web site at: www.fujitsupc.com. Physical Specifications Dimensions 11.5 w x 9.3 d x 1.1 / 1.4
(293 mm x 236 mm x 27.4 / 36.4 mm) Processing Specifications CPU/Speed Intel Pentium M processor 1.4 GHz @ 1.48V Chip set Intel 855GM - 400 MHz Memory/Storage Specifications Main RAM
256 MB SDRAM (DDR 266 MHz)
144-pin SO DIMM slots x 2 256 MB, 512 MB, and 1.0 GB modules available, with a system maximum of 2.0 GB. L1 cache
(CPU) 64 KB on-die L2 cache 1 MB on-die S p e c i f i c a t i o n s LifeBook T Series Tablet PC Specifications (Continued) BIOS ROM Hard disk drive Display VRAM Integrated Interfaces 1 MB (Boot Block Type Flash ROM)
2.5 HDD
Minimum 40 GB IDE HDD
ATA 100
Shock-mounted
SMART Support Display Specifications
Color LCD
Active Digitizer
32-bit color
12.1 TFT XGA (1024 x 768), 16M colors External monitor support: VGA
(1600 x 1200 maximum)
Brightness: 8 levels
Viewing Angle:
Horizontal: 30 degrees (min.) Vertical: 10 degrees (min.) Intel 855MG chipset with 8 MB shared memory using Dynamic Video Memory Technology (DVMT) delivers low-power, high-performance 3D/2D graphics, video, and display capabilities. Dynamic Video Memory Technology (DVMT) dynamically responds to application requirements and efficiently allocates the proper amount of memory (maximum is 64 MB) for optimal graphics and system performance. Interface Specifications
Modem (RJ-11) LAN (RJ-45)
USB 2.0 x 2
DC-In
IrDA
15-pin D-SUB connector for external VGA monitor Interfaces on Optional Port Replicator
Docking connector
DC Power
Pass-through LAN Port
External Monitor
USB 2.0 x 2
Docking Port PC Card Slots
Two Type I/Type II or one Type III
PCMCIA CardBus version 3.0 73 T Series.book Page 74 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S e v e n LifeBook T Series Tablet PC Specifications (Continued) LifeBook T Series Tablet PC Specifications (Continued) Environmental Specifications Temperature Humidity Operating: 41o to 95o F (5o to 35o C) Non-operating: 5o to 140o F
(-15o to 60o C) Operating: 20 to 85% non-
condensing Non-operating: 8 to 85% non-
condensing Agency Approval Specifications Emissions Immunity Safety Telecom
EN55022 (CISPR22) Class B
FCC 15, Class B
FCC 15C, 15.247
ETSI EN 300-328
ICES-003
Canada RSS-210
EN55024 (1998)
ETSI EN 301-489-17 V.1.1.1
(2000-9)
UL and cUL Listed, UL 60950
TuV T-Mark, EN60950
FCC Part 68
IC CS-03 Additional Specifications Operating systems
Microsoft Windows XP Tablet PC Edition Infrared User Interface support Audio User Controls Status Indicators
(LCDs)
System IR Port
IrDA version 1.1 (FIR, 4 Mbps)
Keyboard Pitch: 19 mm, Stroke: 3 mm
TouchPad pointing device with scroll button
Active digitizer with pen input
On-screen keyboard
RealTek ALC202 with 18-bit stereo audio, full duplex
Internal mono microphone and speaker
Mono microphone and stereo headphone jacks
Programmable Application Buttons, each with primary and secondary functions (default applications: Microsoft Journal and Calculator)
Security button support
Suspend/Resume button
Power
Charge/DC-In
Battery level
HDD
PC Card
Caps Lock
Num Lock
Scroll Lock
Security Power Specifications Main Battery Bridge Battery
6-cell
Removable, Lithium ion
10.8 V @3600 mAh, 38.9 Wh
Warm-swappable
Recharge Time:
Approximately 3.2 hours
Suspend Life: Minimum 3 days Off State: Approximately 20 days
6-cell NiMH, 35 mAh
Life (with Suspend-to-RAM on bridge battery only):
5 minutes from full charge AC Adapter Autosensing 100 - 240V, supplying 16 VDC, with a current of 3.75 A 74 T Series.book Page 75 Thursday, July 31, 2003 10:49 AM Regulatory Information Changes or modifications not expressly approved by Fujitsu could void this users authority to operate the equipment FCC NOTICES Notice to Users of Radios and Television These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installa-
tion. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a partic-
ular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
n Reorient or relocate the receiving antenna. n Increase the separation between the equipment and receiver. n Connect the equipment into an outlet that is on a different circuit than the receiver. n Consult the dealer or an experienced radio/TV technician for help. Shielded interconnect cables must be employed with this equipment to ensure compliance with the pertinent RF emission limits governing this device. Notice to Users of the US Telephone Network This equipment contains an internal modem (Fujitsu Media Devices, MBH 7MD33) that complies with Part 68 of the FCC rules. On the bottom of this equipment is a label that contains, among other information, the FCC registration number and ringer equivalence number
(REN) for this equipment. If requested, this information must be provided to the telephone company. This equipment is designed to be connected to the tele-
phone network or premises wiring using a standard jack type USOC RJ11C. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. The ringer equivalent number (REN) of this equipment is 0.0B as shown on the label. The REN is used to deter-
mine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone may result in the devices not ringing in response to an R e g u l a t o r y I n f o r m a t i o n incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local tele-
phone company. If this equipment causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isnt practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary. The telephone company may make changes in its facili-
ties, equipment, operations or procedures that could effect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modifications to main-
tain uninterrupted service. If trouble is experienced with this equipment, for repair or warranty information, please refer to the manual or contact Fujitsu PC Corporation, Customer Service. If the equipment is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. The equipment cannot be used on public coin service provided by the telephone company. Connection to party line service is subject to state tariffs. (Contact the state public utility commission, public service commis-
sion or corporation commission for information). If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this computer does not disable your alarm equip-
ment. If you have any questions about what will disable alarm equipment, consult your telephone company or a qualified installer. The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date an time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such busi-
ness, other entity, or individual. 75 T Series.book Page 76 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S e v e n DOC (INDUSTRY CANADA) NOTICES Notice to Users of Radios and Television This Class B digital apparatus meets all requirements of Canadian Interference-Causing Equipment Regulations. CET appareil numrique de la class B respecte toutes les exigence du Rglement sur le matrial brouilleur du Canada. Notice to Users of the Canadian Telephone Network NOTICE: This equipment (Fujitsu Media Devices modem, MBH 7MD33) meets the applicable Industry Canada Terminal Equipment Technical Specifications. This is confirmed by the registration number. The abbreviation, IC, before the registration number
(4061A-8687) signifies that registration was performed based on a Declaration of Conformity indicating that Industry Canada technical specifications were met. It does not imply that Industry Canada approved the equipment. Before connecting this equipment to a telephone line the user should ensure that it is permissible to connect this equipment to the local telecommunication facilities. The user should be aware that compliance with the certifica-
tion standards does not prevent service degradation in some situations. Repairs to telecommunication equipment should be made by a Canadian authorized maintenance facility. Any repairs or alterations not expressly approved by Fujitsu or any equipment failures may give the telecom-
munication company cause to request the user to disconnect the equipment from the telephone line. NOTICE: The Ringer Equivalence Number (REN) for this terminal equipment is 0.0. The REN assigned to each terminal equipment provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equiva-
lence Numbers of all the devices does not exceed five. For safety, users should ensure that the electrical ground of the power utility, the telephone lines and the metallic water pipes are connected together. Users should NOT attempt to make such connections themselves but should contact the appro-
priate electric inspection authority or elec-
trician. This may be particularly important in rural areas. 76 Avis Aux Utilisateurs Du Rseau Tlphonique Canadien AVIS: Le prsent matriel est conforme aux spcifica-
tions techniques dIndustrie Canada applicables au matriel terminal. Cette conformit est confirme par le numro denregistrement. Le sigle IC, plac devant le numro denregistrement (4061A-8687), signifie que lenregistrement sest effectu conformment une dclaration de conformit et indique que les spcifica-
tions techniques dIndustrie Canada ont t respectes. Il nimplique pas quIndustrie Canada a approuv le matriel. Avant de connecter cet quipement une ligne tlpho-
nique, lutilisateur doit vrifier sil est permis de connecter cet quipement aux installations de tlcom-
munications locales. Lutilisateur est averti que mme la conformit aux normes de certification ne peut dans certains cas empcher la dgradation du service. Les rparations de lquipement de tlcommunications doivent tre eVectues par un service de maintenance agr au Canada. Toute rparation ou modification, qui nest pas expressment approuve par Fujitsu, ou toute dfaillance de lquipement peut entraner la compagnie de tlcommunications exiger que lutilisateur dcon-
necte lquipement de la ligne tlphonique. AVIS: Lindice dquivalence de la sonnerie (IES) du prsent matriel est de 0.0. LIES assign chaque dispositif terminal indique le nombre maximal de terminaux qui peuvent tre raccords une interface tlphonique. La terminaison dune interface peut consister en une combinaison quelconque de dispositifs, la seule condition que la somme dindices dquiva-
lence de la sonnerie de tous les dispositifs nexcde pas 5. Pour assurer la scurit, les utilisateurs doivent vrifier que la prise de terre du ser-
vice dlectricit, les lignes tlphoniques et les conduites deau mtalliques sont con-
nectes ensemble. Les utilisateurs NE doivent PAS tenter dtablir ces connex-
ions eux-mmes, mais doivent contacter les services dinspection dinstallations lectriques appropris ou un lectricien. Ceci peut tre particulirement important en rgions rurales. R e g u l a t o r y I n f o r m a t i o n T Series.book Page 77 Thursday, July 31, 2003 10:49 AM UL Notice This unit requires an AC adapter to operate. Use only UL Listed Class 2 Adapters with an output rating of 16 Vdc, with a current of 3.75 A. AC Adapter output polarity:
The modem-to-telephone network connection must be a line cord using a minimum #26 AWG wire. For Authorized Repair Technicians Only n For continued protection against risk of fire, replace only with the same type and rating fuse. n Danger of explosion if Lithium (clock) battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the manufacturer. Dis-
pose of used batteries according to the manufacturers instruction. 77 T Series.book Page 78 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n S e v e n 78 T Series.book Page 79 Thursday, July 31, 2003 10:49 AM 8 Glossary 79 T Series.book Page 80 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n E i g h t 80 T Series.book Page 81 Thursday, July 31, 2003 10:49 AM Glossary AC Adapter A device which converts the AC voltage from a wall outlet to the DC voltage needed to power your Tablet PC. ACPI Advanced Configuration and Power Interface Active-Matrix Display A type of technology for making flat-panel displays which has a transistor or similar device for every pixel on the screen. AdHoc A designation for wireless LAN network configuration. It indicates a form of communication limited to those personal computers which have wireless LAN function. For details, refer to "Ad hoc connection" on page 90. ADSL Asymmetric Digital Subscriber Line Technology for transporting high bit-rate services over ordinary phone lines. Auto/Airline Adapter A device which converts the DC voltage from an auto-
mobile cigarette lighter or aircraft DC power outlet to the DC voltage needed to power your Tablet PC. BIOS Basic Input-Output System. A program and set of default parameters stored in ROM which tests and operates your Tablet PC when you turn it on until it loads your installed operating system from disk. Infor-
mation from the BIOS is transferred to the installed operating system to provide it with information on the configuration and status of the hardware. Bit An abbreviation for binary digit. A single piece of information which is either a one (1) or a zero (0). bps An abbreviation for bits per second. Used to describe data transfer rates. Boot To start-up a computer and load its operating system from disk, ROM or other storage media into RAM. Bus An electrical circuit which passes data between the CPU and the sub-assemblies inside your Tablet PC. G l o s s a r y Byte 8 bits of parallel binary information. Cache Memory A block of memory built into the micro-processor which is much faster to access than your system RAM and used in specially structured ways to make your overall data handling time faster. CardBus A faster, 32-bit version of the PC Card interface which offers performance similar to the 32-bit PCI architecture. CD-ROM Compact disk read only memory. This is a form of digital data storage which is read optically with a laser rather than a magnetic head. A typical CD-ROM can contain about 600MB of data and is not subject to heads crashing into the surface and destroying the data when there is a failure nor to wear from reading. Channel The frequency band of wireless LAN to be used in communications over wireless LAN or at the access point. CMOS RAM Complementary metal oxide semiconductor random access memory. This is a technology for manufacturing random access memory which requires very low levels of power to operate. Command An instruction which you give your operating system. Example: run a particular application or format a floppy disk. Configuration The combination of hardware and software that makes up your system and how it is allocated for use. CRT Cathode Ray Tube. A display device which uses a beam of electronic particles striking a luminescent screen. It produces a visual image by varying the position and intensity of the beam. Data The information a system stores and processes. DC Direct current. A voltage or current that does not fluctuate periodically with time. Default Value A pre programmed value to be used if you fail to set your own. 81 T Series.book Page 82 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n E i g h t DHCP Dynamic Host Configuration Protocol A protocol used for automatically fetching communica-
tion parameters such as IP addresses. The side which assigns IP address is called DHCP server and the side that is assigned it is called DHCP client. DIMM Dual-in-line memory module. DISE Drive Image Special Edition. A utility that allows you to restore the original factory image on your hard drive in the event of corruption or accidental erasure of files or applications. Disk A spinning platter of magnetic data storage media. If the platter is very stiff it is a hard drive, if it is highly flexible it is a floppy disk, if it is a floppy disk in a hard housing with a shutter it is commonly called a diskette. Disk Drive The hardware which spins the disk and has the heads and control circuitry for reading and writing the data on the disk. Diskette A floppy disk in a hard housing with a shutter. DMA Direct Memory Access Special circuitry for memory to memory transfers of data which do not require CPU action. Driver A computer program which converts application and operating system commands to external devices into the exact form required by a specific brand and model of device in order to produce the desired results from that particular equipment. ECP Extended Capability Port. A set of standards for high speed data communication and interconnection between electronic devices. Encryption Key (Network Key) Key information used to encode data for data transfer. This device uses the same encryption key to encode and decode the data, and the identical encryption key is required between the sender and receiver. ESD Electro-Static Discharge. The sudden discharge of elec-
tricity from a static charge which has built-up slowly. Example: the shock you get from a doorknob on a dry day or the sparks you get from brushing hair on a dry day. Extended Memory All memory more than the 640KB recognized by MS-DOS as system memory. FCC Federal Communication Commission. Floppy Disk A spinning platter of magnetic data storage media which is highly flexible. DMI Desktop Management Interface GB Gigabyte. A standard that provides PC management applications with a common method of locally or remotely querying and configuring PC computer systems, hardware and software components, and peripherals. DNS Domain Name System A function that controls the correspondence of IP addresses assigned to a computer with the name. Even for those computers whose IP addresses are unknown, if their names are known, it is possible to communicate with them. DOS Disk Operating System (MS-DOS is a Microsoft Disk Operating System). Hard drive A spinning platter of magnetic data storage media where the platter is very stiff. I/O Input/Output. Data entering and leaving your Tablet PC in electronic form. I/O Port The connector and associated control circuits for data entering and leaving your Tablet PC in electronic form. IDE Intelligent Drive Electronics. A type of control interface for a hard drive which is inside the hard drive unit. 82 T Series.book Page 83 Thursday, July 31, 2003 10:49 AM IEEE 1394 Industry standard that allows you to connect between your Tablet PC and a peripheral device such as a digital camera. Also known as "Firewire" or "iLINK". IrDA Infrared Data Association. An organization which produces standards for communication using infrared as the carrier. G l o s s a r y IEEE802.11a One of the wireless LAN standards prescribed by the 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Elec-
tronic Engineers). This standard allows communica-
tions at the maximum speed of 54 Mbps by using a 5 GHz band which can freely be used without radio communication license. IEEE802.11b One of the wireless LAN standards prescribed by 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Elec-
tronic Engineers). It allows communications at the maximum speed of 11 Mbps by a band of 2.4 GHz (ISM band) which can freely be used without radio communi-
cation license. IEEE802.11g One of the wireless LAN standards prescribed by 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Elec-
tronic Engineers). It allows communications at the maximum speed of 54 Mbps by a band of 2.4 GHz (ISM band) which can freely be used without radio communi-
cation license. Infrared Light just beyond the red portion of the visible light spectrum which is invisible to humans. Infrastructure A designation of Wireless LAN network configurations. It indicates a form of communication using an Access Point. For details, refer to "Infrastructure connection"
on page 90. IP Address An address used for computers to communicate in the TCP/IP environment. Current IPv4 (version 4) uses four values in the range between 1 and 255. (Example: 192.168.100.123). There are two types of IP address: global address and private address. The global address is an only address in the world. It is controlled by JPNIC (Japan Network Information Center). A private address is an only address in the closed network. IR An abbreviation for infrared. IRQ Interrupt Request An acronym for the hardware signal to the CPU that an external event has occurred which needs to be processed. KB Kilobyte. LAN Local Area Network An interconnection of computers and peripherals within a single limited geographic location which can pass programs and data amongst themselves. LCD Liquid Crystal Display A type of display which makes images by controlling the orientation of crystals in a crystalline liquid. Lithium ion Battery A type of rechargeable battery which has a high power-
time life for its size and is not subject to the memory effect as Nickel Cadmium batteries. LPT Port Line Printer Port. A way of referring to parallel interface ports because historically line printers were the first and latter the most common device connected to parallel ports. MAC Address Media Access Control Address A unique physical address of a network card. For Ethernet, the first three bytes are used as the vendor code, controlled and assigned by IEEE. The remaining three bytes are controlled by each vendor (preventing overlap), therefore, every Ethernet card is given a unique physical address in the world, being assigned with a different address from other cards. For Ethernet, frames are sent and received based on this address. MB Megabyte. Megahertz 1,000,000 cycles per second. 83 T Series.book Page 84 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n E i g h t Memory A repository for data and applications which is readily accessible to your Tablet PCs CPU. NTSC National TV Standards Commission. The standard for TV broadcast and reception for the USA. MHz Megahertz. MIDI Musical Instrument Digital Interface. A standard communication protocol for exchange of information between computers and sound producers such as synthesizers. Modem A contraction for MOdulator-DEModulator. The equipment which connects a computer or other data terminal to a communication line. Monaural A system using one channel to process sound from all sources. MPU-401 A standard for MIDI interfaces and connectors. MTU Maximum Transmission Unit The maximum data size that can be transferred at a time through the Internet or other networks. You can set a smaller MTU size to obtain successful communication, if you have difficulty transferring data due to the fact that the maximum size is too large. Network authentication The method of authentication performed by wireless LAN clients to connect with the access point. There are two types: open system authentication and shared key authentication. The type of authentication must be set to each client and also coincide with the setting of access point with which to communicate. Network authentica-
tion is sometimes called authentication mode. Network key Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication. Network name (SSID: Security Set Identifier) When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with "Network name (SSID)". In order to improve security, the network key is set allowing no communication unless "Network name
(SSID)" coincides with the network key. 84 Open system authentication One of network authentication types for wireless LAN. Since there is no check of network key upon authentica-
tion, clients can connect to the access point without submitting correct network keys. However, in case of actual communications, the same network key must be set. Open system authentication is sometimes called Open key authentication. Operating System A group of control programs that convert application commands, including driver programs, into the exact form required by a specific brand and model of micro-
processor in order to produce the desired results from that particular equipment. Partition A block of space on a hard drive which is set aside and made to appear to the operating system as if it were a separate disk, and addressed by the operating system accordingly. PCI Peripheral Component Interconnect Self-configuring PC local bus. Designed by Intel, PCI has gained wide acceptance as a standard bus design. PCMCIA PCMCIA is a trademark of the Personal Computer Memory Card International Association. The Personal Computer Memory Card International Association is an organization that sets standards for add-in cards for personal computers. Peripheral Device A piece of equipment which performs a specific function associated with but not integral to a computer. Examples: a printer, a modem, a CD-ROM. Pitch (keyboard) The distance between the centers of the letter keys of a keyboard. Pixel The smallest element of a display, a dot of color on your display screen. The more pixels per area the clearer your image will appear. POST Power On Self Test. A program which is part of the BIOS which checks the configuration and operating condition of your hardware whenever power is applied to your Tablet PC. Status and error messages may be displayed T Series.book Page 85 Thursday, July 31, 2003 10:49 AM before the operating system is loaded. If the self test detects failures that are so serious that operation can not continue, the operating system will not be loaded. PPPoE Point to Point Protocol over Ethernet. A protocol for Ethernet, using a Point-to-Point Protocol
(PPP), which is used for connection on the phone line. Program An integrated set of coded commands to your computers telling your hardware what to do and how and when to do it. Protocol Procedures and rules use to send and receive data between computers.
- Method of sending and receiving data
- Process used to handle communication errors Conditions required for communication are organized in procedures for correct transfer of information. RAM Random Access Memory. A hardware component of your Tablet PC that holds binary information (both program and data) as long as it has the proper power applied to it. RAM Module A printed circuit card with memory and associated circuitry which allows the user to add additional memory to the computer without special tools. Reset The act of reloading the operating system. A reset erases all information stored in RAM. Restart See Reset. Resume To proceed after interruption. In your Tablet PC this refers to returning to active operation after having been in one of the suspension states. ROM Read Only Memory. A form of memory in which infor-
mation is stored by physically altering the material. Data stored in this way can not be changed by your Tablet PC and does not require power to maintain it. SDRAM Synchronous Dynamic Random Access Memory. G l o s s a r y Serial Port A connection to another device through which data is transferred one bit at a time on a single wire with any other wires only for control of the device not for transfer of data. Shared key authentication One of the network authentication types for wireless LAN. Upon authentication, the access point checks whether the same network key is set to the client. If the client uses a wrong network key or the network key itself is not set, authentication is unsuccessful, allowing no communications with the access point. SMART Self-Monitoring, Analysis and Reporting Technology
(SMART) is an emerging technology that provides near-
term failure predictions for hard drives. When SMART is enabled the hard drive monitors pre-determined drive attributes that are susceptible to degradation over time. If a failure is likely to occur, SMART makes a status report available so that the Tablet PC can prompt the user to back up the data on the drive. Naturally not all failures are predictable. SMART predictability is limited to those attributes which the drive can self-monitor. In those cases where SMART can give advance warning, a considerable amount of precious data can be saved. SRAM Static random access memory. A specific technology of making RAM which does not require periodic data refreshing. SSID Service Set Identifier Specifies which network you are joining. Some systems allow you to specify any SSID as an option so you can join any network. Standby To make inoperative for a period of time. Your Tablet PC uses various suspension states to reduce power consumption and prolong the charge of your battery. Status Indicator A display which reports the condition of some portion of your hardware. On your Tablet PC this is an LCD screen just above the keyboard. Stereo (audio) A system using two channels to process sound from two different sources. Subnet mask TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. 85 WLAN Wireless Local Area Network. A wireless interconnection of computers and peripherals within a single limited geographic location which can pass programs and data amongst themselves. Write Protect Prevent alteration of the binary state of all bits in a storage media. Example: all information on a device such as a floppy diskette; a block of space in a storage media such as a partition of a hard drive; a file or direc-
tory of floppy diskette or hard drive. XGA Extended VGA. Zip Drive A 100MB or 250MB read/write removable media disk drive. T Series.book Page 86 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - S e c t i o n E i g h t Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other. SVGA Super VGA. S-Video Super Video. A component video system for driving a TV or computer monitor. System Clock An oscillator of fixed precise frequency which synchro-
nizes the operation of the system and is counted to provide time of day and date. TCP/IP Transmission Control Protocol/Internet Protocol. A standard Internet protocol that is most widely used. TFT Thin Film Transistor A technology for flat display panels which uses a thin film matrix of transistors to control each pixel of the display screen individually. UL Underwriters Laboratories An independent organiza-
tion that tests and certifies the electrical safety of devices. USB Universal Serial Bus. Standard that allows you to simultaneously connect up to 127 USB devices such as game pads, pointing devices, printers, and keyboards to your computer. VGA Video Graphics Array. A video display standard originally introduced by IBM with the PS/2 series of personal computers. VRAM Video Random Access Memory. A memory dedicated to video display data and control. WFM Wired for Management is Intels broad-based initiative to reduce the total cost of ownership (TCO) of business computing without sacrificing power and flexibility. Wi-Fi Compatible Wi-Fi (Wireless Fidelity) Identifies that the product has passed the interoperability test, supplied by the WECA
(Wireless Ethernet Compatibility Alliance), which guar-
antees the interoperability of wireless IEEE 802.11 LAN products. For more information on the Wi-Fi standard, go to the WECA website at: www.wirelessethernet.com. 86 T Series.book Page 87 Thursday, July 31, 2003 10:49 AM Appendix Integrated Wireless LAN* Users Guide
*Optional Device 87 T Series.book Page 88 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x 88 T Series.book Page 89 Thursday, July 31, 2003 10:49 AM FCC REGULATORY INFORMATION Please note the following regulatory information related to the optional wireless LAN device. Regulatory Notes and Statements Wireless LAN, Health and Authorization for use Radio frequency electromagnetic energy is emitted from Wireless LAN devices. The energy levels of these emis-
sions, however, are far much less than the electromag-
netic energy emissions from wireless devices such as mobile phones. Wireless LAN devices are safe for use by consumers because they operate within the guidelines found in radio frequency safety standards and recom-
mendations. The use of Wireless LAN devices may be restricted in some situations or environments, such as:
On board an airplane, or In areas in which volatile gases are present, or In situations where the interference risk to other devices or services is perceived or identified as harmful. In cases in which the policy regarding use of Wireless LAN devices in specific environments is not clear (e.g., airports, hospitals, chemical/oil/gas industrial plants, private buildings), obtain authorization to use these devices prior to operating the equipment. Regulatory Information/Disclaimers Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in the user documentation provided with the product. Any changes or modifications made to this device that are not expressly approved by the manufacturer may void the users authority to operate the equipment. The Manufacturer is not responsible for any radio or televi-
sion interference caused by unauthorized modification of this device, or the substitution or attachment of connecting cables and equipment other than those spec-
ified by the manufacturer. It is the responsibility of the user to correct any interference caused by such unautho-
rized modification, substitution or attachment. The Manufacturer and its authorized resellers or distributors will assume no liability for any damage or violation of government regulations arising from failure to comply with these guidelines. Federal Communications Commission statement This device complies with Part 15 of FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause interference, and, (2) This device must accept any interference, including interfer-
ence that may cause undesired operation of this device. W I r e l e s s L A N U s e r s G u i d e FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interfer-
ence in a residential installation. This equipment gener-
ates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communica-
tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encour-
aged to try and correct the interference by one or more of the following measures:
1. 2. Reorient or relocate the receiving antenna. Increase the distance between the equipment and the receiver. 3. Connect the equipment to an outlet on a circuit different from the one the receiver is connected to. 4. Consult the dealer or an experienced radio/TV technician for help. FCC Radio Frequency Exposure statement This Wireless LAN radio device has been evaluated under FCC Bulletin OET 65C and found compliant with the requirements as set forth in CFR 47 Sections 2.1091, 2.1093, and 15.247 (b) (4) addressing RF Exposure from radio frequency devices. This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The RF transmission power from the antenna conforms to the general public FCC limit of SAR (Specific Absorption Rate), 1.6 W/kg. The maximum SAR value measured from this device was less than 1.6 W/kg. This device must not be co-located or operating in conjunction with any other antenna or transmitter. Export restrictions This product or software contains encryption code which may not be exported or transferred from the US or Canada without an approved US Department of Commerce export license. This device complies with Part 15 of FCC Rules., as well as ICES 003 B / NMB 003 B. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause undesirable oper-
ation. Modifications not expressly authorized by Fujitsu PC Corporation may invalidate the user's right to operate this equipment. 89 T Series.book Page 90 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x Before Using the Wireless LAN The Integrated Wireless LAN is an optional device avail-
able for Fujitsu mobile computers. This manual describes the basic operating procedures for the Wireless LAN (referred to as the device in this manual) and how to set up a wireless LAN network. Before using this device, read this manual carefully to ensure correct oper-
ation of the device. Keep this manual in a safe place for reference while using the device. Types of Wireless LANs Covered by this Document This document is applicable to systems containing one of the following two devices. Most of the procedures are identical. Sections that differ between the two devices have been noted in the text:
Intel PROSet Wireless LAN Broadcom Wireless LAN To determine which device is present in your system, click [Start] -> Control Panel. If there is an icon named Intel PROSet, you have the Intel device; if there is an icon named Broadcom Wireless Utility, you have the Broadcom device. Characteristics of the Device This device consists of a wireless LAN card that is attached inside the computer via a mini-PCI slot. The main characteristics are as follows:
It operates in the 2.4 GHz radio frequency band. The FCC does not require the user to obtain a license to operate this WLAN device. It uses Direct Sequence Spread Spectrum (DSSS), an RF modulation scheme that is resistant to noise. This device is Wi-Fi compliant, and operates at a max-
imum data rate of 11 Mbps, as specified by Wi-Fi. Figure A-1. Ad Hoc Mode Network The maximum communication range is approxi-
mately 80 feet (25 meters) inside a building. The range may be shorter or longer, depending upon the installation factors, such as walls and columns. Unauthorized access can be prevented with the use of an SSID and an encryption key (also known as a WEP key). Wireless LAN Modes Using this Device Ad Hoc Mode (See Figure A-1) The Ad Hoc Mode refers to the network connecting two computers using wireless LAN cards. This connec-
tion is called an Ad Hoc network. Using an Ad Hoc network, you can obtain a network connection easily and at a low cost. In the Ad Hoc mode, you can use the function supported by Microsoft Network, such as File and Print Sharing to exchange files and share a printer or other peripheral devices. To use the Ad Hoc Mode, you must set the same SSID and the same encryption key for all the computers that are connected. All connected computers can communi-
cate with each other within the communication range. Infrastructure Mode (See Figure A-2) If a number of computers are connected simultaneously in the Ad Hoc mode, the transfer rate may be reduced, communications may become unstable, or the network connection could fail. This is because all wireless LAN cards are using the same radio frequency in the network. To improve this situation, you can use a wireless LAN access point, which is sold separately. The wireless LAN network is in the Infrastructure mode when it uses an 90 T Series.book Page 91 Thursday, July 31, 2003 10:49 AM W I r e l e s s L A N U s e r s G u i d e Figure A-2. Infrastructure Mode Network Internet ADSL modem, cable modem, or similar Wired LAN Access Point*
Wireless LAN access point, and such a connection is called the Infra-
structure Network. By using an access point, you can set and use a different communication channel for each network group. Each channel is given a different radio frequency, and it eliminates the collision of communications and provides a more stable communications environment. How to Handle This Device The Integrated Wireless LAN device is already installed in your mobile computer. Under normal circumstances, it should not be necessary for you to remove or re-install it. The LAN has been configured to support the oper-
ating system with which your system shipped. FOR BETTER COMMUNICATIONS This personal computer may not operate properly due to the operating environment. Strictly observe the following precautions when installing the main unit of the computer:
Since this personal computer and equipment compli-
ant with IEEE 802.11a differ in operation frequency, it is not possible to communicate between both. The recommended wireless communications distance is within a line-of-sight radius of 25 meters. For rea-
sons related to the characteristics of the wireless LAN, however, the actual communications distance depends
* An optional hub for a wired LAN may be required depending upon the type of access point used. on the structure of the building in which the wireless LAN function is to be used, the presence/absence of obstructions, the types of software to be used, installa-
tion status, radio-wave status, or other operating con-
ditions. Decreases in communications speed or a communications failure may also occur. Distance the main unit of this personal computer is from other electric appliances. If the main unit of the person computer is installed near a powered-on elec-
tric appliance, the computer may not be able to com-
municate properly or trouble may occur in the electric appliance. If the computer is unable to communicate properly, change the channel to be used or the installation loca-
tion. During the use of a microwave oven or other equipment generating strong high-frequency energy, in particular, the personal computer may be highly susceptible to the energy and unable to communicate properly. If a broadcasting station or wireless communications equipment is present nearby and this prevents the computer from communicating properly, moving the main unit of the computer is suggested. Radio inter-
ference may also occur if the intensity of ambient radio waves is too high. 91 T Series.book Page 92 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x STOPPING TRANSMISSION To use this product inside hospitals, clinics, or airplanes, or in other places where the use of electronic equipment is regulated, stop the transmission of radio waves from the wireless LAN beforehand. Deactivation using the wireless switch The transmission of radio waves from the wireless LAN can be stopped by setting the wireless switch to the Off position. Note that the Wireless LAN On/Off switch has no effect on non-Wireless LAN models.
(See Figure A-3 for Wireless LAN switch location.) Wireless LAN On/Off Switch switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, check the [Enable Radio] checkbox to select it., then click the
[OK] button. STARTING TRANSMISSION To communicate using the wireless LAN function, set the computer to a status from which it can transmit, as follows:
Intel PROSet Wireless LAN:
1. Set the wireless switch to the On position. 2. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 3. Click the [General] tab if it is not already selected. 4. Select [ON] for the Switch radio: function, then click [OK]. Wireless communications on/off switching will be activated and the transmission of radio waves will be restarted. Figure A-3. Wireless LAN On/Off Switch Broadcom Wireless LAN:
1. Click the Wireless Network Connection icon in the system tray at the lower right of your screen. 2. Click [Enable Radio]. The radio will be turned on. Infrastructure Mode: Transmission is enabled. Ad Hoc Mode: Restart your computer to enable the radio. Deactivation using Windows Intel PROSet Wireless LAN:
1. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the General tab. 3. Select [Off] for the wireless communications Switch Radio: function, and then click the [OK]
button. Wireless communications on/off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, select [On] for the wireless communications Switch Radio:
function, and then click the [OK] button. Broadcom Wireless LAN 1. Click [Start] --> [Control Panel] --> [Broadcom Wireless Utility]. The Broadcom Wireless Configu-
ration Utility window will be displayed. 2. Click the Wireless Networks tab. 3. Click the [Enable Radio] box to clear it, then click the [OK] button. Wireless communications on/off 92 T Series.book Page 93 Thursday, July 31, 2003 10:49 AM Connection using Windows XP W I r e l e s s L A N U s e r s G u i d e FLOW OF OPERATIONS The wireless LAN connection procedure contained in this section is outlined below. 1. Make sure the mobile computer is ready for the transmission of radio waves from the wireless LAN. For further details, see (See Starting Transmission on page 92 for more information). 2. Assign the parameters required for wireless LAN connection. (See Preparation for wireless LAN con-
nection on page 93 for more information). Enter the network name (SSID) and other data. Enter the network key (the Wired Equivalent Privacy or WEP key used to encode 802.11b communications data). 3. Perform setting operations relating to network con-
nection. (See Connection to the network on page 95 for more information) Specify TCP/IP as the protocol, and confirm the name of the work group and other settings. Enter the data required for file/printer sharing on the network. Perform this operation as required. For infrastructure connection, enter data for the access point. Refer to the manual of the access point for fur-
ther details. Verify that you are able to connect your computer to the network. PREPARATION FOR WIRELESS LAN CONNECTION This section explains the preparations required for the use of the wireless LAN. Wireless channels 1 to 11 are used for the IEEE802.11b-compliant wireless LAN adopted by this personal computer. If you are to use infrastructure connection
(network connection via an access point), a channel number greater than 11 may have been preassigned or auto-
matically assigned to the wireless chan-
nel to be used for the access point. In that case, set the channel of the access point to a channel number from 1 to 11. For further details of the setting method, refer to the manual of the access point you are using. To use infrastructure connection, refer to the access point manual for the access point-setting procedure. You do not need to set the channel (fre-
quency band). The channel being used for the intended wireless LAN network is detected automatically and your per-
sonal computer communicates through that channel. When a new ad hoc wire-
less LAN network is constructed between the main units of personal computers, channel 11 is preassigned as the default. If it is necessary to change the channel, change the setting of the access point. For the setting procedure, refer to the manual of the access point. In the case of infrastructure connection, to use ADSL (PPPoE) for accessing the Internet, the MTU size of this personal computer may need to be changed. For further details, refer to the manual of the access point. Assigning parameters 1. Make sure that the Wireless LAN switch is switched Enter the network name (SSID), the network key, and other data required for wireless LAN connection. If there is the administrator of the network, contact the network administrator for data settings. on. 2. Click the [Start] button first and then [Control Panel]. 3. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed instead.) 4. Double-click the Network Connections icon. A list of currently installed networks will be displayed. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
93 T Series.book Page 94 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x played. The [Wireless Network Connection Proper-
ties] window will be displayed. 6. Click the [Wireless Networks] tab. 7. Click [Refresh], then choose the correct SSID from the [Available Networks] window. Click [Config-
ure] and proceed to step 7. If the SSID of your access point does not appear in the list, click [Add]. The [Wireless Network Properties] window will be displayed. 8. 9. Select the Association tab if it is not already selected. Enter the information required for connection to the wireless LAN. a. Enter the network name (SSID). (i.e., Enter the name of the desired network in less than 33 ASCII characters). For ad hoc connection: Assign the same network name to all the personal computers to be connected. For infrastructure connection: Assign the appro-
priate SSID. The SSID must be identical to the SSID of the access point. Refer to the access point manual, or contact your network administrator. b. For ad hoc connection, check the following field. For infrastructure connection, clear the check mark for the following field:
[This is a computer-to-computer (ad hoc) net-
work; wireless access points are not used.]
10. Enter the WEP key for encoding communications data. You are strongly recommended to enter the network key for encoding communications data. If the network key is not entered, since the network can be accessed from all personal computers containing the wireless LAN function, there is the danger of your data being stolen or damaged by other users. In infrastructure mode, WEP must be enabled on the access point in order for WEP to work. The WEP key entered on the client must be identical to the WEP key entered in the access point. In ad hoc mode, the WEP key must be entered identically on each computer. a. Check the [Data encryption (WEP enabled)]
check box 94 For ad hoc connection: Clear the check mark from the [Network Authentication (Shared mode)] check box. For infrastructure connection: If the access point to be accessed has acquired shared-key authenti-
cation, check the [Network Authentication
(Shared mode)] check box. For open-system authentication, clear the check mark. For access point setting, refer to the man-
ual of the access point. b. Clear the check mark from the [The key is provided for me automatically] check box. c. Enter data in [Network Key]. Depending on the number of entered characters or digits, whether the key is an ASCII character code or a hexadec-
imal code will be identified automatically. Use five or thirteen characters to enter the key in the ASCII character code format. The char-
acters that can be used as the "network key" are as follows: 0 - 9, A - Z, _ (underscore), or, Use 10 or 26 characters to enter the key in the hexadecimal character code format. The char-
acters that can be used as the "network key" in this case are as follows: 0- 9, A - Z, a - f For ad hoc connection: Assign the same net-
work key to all the personal computers to be connected. For infrastructure connection: Assign the identical network key that is programmed into the access point. For this setting, refer to the access point manual or contact your network administrator. d. Confirm the Network key by re-entering the same data in the [Confirm network key:] field. e. Make sure that [Key index (advanced)] is set to
"1". (Any value from "1" to "4" can be assigned to
[Key index (advanced)]. 1 is usually assigned, however). 11. Click the [Authentication] tab and then verify the settings of [Enable network access control using IEEE 802.11x]. For internal use at an organization such as a com-
pany, access by wireless LAN clients may be limited using IEEE 802.11x authentication. Please consult with your Information Systems department for this portion of the configuration. For home use, clear the check mark from [Enable network access control using IEEE 802.11x]. T Series.book Page 95 Thursday, July 31, 2003 10:49 AM For the setting method relating to IEEE 802.11x authentication, refer to the manual of the access point which you are using. 12. After completion of setting operations, click the
[OK] button. Processing will return to the [Wire-
less Network Connection Properties] window. 13. Verify that the network name entered in step 7 above is added in [Preferred Networks], and then click the [OK] button. In [Preferred Networks], register only the desired connection settings. W I r e l e s s L A N U s e r s G u i d e 7. Set the IP address as follows:
For ad hoc connection: Select [Use the following IP address:] and then enter data for [IP address]
and [Subnet mask]. See page 102 for IP address setting. For infrastructure connection: If your network uses DHCP, select [Obtain an IP address auto-
matically] and [Obtain DNS server address auto-
matically]. If your network uses static IP addresses, consult with your network adminis-
trator for the correct IP address settings. 8. Click the [OK] button. Processing will return to the
[Wireless Network Connection Properties] window. 14. Close the [Wireless Network] window. 9. Click the [OK] button. CONNECTION TO THE NETWORK This section explains connection to the network. If there is an administrator of the network, contact the network administrator for data settings. Setting the network Perform the Setting TCP/IP and Confirming the computer and work group names operations required for network connection. Setting TCP/IP To change the setting of the IP address, you need to be logged in from Windows as an administrator. 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. 5. Click the [General] tab if it is not already selected. 6. Click [Internet Protocol (TCP/IP] and then click
[Properties]. The [Internet Protocol (TCP/IP) Properties] window will be displayed. 10. Close the [Network Connection] window. Following this operation, confirm the names of the computer and the workgroup as follows. Confirming the computer and work group names To modify the computer name and/or the work group name, you need to be logged in from Windows as an administrator. 1. Click the [Start] button, then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click the [System] icon. The [System Prop-
erties] window will be displayed. 4. Click the [Computer Name] tab. 5. Confirm the settings of [Full computer name:] and
[Workgroup:]. a. The setting of [Full computer name:] denotes the name for identifying the computer. Any name can be assigned for each personal computer. To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen. Enter the desired name in less than 15 ASCII character code format. Identifiability can be 95 T Series.book Page 96 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x enhanced by entering the model number, the user name, and other factors. then click the [OK] button. Skip to "Setting file-
sharing function". b. [Workgroup name] is the group name of the 7. Click [Install]. The [Select Network Component network. Enter the desired name in less than 15 ASCII character code format. For ad hoc connection: Assign the same network name to all personal computers existing on the network. For infrastructure connection: Assign the name of the work group to be accessed. 6. Click the [OK] button. If a message is displayed that requests you to restart the personal computer, click [Yes] to restart the computer. Setting the sharing function Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid. This operation is not required unless the sharing func-
tion is to be used. The folder and printer for which the sharing function has been set will be usable from any personal computer present on the network. To share a file and/or the connected printer, you need to be logged in as an administrator. Setting the Microsoft network-sharing service 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. If [File and Printer Sharing for Microsoft Net-
works] is displayed, proceed to step 6. If [File and Printer Sharing for Microsoft Networks] is not dis-
played, skip to step 7. 6. Make sure that the [File and Printer Sharing for Microsoft Networks] check box is checked, and 96 Type] window will be displayed. 8. Click [Service], then click the [Add] button. The
[Select Network Service] window will be displayed. 9. Click [File and Printer Sharing for Microsoft Net-
works] and then click the [OK] button. Processing will return to the [Wireless Network Connection Properties] window, and [File and Printer Sharing for Microsoft Networks] will be added to the list. 10. Click the [Close] button. Setting the file-sharing function The procedure for setting the file-sharing function follows, with the "work" folder in drive C: as an example. 1. Click the [Start] button first and then [My Com-
puter]. 2. Double-click [Local disk (C:)]. 3. Right-click the "work" folder (or whichever folder you want to share), and then click [Sharing and Security...] in the menu displayed. The [Folder Name Properties] window will be displayed. Setting the file-sharing function for the file which has been used to execute Network Setup Wizard is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the file-
sharing function easily without using Network Setup Wizard are given below. 4. Click [Sharing] if it isnt already selected. 5. Click the link stating If you understand the secu-
rity risks, but want to share files without running the wizard, click here. 6. Click Just enable file sharing and click [OK]. 7. Check the [Share this folder on the network] check box. To specify the corresponding folder as a read-only folder, select the [Read only]
checkbox under the General tab. 8. Click the [OK] button. The folder will be set as a sharable folder, and the display of the icon for the
"work." folder will change. T Series.book Page 97 Thursday, July 31, 2003 10:49 AM Setting the printer-sharing function Confirming the status of the radio W I r e l e s s L A N U s e r s G u i d e 1. Click the [Start] button first and then [Printers and FAX]. A list of connected printers will be displayed. 2. Right-click the printer for which the sharing func-
tion is to be set, and then click [Sharing] in the menu displayed. The property window correspond-
ing to the selected printer will be displayed. Setting the printer-sharing function when Network Setup Wizard has been executed is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the printer-sharing function without using Network Setup Wizard are laid down below. 3. Click the [Sharing] tab. 4. Click [Share this printer]. 5. Enter the sharing printer name in [Share name]. 6. Click the [OK] button. Confirming connection After you have finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure. In the case of infrastructure connection, enter the necessary data for the access point before confirming connection. Refer to the manual of the access point for the access point setup procedure. Connecting your personal computer to another personal computer 1. Click [Start] first and then [My Computer]. The [My Computer] window will be displayed in the left frame. 2. Click [My Network Places] in the "Other Places" list. The window [My Network Places] will be displayed. 3. Click [View workgroup computers] under Network Tasks in the left frame. 4. Double-click the personal computer to which your personal computer is to be connected. The folder that was specified in Setting the file-sharing func-
tion on page 96 will be displayed. 5. Double-click the folder to be accessed. Intel PROSet Wireless LAN:
1. Click [Start] -> [All Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The [Intel(R) PROSet] window will be displayed. 2. Click the [General] tab and confirm radio status in the window displayed. The current connection sta-
tus will be displayed. Signal Quality The quality of the signals is displayed on a graph. Network name (SSID) The connected network name (SSID) is displayed. Profile name
<No profile>" is displayed. Mode If infrastructure connection is in use, "Infrastruc-
ture (AP)" will be displayed. If ad hoc connection is in use, "Ad hoc (Peer-to-peer)" will be displayed. Security The setting status of WEP is displayed. Speed The communications speed is displayed. Band (Frequency) The current operating frequency band is displayed. When communication is possible,
"802.11b (2.4 GHz)" is displayed. Channel The channel number currently being used for the communications is displayed. If connection cannot be made to the network or if you want to check for normal connection, see "Trouble-
shooting" on page 100. Broadcom Wireless LAN:
1. Right-click the Broadcom icon in the lower right corner of the screen. 2. Click [Open Utility]. The Broadcom Wireless Con-
figuration Utility window opens. 3. Select the Link Status tab. The current radio condi-
tion is displayed. (When the radio is turned off or the computer is not yet connected, some of the conditions are not displayed.) 97 T Series.book Page 98 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x Status The connection condition is shown. Network Name (SSID) The connected network name (SSID) is displayed. APs MAC Address In infrastructure mode, the MAC address of the access point currently in connection is shown. In Ad Hoc mode, a value is shown, but it is not the MAC address of the connected client. WEP When the Network key is used, this appears as
[Enabled]. Otherwise, [Disabled] appears. Speed The current communications speed is displayed in Mbps. Channel The channel number currently being used for the communications is displayed. Client IP Address The IP address is shown. Network Connection Type
[Infrastructure] or [Ad Hoc] is displayed. Radio State When radio waves are being transmitted,
[Enabled] appears. Signal The longer the bar graph, the better the radio wave signal. Noise The shorter the bar graph, the less noise, resulting in improved RF link quality. 98 T Series.book Page 99 Thursday, July 31, 2003 10:49 AM W I r e l e s s L A N U s e r s G u i d e Other settings SETTING OF POWER-SAVING FUNCTION You can set the power-saving function of wireless LAN. Default setting is auto-setting. In case of using the power-saving function, manually control the communi-
cation performance. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Ad hoc settings]. The [Ad hoc settings] window will be displayed. 4. Change channels during ad hoc connection by selecting a new channel from the drop down list. 3. Click the [Configure] button in [Power settings]. 5. Click [OK]. The [Power settings] window will be displayed. Broadcom Wireless LAN:
4. Select [Manual], and adjust the bar to set the power-saving function. Setting of transmission power during ad hoc connection By controlling the transmission power during ad hoc connection, you can broaden or narrow the communi-
cation range. This setting is only effective during ad hoc connection. It will be ineffective during infrastructure connection. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Power settings]. The [Power settings] window will be displayed. 4. Adjust the "Transmission Power (Ad Hoc)" bar to set the transmission power. Setting of channels during ad hoc connection You can set channels during ad hoc connection. Channel 11 is set by default. When connecting to an existing ad hoc network, no channel setting will be effective. This setting is only effective during ad hoc connection; it will be ineffective during infrastructure connection. When changing channels during ad hoc connection, change the channel settings of all connected computers with the same Network name (SSID) at the same time. After changing the channels, turn off all computers and -- after they are all turned off -- turn them back on. 1. 2. Click on the My Computer icon. Select [View sys-
tem information] from the left frame. Select the Hardware tab and click [Device Man-
ager]. 3. Double-click Broadcom BCM4306 Wireless LAN Adapter under [Network Adapters]. 4. 5. In the Broadcom BCM4306 Wireless LAN Adapter window, select the Advanced tab. Select IBSS Channel Number from the list, and change the value from the [Value:] dropdown list to the desired channel. 6. Click [OK]. 99 T Series.book Page 100 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x Troubleshooting TROUBLESHOOTING THE WIRELESS LAN Causes and countermeasures for troubles you may encounter while using your wireless LAN are described in the following table. Problem Possible Cause Possible Solution Unavailable network connection Incorrect network name (SSID) or network key Ad hoc connection: set the network names (SSIDs) and network keys of all computers to be connected to the same values. Infrastructure connection: set the network name (SSID) and network key to the same values as those of the access point. Set the network authentication according to the access point. Poor radio wave condition Ad hoc connection: Retry connection after shortening the distance to the destination computer or removing any obstacles for better sight. Infrastructure connection: Retry connection after shortening the distance to the access point or removing any obstacles for better sight. To check the wave condition, refer to the following pages: Windows XP: "Confirming the status of the radio waves" on page 97. Radio wave transmission has stopped Check if the wireless switch is turned ON. Also verify "Disable Radio" is not checked in "Network setting" window. Verify that the driver has been correctly initialized. This can be accomplished in the Device Manager. Refer to "Starting Transmission" on page 92. The computer to be connected to is turned off Active channel duplication due to multiple wireless LAN networks No right of access to the network to be connected Incorrectly-
performed network setting Unmatched
[Network authentication
(shared mode)]
settings in Windows XP The Wireless LAN On/Off switch is switched to Off. Check if the computer to be connected to is turned ON. If there is any other wireless LAN network nearby, change channels on the Access Point to avoid active channel duplication. For the method of checking active channels, refer to the following pages: Windows XP:
"Confirming the status of the radio waves" on page 97 Check with your Network Administrator if you have a right of access to the network to be connected with. Check the protocol, work group name or shared setting. For the method of checking, refer to the following pages: Windows XP:
"Connection to the Network" on page 95. If the setting of [Network authentication (shared mode)] is not matched with that of access point or computer to be connected with, no commu-
nication can be established. Check the parameter setting.Refer to
"Assigning parameters" on page 93. Change the switch position to On. 100 T Series.book Page 101 Thursday, July 31, 2003 10:49 AM W I r e l e s s L A N U s e r s G u i d e Problem Possible Cause Possible Solution Unavailable network connection
(continued) It takes too long to retrieve the network and display the connected computers. Retrieve computers as follow:
1. Click [Start] button, then click [Search]. 2. Click [Computers or people]. 3. Click [Computers on the network]. 4. Input the name of computer to be connected with in [Computer name] and click [Search]. 5. Double-click the icon of connected computer. Incorrect setting of IP address Check the network setting.
"Setting the network" on page 95. In case of using TCP/IP protocol, you can check IP address as follows:
1. Click [Start] -> [All programs] -> [Accessories] ->
[Command prompt]. In [Command prompt] or [MS-DOS prompt] window, input
[IPCONFIG] command as follows, then press [Enter] key. Example: In case of C drive being the hard disk:
C:\ipconfig [Enter]
Check that the IP address is correctly displayed:. IP Address................: 10.0.1.3 Subnet Mask.............: 255.255.255.0 Default Gateway.........: 10.0.1.1 When IP address is displayed as [169.254.XXX.YYY] or [0.0.0.0], IP address is not correctly fetched from the access point. In that case, restart the computer itself. If the display is still unchanged, check the setting of TCP/IP. If [Cable Disconnected] or [Media Disconnected] is displayed without showing IP address, check the setting of network name
(SSID) and network key. Also, set the network authentication according to the access point. Communication is disconnected soon after connection to the access point Access control may be disabled In case of Windows XP, check the setting of "Enable network access control using IEEE 802.11X".Refer to "Assigning parameters" on page 93. When restricting the access of wireless LAN clients using IEEE 802.11X authentication, put a check mark on "Enable network access control using IEEE 802.11X". When using at home, remove a check mark on "Enable network access control using IEEE1802.11X". For the method of setting related with IEEE 802.11X authentication, refer to the access point manual. 101 T Series.book Page 102 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x IP address information ABOUT IP ADDRESSES If IP address is unknown, set IP address as follows:
If you have an access point (DHCP server) on the network, set the IP address as follows:
[Obtain an IP address automatically]
A DHCP server is a server that automatically assigns IP addresses to computers or other devices in the network. There is no DHCP server for the AdHoc network. If the IP address is already assigned to the computer in the network, ask the network administrator to check the IP address to be set for the computer. If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255. Set the each computer as follows: The value in paren-
theses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0) Computer B: 192.168.100.3 (255.255.255.0) Computer C: 192.168.100.4 (255.255.255.0)
Computer X: 192.168.100.254 (255.255.255.0) 102 T Series.book Page 103 Thursday, July 31, 2003 10:49 AM W I r e l e s s L A N U s e r s G u i d e Specifications Item Wireless LAN Specifications Type of network Transfer rate Operating Frequencies Number of channels Security Intel PROSet WLAN: Conforms to IEEE 802.11b (Wi-Fi based)*
Broadcom WLAN: Conforms to IEEE 802.11g and 802.11b
(Wi-Fi based)*
(Automatic switching) 2.4 ~ 2.497 GHz 11 channels, 3 non-overlapping channels Network name (SSID) Network key (64 bits/128 bits)**
Intel PROSet WLAN: Supports Wi-Fi Protected Access
(WPA) and CCX Broadcom WLAN: Supports Wi-Fi Protected Access (WPA) Data Rates IEEE 802.11b: 11/ 5.5 / 2 / 1 Mbps IEEE 802.11g: 54 / 48 / 36 / 24 / 18 / 12 / 9 / 6 Mbps RF Output Power:
Intel PROSet WLAN:
Broadcom WLAN:
Maximum recommended number of computers to be connected over wireless LAN (during ad hoc connection) 16 dBm Typical 15dBm Maximum 10 units or less ***
* "Wi-Fi based" indicates that the interconnectivity test of the organization which guarantees the interconnectivity of wireless LAN (Wi-Fi Alliance) has been passed.
** Encryption with network key (WEP) is performed using the above number of bits, however, users can set 40 bits/
104 bits after subtracting the fixed length of 24 bits.
*** Depending on practical environments, the allowable number of computers to be connected may be decreased. 103 T Series.book Page 104 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - A p p e n d i x 104 T Series.book Page 105 Thursday, July 31, 2003 10:49 AM Index A AC adapter . 33, 81 indicator . 15 plug adapters . 67 ACPI . 81 Active-Matrix Display . 81 ADSL . 81 Anti-theft Lock Slot . 12 Auto/Airline Adapter . 33, 81 B Battery . 41 alarm . 41 care . 68 charging indicator . 16 cold-swapping . 42 compartment . 14 conserving power . 36 dead . 57 faulty . 57 increasing life . 68 level indicators . 15 lithium ion battery . 41, 83 low . 41 problems . 57, 58 recharging . 41 replacing . 42 shorted . 42 suspend mode . 41 warm-swapping . 42 Battery Release Latch . 9 BIOS . 81 guide . 34 setup utility . 34 Boot . 81 Boot Sequence . 34 Built-in Microphone . 13 Button Icons . 21 C Cache Memory . 81 CapsLock Indicator . 16 CardBus . 81 CD-ROM . 81 care . 69 Changing Tablet PC Button Functions . 22 I n d e x Channels . 81 Closed Cover Switch . 10 CMOS RAM . 81 Configuration Label . 14 Conventions used . 3 CRT . 81 Cursor Keys . 20 D DC in Connector . 9 DC Output Cable . 33 DC Power Jack . 13, 33 Default Value . 81 Device Ports . 48 DIMM . 43, 82 DISE . 63 Display Panel . 10 brightness . 18 opening . 17 problems . 59 Display Panel Latch . 10 Display Timeout . 37 DMA . 82 DMI . 82 DNS . 82 Docking Port . 48 Drive Image Special Edition (DISE) . 63 Drivers and Application Restore CD . 64 E ECP . 82 Encryption Key (Network Key) . 82 Enlarging the Backup Partition . 64 Error Messages . 61 ESD . 82 Extended Memory . 82 External Monitor Port . 13, 49 F Floppy Disk care . 68 Function Key F10 . 20 F3 . 20 105 T Series.book Page 106 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - I n d e x F4 . 20 F5 . 20 F6 . 20 F7 . 20 F8 . 20 F9 . 20 FN . 20 Fn . 20 H Hard Disk Drive access indicator . 16 problems . 54 Hard Disk Timeout . 37 Headphone Jack . 9, 11, 49 Hibernate Mode . 37 Hibernation Feature . 37 I IDE . 82 IEEE 1394 . 83 Infrared Port . 13, 48 Internal LAN Jack . 48 IrDA . 9, 48, 83 IRQ . 83 K Keyboard . 10, 19 cursor keys . 19 numeric keypad . 19 problems . 54 windows keys . 19 L LAN (RJ-45) Jack . 13 LifeBook Security Application Panel operating . 23 passwords . 22 uninstalling . 24 LifeBook Security/Tablet PC Buttons . 10, 21 LifeBook T Series Tablet PC specifications additional . 74 agency approval . 74 display specifications . 73 environmental . 74 physical specifications . 73, 74 power . 74 LifeBook Tablet PC unpacking . 7 Local Area Network (LAN) . 9 106 M Memory capacity . 44 compartment . 14, 43 installing . 43 problems . 55 removing . 43 upgrade module . 43 Microphone Jack . 9, 11, 49 Microprocessor . 73 MIDI . 84 Modem . 9, 12 Modem (RJ-11) Port . 12, 48 Modem Result Codes . 62 Mouse problems . 54 See Touchpad MPU-401 . 84 N NTSC . 84 Numeric Keypad . 19 NumLk Indicator . 16 O optional accessories . 8 Additional Accessories . 8 additional accessories . 8 carrying cases . 8 docking options . 8 memory . 8 power options . 8 storage options . 8 P Parallel Port . 84 PC Card care . 69 installing . 45 problems . 56 removing . 45 slot . 9, 11 PCI . 84 PCMCIA . 84 Pen. 10 calibrating the pen . 27 replacing the tip . 28 using the pen . 27 Pen and Active Digitizer . 27 T Series.book Page 107 Thursday, July 31, 2003 10:49 AM Port Replicator . 46 attaching . 47 connector . 14 detaching . 47 problems . 54 POST . 84 Power AC adapter . 33 Auto/Airline adapter . 33 failure . 56, 57 indicator . 15 management . 36 off . 38 on . 34 problems . 58 sources . 33 Power Management . 36, 37 Power On Self Test . 34, 61 Preparation for wireless LAN connection . 93 R Registration . 35 Re-Installing Individual Drivers and Applications . 64 Restarting the system . 37 Restoring a Backup Image . 64 Restoring Your Pre-installed Software . 63 RJ-11 . 48 RJ-45 . 9, 48 Rotation Hinge . 10 S ScrLk Indicator . 16 SDRAM . 14, 43 Security Indicator . 16 Security Lock Slot . 9 Serial Port . 85 Setting Up LifeBook Security Panel . 22 Shut Down . 38 SMART . 85 Smart Card Reader . 45 Specifications . 73 SRAM . 85 SSID . 85 Standby Mode . 37 Status Indicator Panel . 10, 15 Suspend . 36, 85 Suspend/Resume Button . 9, 12, 36 S-Video . 86 I n d e x T Tablet Dock Port . 9 Tablet PC care . 67 storing . 67 traveling . 67 TCP/IP . 86 Touch Screen clicking . 28 double-clicking . 28 Touchpad clicking . 10, 25 control adjustment . 26 double-clicking . 25 dragging . 26 Troubleshooting . 53 battery . 57 built-in Speakers . 54 hard drive . 54 memory . 55 mouse/keyboard . 54 PC Card . 56 port replicator . 54 ports . 56 power . 56 video . 59 U Universal Serial Bus Port . 48 USB . 48 problems . 56 USB Port . 9, 13 Using the Active Digitizer . 28 Using the System as a Tablet . 17 V Volume Control . 29 W Warm-swap . 42 WFM . 86 Wi-Fi Compatible . 86 Windows end user license agreement . 35 Windows keys . 19 Application key . 19 Start key . 19 Wireless LAN Ad Hoc Mode . 90 before using the wireless LAN . 90 Broadcom wireless LAN . 90 107 T Series.book Page 108 Thursday, July 31, 2003 10:49 AM L i f e B o o k T S e r i e s T a b l e t P C - I n d e x connection using Windows XP . 93 for better communications . 91 Infrastructure Mode . 90 Intel PROSet wireless LAN . 90 IP address information . 102 other settings . 99 setting of power-saving function . 99 specifications . 103 starting transmission . 92 stopping transmission . 92 troubleshooting . 100 Wireless LAN On-Off Switch . 9, 13 WLAN . 86 108
1 | EUT User Manual | Users Manual | 498.31 KiB |
FCC ID: EJE-WL0001 (IC: 337J-WL0001) Report No. M030725_Certification_Mace_Calexico EMC Technologies Pty Ltd - Report No. M030725_Certification_Mace_Calexico APPENDIX J USER MANUAL (SUPPLIED TO ALL END USERS) EMC Technologies Pty Ltd. 57 Assembly Drive, Tullamarine VIC 3043 Australia www.emctech.com Intel(R) PRO/Wireless LAN Mini PCI Adapter User's Guide This document provides information for the following wireless devices:
Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter, operating at 2.4 GHz These wireless adapters operate with high-capacity networks using multiple access points within large or small environments. Using the Intel(R) PROSet Windows utility you can configure, manage wireless local area network (WLAN) management tasks, adapter switching functions, and connections. Wireless LAN General Information 1.About Wireless LAN Technology Adapter Setup and Configuration 2.Software Installation 3.Using Intel(R) PROSet 4.Connecting to a Network using Intel PROSet 5.Security Overview 6.Setting Up WEP Encryption and Authentication 7.Troubleshooting 8.Specifications 9.Glossary Support and Warranty 10.Customer Support 11.Software License 12.Safety and Regulatory Notices 13.Limited Warranty 14.Legal Notices Copyright (c) 2003 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein. Intel, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
*Other names and brands may be claimed as the property of others. 1.About Wireless LAN Technology A wireless network connects computers without using network cables. Computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point. When you set up your wireless adapter, you select the operating mode for the kind of wireless network you want. You can use your Intel(R) PRO/Wireless adapter to connect to other similar wireless devices that comply with the 802.11 standard for wireless networking. Choosing a Wireless LAN Mode Wireless LANs can operate with or without access points, depending on the number of users in the network. Infrastructure mode uses access points to allow wireless computers to send and receive information. Wireless computers transmit to the access point, the access point receives the information and rebroadcasts it to other computers. The access point can also connect to a wired network or to the Internet. Multiple access points can work together to provide coverage over a wide area. Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless LAN There are three basic components that must be configured for a wireless LAN to operate properly:
Network NameEach wireless network uses a unique Network Name to identify the network. This name is called the Service Set Identifier (SSID). When you set up your wireless adapter, you specify the SSID. If you want to connect to an existing network, you must use the name for that network. If you are setting up your own network you can make up your own name and use it on each computer. The name can be up to 32 characters long and contain letters and numbers. ProfilesWhen you set up your computer to access a wireless network, Intel(R) PROSet creates a profile for the wireless settings that you specify. If you want to connect to another network, you can scan for existing networks and make a temporary connection, or create a new profile for that network. After you create profiles, your computer will automatically connect when you change locations. SecurityThe 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data. If you are connecting to an existing network, use the encryption key provided by the administrator of the wireless network. If you are setting up your own network you can make up your own key and use it on each computer. Identifying a Wireless Network Depending on the size and components of a wireless LAN, there are many ways to identify a wireless LAN:
The Network Name or Service Set Identifier (SSID)Identifies a wireless network. All wireless devices on the network must use the same SSID. Extended Service Set Identifier (ESSID)A special case of SSID used to identify a wireless network that includes access points. Independent Basic Service Set Identifier (IBSSID)A special case of SSID used to identify a network of wireless computers configured to communicate directly with one another without using an access point. Basic Service Set Identifier (BSSID)A unique identifier for each wireless device. The BSSID is the Ethernet MAC address of the device. Broadcast SSIDAn access point can respond to computers sending probe packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network. It greatly reduces the amount of troubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing. To conduct a site survey, you will need the following tools:
An access point (or laptop computer) that is set up to be the transmitter. It should be mounted near and at the same height as the designated location of your wireless LAN. A laptop that will act as the mobile receiver. It must contain your site survey software. An area or building map, which will be used to plot the strength of your signals. Once you have the tools you need, you are ready to survey the inside of the building. Launch the site survey software on the mobile receiver laptop and carry it around in the intended wireless LAN area to test the signal strength. Be sure to also check the signal strength of each intended access point location. If you encounter problems while surveying the site, make sure your transmitter laptop is not located on a wall containing metal, such as an air-conditioning duct, which will interfere with the range of your signal. Simply move the transmitter and test the signal strength again. For users to have seamless coverage when moving from access point to access point, the signal levels at each point must overlap. There is software available that will seamlessly hand off changing signal levels from one access point to another. Your building's infrastructure can sometimes interfere with the microwave signal, but finding the location and cause of the interference will allow you to figure out the best place to mount your access points for optimal area coverage. Microwave signals travel in all directions, which means there is one access point for a multi-floor building. However, the range is highly dependent on the material used to construct the flooring, especially metal materials. Once your signal strength is strong inside the building, you are ready to check the strength outside the building. To do so, simply carry the mobile receiver laptop as far down the street or around the building as you can go without losing significant signal strength. If possible, you should be aware of the types of networks being used by the companies on the floors above and below you, so that you can work together in harmony. With wireless networks, security is very important and if you communicate with those around you, you are better prepared to select the right channels, as well as the best location for access points. Factors Affecting Range Although access points can transmit signals up to 60 feet away in an area with many walled barriers or as much as 500 feet away in a large open area, the range is affected by the following factors:
Building materials, such as steel and drywall, can shorten the range of the radio signals. Physical layout of the area can interfere with the signals and cause them to be dropped. Electronic noise from cell phones, microwave ovens, or other devices on the same frequency can interfere with the transmission of the signals. Range is inversely proportional to data rate, so the faster that the signals are sent, the less distance they will travel. Taking these factors into consideration when you survey the site for your WLAN is key to providing all of your users with undisturbed mobile connectivity. Using multiple access points will, of course, reduce the impact of these factors if your area has dividing walls throughout. Stronger Security Although wireless networks are easy to use, the main issue lies with security. Even if you enable the security settings defined in the 802.11b standard, as well as the security settings of your hardware, your network is still vulnerable. There are a few things you can do to make it more difficult for outsiders to access your network:
Change the default network name of your WLAN. Every manufacturer's default settings are public knowledge. Do not allow the name of your network to be broadcasted by your access points. This makes it more difficult for hackers to identify your network. Enable Wired Equivalent Privacy (WEP) encryption, which is the same security feature used by online shopping websites. Change your encryption keys as often as possible. Temporal Key Integrity Protocol
(TKIP), which is being developed by a IEEE task group, will change the keys automatically. Enable MAC address filtering so that each access point can generate a list of approved MAC addresses for your WLAN. If you have a small network, use virtual private network encryption for additional security. If you have a large network, you may want to install a gateway between your access points and network clients. 2.Software Installation Installing Drivers and Intel(R) PROSet Software See the instructions for your operating system:
-Installation under Windows XP Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINXP on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Before proceeding, make sure that you are operating Windows XP with administrative rights. If you log in to Windows XP without administrative rights, you may run into problems during the installation. The Intel(R) PROSet utility or the Windows XP wireless configuration feature can be used to configure wireless network settings. The instructions below include steps for installing the Intel(R) PROSet utility and for turning off the Windows XP configuration feature. If you do not turn off the Windows XP feature, you will not be able to use Intel(R) PROSet to configure wireless network settings. For information on how to use the Windows XP feature, see your Windows XP documentation. Driver Installation To install drivers under Windows* XP, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights if prompted by Windows XP. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. Verify that Install the software automatically
(Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive. The New Hardware Found Wizard searches for the correct driver files and copies them to your hard drive. 5. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 6. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 7. On the Found New Hardware Wizard screen, click Finish. Proceed to disable the Windows XP wireless configuration feature. Disable Windows XP Wireless Configuration (Required) To disable the Windows XP wireless configuration feature so that you can use Intel(R) PROSet for wireless configuration, continue as follows:
Instructions are written for use with the Windows XP Start Menu and Control Panel Category View, not with "Classic" Start Menu or Control Panel views. 8. Click Start and Control Panel. 9. On the Pick a category screen, click Network and Internet Connections, then under the heading or pick a Control Panel icon click Network Connections. 10. In the Network Connections window, right-click your Wireless Network Connection and select Properties. 11. Select the Wireless Networks tab. 12. Click to clear ("deselect") the check box Use Windows to configure my wireless network settings, then click OK on the Wireless Network tab. Do not click any other tabs. Continue with the installation of Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility
(required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 15. 13. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless LAN Adapters. 14. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 15. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 16. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 17. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 18. On the Ready to Install the Program screen click Install. 19. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen or leave it open if you wish to install Wireless Administration Tools. 20. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 21 and 22 below and continue with Step 23. 21. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 22. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 23. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 24. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 25. On the Setup Type screen, verify that Typical is selected, then click Next. 26. On the Ready to Install the Program screen click Install. 27. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 28. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WIN2K on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. After loading the Windows 2000 operating system, be sure to log in with administrative rights. If you log in to Windows 2000 without administrative rights, you may run into problems during the installation. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Driver Installation To install driver software in Windows* 2000, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights when prompted by Windows 2000. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD-ROM into your CD-ROM drive. If the Intel(R) PRO Network Connections menu screen appears, leave it open and click the Found New Hardware Wizard dialog to make that the active window. 5. On the Install Hardware Device Drivers screen verify that Search for a suitable driver for my device (recommended) is selected, then click Next. 6. When the Locate Driver Files dialog appears, verify that the item CD-ROM drives is checked and click Next. 7. When the Driver Files Search Results dialog appears, indicating that a driver was found, click Next. 8. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 9. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 10. On the Found New Hardware Wizard screen, click Finish. Proceed to install Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility
(required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 11 and 12 below and continue with Step 13. 11. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. This screen may have been launched in step 4 above. If the screen is not visible when you close the Found New Hardware Wizard dialog, display it by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 12. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 13. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 14. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 15. On the Setup Type screen, verify that Typical is selected, then click Next. This is the recommended setting for a first-time installation. 16. On the Ready to Install the Program screen click Install. 17. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen or leave it open if you wish to install Wireless Administration Tools. 18. To launch Intel(R) Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Administration Tools Installation (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 19 and 20 below and continue with Step 21. 19. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. This screen may have been launched in step 4 above. If the screen is not visible when you close the Found New Hardware Wizard dialog, display it by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 20. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 21. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 22. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 23. On the Setup Type screen, verify that Typical is selected, then click Next. 24. On the Ready to Install the Program screen click Install. 25. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 26. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows NT 4.0 Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in the computer in which the Mini PCI Adapter hardware has been installed. Install Network Drivers for Windows* NT* 4.0 NOTE: Before installing drivers, install Service Pack 6 or later. Advanced features for Intel adapters require Service Pack 6a or later. NOTE: Use the following information if NT Networking has already been installed on the PC. If NT Networking is not installed, please refer to your Windows NT documentation or consult your network administrator for instructions. Also refer to your Windows NT documentation for information about installing the TCP/IP protocol. 1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows NT to start, then log in as administrator. 3. Insert the Intel CD into your CD-ROM drive. If the Intel(R) PRO Network Connections screen displays, you may disregard it or close it (you will redisplay it later to install Intel(R) PROSet II). 4. Click Start, Settings, Control Panel, then double-click the Network icon. 5. When the Networking dialog appears, select the Adapters tab and click the Add button. 6. Click the Have Disk button after the available network adapters display. 7. Enter the path D:\PROW2100\WINNT4\ (where D: is your CD-ROM drive) and click OK. 8. Select Intel(R) PRO/Wireless 2100 Mini PCI Adapter from the list of supported adapters and click OK. 9. If prompted for additional Windows NT files, re-enter the path to your CD drive (for example, D:\). 10. The Adapter Properties dialog displays. Click the Configure button. 11. On the Wireless Network tab, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click OK to continue. (Default setting under the Advanced button is no security; consult your network administrator if security is required.) 12. Click Close. 13. Enter TCP/IP settings for your network and click OK. 14. When prompted to restart the computer, remove the CD-ROM and click Yes. 15. After the computer has restarted, double-click the Network Neighborhood icon on your desktop. Make sure that you have access to the network. If you can log on your adapter has been properly installed. 16. Proceed to Install Intel(R) PROSet II. Install Intel(R) PROSet II (Required) Intel Intel(R) PROSet II enables you to test and configure Intel network adapters on computers running Windows* NT with Service Pack 5 or later. For details about installing Intel Intel(R) PROSet II, see the instructions below. When you run the Intel(R) PROSet Installer, it checks to see if a previously installed version of Intel(R) PROSet exists on your computer. If another installation is detected, you will be asked to remove it before proceeding with the installation of Intel(R) PROSet II. Use Add/Remove Programs in the Control Panel to find and remove any previous versions of Intel(R) PROSet software. Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of Intel(R) PROSet II. If the Intel(R) PRO Network Connections menu screen does not appear when you insert the Intel CD, or if it appears but does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet II installer manually using Start > Run and browsing to the file WSetup.exe in the path APPS\PROSet\WINNT4 on the Intel CD. Then skip to Step 4 below and continue with the installation. 1. Insert the Intel CD into your CD-ROM drive. The Intel(R) PRO Network Connections screen displays. (If it doesn't display, use Start, Run and launch the file autorun.exe from the Intel CD.) 2. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. 3. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 4. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 5. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 6. On the Setup Type screen, verify that Typical is selected, then click Next. This is the recommended setting for a first-time installation. Click Custom if you wish to install Intel(R) PROSet in a nondefault location. 7. On the Ready to Install the Program screen click Install. 8. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen, if displayed. 9. To launch Intel(R) PROSet II, double-click the Intel(R) PROSet II icon in the system tray or in the Control Panel. For additional information, press F1 or click Help while the program is running. 10. Restart the computer if prompted. Install Administration Tools (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
1. Insert the Intel CD into your CD-ROM drive. The Intel(R) PRO Network Connections screen displays. (If it doesn't display, use Start, Run and launch the file autorun.exe from the Intel CD.) 2. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. 3. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 4. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 5. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 6. On the Setup Type screen, verify that Typical is selected, then click Next. 7. On the Ready to Install the Program screen click Install. 8. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 9. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows Me Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINSE-ME on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Driver Installation To install the software in Windows* Me (Millennium Edition), follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows to detect the newly installed hardware and display the Add New Hardware Wizard dialog. DO NOT click Next. Verify that Automatic search for a better driver (Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 3. Insert the Intel CD into your CD drive. Windows installs the driver from the CD. If the installation does not start automatically, click Next on the Add New Hardware Wizard screen. 4. On the Network Name screen, click Next to accept the default Network Name (SSID) 101, or enter a specific SSID for your network, then click Next. 5. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 6. Click Finish on the Add New Hardware Wizard screen when the driver installation is complete. 7. When prompted to restart the computer, click No. You will restart it manually later. Proceed to install Intel(R) PROSet. Intel(R) PROSet Installation (Required) To install the Intel(R) PROSet utility, continue with the following steps:
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 8 and 9 below and continue with Step 10. 8. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless Adapters. 9. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 10. On the Welcome to the InstallShield Wizard for Intel(R) PROSet II screen, click Next. 11. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 12. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 13. On the Ready to Install the Program screen click Install. 14. After the software is installed on your computer, click Finish. 15. When prompted to restart the computer, click Yes. 16. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) After restarting the computer, continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 17 and 18 below and continue with Step 19. 17. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 18. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 19. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 20. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 21. On the Setup Type screen, verify that Typical is selected, then click Next. 22. On the Ready to Install the Program screen click Install. 23. After the software is installed on your computer, click Finish. 24. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows 98SE Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in the computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINSE-ME on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Driver Installation To install the software in Windows* 98SE, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows to detect the newly installed hardware and display the Add New Hardware Wizard dialog. Click Next. If Windows does not detect the new hardware, see Troubleshooting. 3. Insert the Intel CD into your CD drive. 4. On the New Hardware Wizard screen, select Search for the best driver for you device (Recommended), and click Next, then select CD drive and click Next. 5. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 6. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 7. On the Add New Hardware Wizard screen, click Finish. 8. When prompted to restart the computer, click No. You will restart it manually later. Proceed to the installation of Intel(R) PROSet. Intel(R) PROSet Installation (Required) To install the Intel(R) PROSet utility, continue with the following steps:
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 9 and 10 below and continue with Step 11. 9. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless Adapters. 10. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 11. On the Welcome to the InstallShield Wizard for Intel(R) PROSet II screen, click Next. 12. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 13. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 14. On the Ready to Install the Program screen click Install. 15. After the software is installed on your computer, click Finish. 16. When prompted to restart the computer, click Yes. 17. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) After restarting the computer, continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 18 and 19 below and continue with Step 20. 18. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 19. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 20. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 21. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 22. On the Setup Type screen, verify that Typical is selected, then click Next. 23. On the Ready to Install the Program screen click Install. 24. After the software is installed on your computer, click Finish. 25. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running. 3.Using Wireless Profiles in Intel(R) PROSet A profile is a saved group of network settings. Profiles are displayed in the Profile List in the Intel(R) PROSet General page. Profiles can be arranged in order of network connection priority. You can connect to one network using the first profile in the Profile List, then automatically connect to another network using the next profile. This allows you to stay connected while roaming freely from one wireless network to another. Although you can assign multiple profiles to a single network, you can only use one profile per connection. Profile general settings include, the network name (SSID), channel, security settings, and TCP/IP settings. The Networks tab allows you to add, edit and delete profiles. Creating a New Profile To add a new profile, use the Profile Wizard sequence of dialogs to configure the profile contents. The following example uses all of the Profile Wizard dialogs. Some settings may not be required for all profiles. To create a new profile and connect to a network:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Add button. The General Settings dialog displays. NOTE: If this is the first time you have created a profile, click the profile named Default in the Profile List, click the Edit button and rename the default profile in the Profile Name field on the General page. Step 1 of 4: General Settings 4. Enter a profile name in the Profile Name field. 5. Enter the network SSID, in the Network Name (SSID) field. 6. Click the operating mode to use, Infrastructure or Ad hoc. 7. The Mandatory AP option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8. Click the Configure TCP/IP and VPN settings checkbox to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked, proceed to step 9. 9. Check the Enable Auto-Import check box to allow this profile to be imported. Refer to Automatic Profile Distribution for more information. 10. Click Next. Step 2 of 4: TCP/IP and VPN Client Settings 11. Use these options to configure TCP/IP and VPN settings for a VPN profile. Click Next when finished. Step 3 of 4: Security Settings 12. Select Open or Shared in the Network Authentication drop-down menu. Open, does not use any authentication method. Shared uses the WEP key as the authentication method. 13. Click the Enable data encryption (WEP) checkbox to configure WEP encryption settings. 14. Click the Password protect this profile checkbox to assign a password to the profile. 15. Click Next. Step 4 of 4: Password Protection Settings 16. Click the Password protect this profile checkbox. 17. Enter a password in the Password field. 18. Reenter the same password in the Confirm New Password field. 19. Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page. 20. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list. 21. Click the Advanced button to set the network connection preferences. 22. Click the Connect button to connect to the network. 23. Click OK to close the Intel(R) PROSet dialog. Creating a VPN Profile To create a VPN profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Select the profile to add VPN settings to from the Profile List. 4. Click the Edit button and the General page appears. 5. Click the Network tab. 6. Click the Configure button for the TCP/IP Settings. Make sure that Obtain an IP address automatically and Obtain DNS address automatically is selected. 7. Click the Close button to close the dialog. 8. Click the Configure button for the VPN Client Settings. 9. Click Enable VPN for this profile checkbox. 10. Select the VPN client software from the Available VPN Clients drop-down menu. 11. Select the VPN profile if your VPN client software displays the VPN tunnel name. 12. Click the Close button to close the dialog. 13. Click OK on any of the pages to save all the settings and return to the Networks page. 14. Click the VPN profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 15. Click the Connect button to connect to the network. The VPN profile name displays a connect icon. Note: There must be an IP address assigned before the VPN client software can be launched. Click the Details button to verify that an IP address has been assigned. 16. Follow the on-screen instructions and enter your credentials before connecting. 17. Click OK to close the Intel(R) PROSet dialog. Importing and Exporting Profiles Note: A password protected profile can be imported and exported, however, before editing the profile, the password must be entered. To import profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the Import/Export button. 4. Click the Import button. 5. Locate the profile to import on your hard disk or enter the profile name in the File name field. The profile extension is .profile. 6. Click the Import to import the profile into the Profile List. 7. Click OK twice to return to the General page. 8. Click OK to close the Intel(R) PROSet dialog. To export profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the profiles to export from the export profile list. 4. Click the Browse button and select a directory to save the profiles in. Click OK to return to the previous dialog. 5. Click the Export button to start exporting the profiles. 6. Click OK twice to return to the General dialog. 7. Click OK to close the Intel(R) PROSet dialog. Automatic Profile Distribution The Enable Auto-Import feature allows a network administrator to distribute a profile automatically to computers connected to a network. The Enable Auto-Import box is located on the Profile Wizard dialogs. When the checkbox is checked the profile must be copied to a specific directory on the host computer, from there it can be distributed to multiple computers. Once the profile is received by the remote computer it will automatically be available for use from the Scan profile list. If an attempt is made to edit a distributed profile that is password protected, a password prompt will appear. Automatically importing WLAN profiles is accomplished by monitoring the import folder on your hard disk for new profile files. Only profiles that have the Enable Auto-Import checked on the Profile Wizard dialog can be automatically imported. If a profile of the same name already exists in the Profile List, a dialog is displayed from which you can either reject the import, or accept in which case the existing profile will be replaced. All imported profiles will be placed at the bottom of the Profile List, and the profile file will be immediately deleted after the import whether the import was successful or not. To distribute a profile to other computers on a network:
1. Select a profile to be edited from the Profile List in the Networks page, and click the Edit button or click the Add button to create a new profile using the Profile Wizard. 2. Check the Enable Auto-Import checkbox on the General page. 3. Click OK (Edit a profile) or Finish (Add a profile) to save the setting. 4. Copy the profile to the Programs Files/Intel/PROSet/Import directory. The profile is now ready to distribute to other computers. Editing an Existing Profile To edit an existing profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Edit button. The General page displays. 4. Click on the General, Security, Network and Password tabs to make the necessary changes for the network profile settings:
5. Click OK on any of the pages to save all the settings and return to the Networks page. 6. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 7. Click the Advanced button to set the network connection preferences. 8. Click the Connect button to connect to the network. 9. Click OK to close the Intel(R) PROSet dialog. Deleting a Profile To delete a profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the profile to be deleted from the Profile List. 4. Click the Delete button. 5. Click Yes to permanently delete the profile. Connecting to a Network without a Profile To connect to an available network without a profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Scan button. 4. Select the network profile name with <no profile> shown, and click the Connect button. 5. Click the No, connect me directly without creating a profile option. Note, you can click Yes, create a profile for this network now to create a profile to be used later. 6. Click OK to connect. Connecting to a Network if a Blank SSID displays If the wireless adapter receives a blank network name (SSID) from a stealth access point, both the blank SSID and <no profile> display in the available networks list. To associate with a stealth access point, a new profile must first be created before connection. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. To connect to an access point that transmits a blank network name (SSID) in the Available Networks list:
1. From the General page, click the Networks tab. 2. Click the Scan button. 3. Select the network name with a blank SSID and <no profile> shown in the Available Networks list. 4. Click the Connect button. 5. Click the Yes, create a profile for this network now option. 6. The Profile Wizard dialog displays. Enter a profile name and Network Name (SSID) and security settings if required. Click Finish to save the profile settings and return to the Networks page. 7. Select the new profile from the profile list and click Connect. Profile Connection Preferences To access the profile connection preference option:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options:
Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network. Connect to any available network if no matching profile is found: Connect to any available network without using a profile from the Profile List. 4. Click OK to save the setting and return to the previous dialog. Loading a Profile from the Task Tray To load a profile from the Task Tray:
1. Right-click Intel(R) PROSet icon in the task tray. 2. Select the Intel PRO/Wireless LAN 7100 3B Mini PCI Adapter or the Intel PRO/Wireless LAN 2100 3B Mini PCI Adapter. 3. Click Select Profile and select the profile to be launched. 4.Connecting to a Network using Intel(R) PROSet Connecting to a Network Automatically The Configuration Service feature operates in background to automatically display available networks not listed in the Profile List. This method provides automatic connection in a 2.4 or 5GHz environment to available networks in the range of your wireless adapter. The Configuration Service constantly monitors your wireless adapter's connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter. The Configuration Service can also be used if there is more than one wireless adapter installed using 802.11a and 802.11b bands. The Configuration Service features:
The Configuration Service is launched when you log on to your computer. No active profile switching will be performed. Once the adapter is associated with the access point, if a higher priority profile becomes available, no switching will occur. The Configuration Service is only be available if the Intel(R) PROSet is installed. If a connection to an access point cannot be made using any of the profiles in the Profile List, a dialog will display the available networks. If there are multiple profiles listed for an available network, a dialog box will list the profiles for you to choose from. If an available network is detected with WEP encryption and authentication, a dialog for setting up WEP encryption displays before the connection is made. The Configuration Service can be used in two ways:
1. Connect to available network using profiles only: In this mode the Configuration Service attempts to connect to a network access point using profiles from the Profile List only. If no matching profile is found, a dialog appears that lists the available networks. You can also close this dialog without connecting by clicking the Cancel button. The adapter will remain unassociated, and the list of available networks will NOT be displayed again unless another available network is detected. This mode is set in the Advanced Setting options. 2. Connect to any available network if no matching profile found: In this mode the Configuration Service attempts to connect to a network access point first using profiles from the Profile List. If no matching profile is found, the Configuration Service automatically connects to any available network. This mode is set in the Advanced Setting options. Enabling Automatic Connection The Configuration Service also monitors for the "resume status" after a laptop computer suspend event. When this occurs, the Configuration Service will re-enable the automatic connection service. These features can be enabled again after rebooting your computer or after a suspend and resume cycle. Enable profile management features: Check this setting in the Advanced Settings options to manually re-enable the Configuration Service profile management features after being disabled from the notification dialog when another profile management application is detected. This option can only be used to re-enable the Configuration Service features, it cannot be used to manually disable the Configuration Service features. Refer to Profile Switching for more information. Profile Management Options The following Profile Management options can be found in Advanced Settings. Display available networks when not associated: If no networks are available that match any profiles in the Profile List, the Configuration Service dialog is displayed, listing the available networks. By checking "Dont show this again" option, the dialog listing the available networks will not be displayed again, if the adapter becomes unassociated. The Configuration Service will continue to function and attempt to connect, using a profile from the Profile List, or to an available network depending on the selection mode. This mean that if Connect Using Preferred Profiles Only is selected and no matching profile is found, then the adapter will remain unassociated. You can still use the Connect button from the Networks tab to connect to an available network. The Configuration Service dialog can be re-enabled from the Advanced Settings options. Notify when disabling profile management features: Check this box to display the service disabling notification dialog when another Profile Management service is detected such as Windows XP Zero Configuration or AAA clients. The notification dialog is displayed, indicating that another service has been detected and that some of the Intel(R) PROSet management features will be disabled. From this dialog, you can also choose "Dont show this again," in which case the Intel(R) PROSet features will automatically be disabled without notification. This dialog can be re-enabled from the Advanced Settings options. Features affected when another profile management application is detected For AAA Client:
Select OK, and the AAA Client application will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. To avoid conflicts, the Intel(R) PROSet profile management features have been temporarily disabled. To re-enable these features, first disable the other LAN utility and then either:
1. Re-enable from Intel(R) PROSet's Advanced Settings. 2. Resume after a computer suspend. 3. Reboot the computer. For Windows XP Zero Configuration:
Select Yes, to disable Windows XP Zero Configuration. Intel(R) PROSet will continue to manage the adapter. Select No, Windows XP will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. You can also prevent the dialog from being displayed again, in which case Windows XP Zero Configuration will automatically manage the wireless adapter. The notification dialog can be re-enabled from the Advanced Settings options. Affected Intel(R) PROSet features:
The Connect button on the Profile page is non-functioning. The Scan button can be used to scan for available networks, however, the Connect button is non-functioning when used to connect to an available network. Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is non-
functioning. Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. NOTE: If the buttons described above are used, the following message displays:
"Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features."
Scanning for Available Networks A fast way to connect to a network is to use the Scan button to search for a network access point in range of your wireless adapter. When a network is found, you can instantly connect without a profile or create a new profile. NOTE: Profiles with the Enable Auto-Import feature enabled will also be displayed in the profile list of available networks. Refer to Automatic Profile Distribution for more information. To scan for available networks:
1. From the General page, select the wireless adapter on the left side pane. 2. Select the Networks tab. 3. Click the Scan button. 4. The Available Networks dialog displays the names of the available networks. 5. Select the network from the list, and click the Connect button. Click the Refresh button to refresh the list of available networks. 6. To connect without creating a profile, click No, connect me directly without creating a profile. 7. To create a new profile using the Profile Wizard, click Yes, create a profile for this network now. 8. Click OK to connect to a network. Connecting to a Network Using an Access Point An infrastructure network consists of one or more access points and one or more computers with wireless adapters installed. Each access point must have a wired connection to the Local Area Network (LAN). The following describes how to create a new profile using the Profile Wizard and connect to an access point using the Connect button. You can also connect to a network, by using the Scan button. 1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Add button. 4. Enter the profile name in the text box. 5. Enter a network name (SSID) in the text box. 6. Select Infrastructure for the operating mode. 7. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8. Click the Configure TCP/IP and VPN settings check box and click the Next button to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked and proceed to step 11. 9. Click the Next button to select the WEP security settings. 10. Click the Password protect this profile checkbox and click Next button to access the Password Protection settings. Click Finish after the password information has been entered. If this option is not required, leave the box unchecked and proceed to step 11. 11. Click OK to save the profile settings and return to the Networks page. 12. After creating the new profile, click the profile in the Profile List. Profiles using infrastructure mode are indicated by a computer icon next to the profile name. 13. Click the Connect button to connect to the ad hoc network. Connecting to a Peer-to-Peer (Ad Hoc) Network In peer-to-peer (ad hoc) mode, you can send and receive information to other computers without using an access point. Each computer in a peer-to-peer network is called a peer. To create or join an ad hoc network, enter a personal password. Network related settings
(SSID), operating mode, WEP 128-bit encryption, and IP addresses are automatically created. Once a network connection is established, after permission rights are given by other computers in the ad hoc network, you can freely share files. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. NOTE: While scanning with an ad hoc profile set to a specific transmit channel, if an ad hoc network is found on another channel, you will be connected using the new channel. The new channel number is displayed in the Adapter Settings. Connect or Start an Ad Hoc Network Ad Hoc Profile using the Profile Wizard. NOTE: For information about connecting to an ad hoc using a profile, refer to Create an 1. Connect using an ad hoc profile. Refer to Creating a New Profile for details. Select an ad hoc profile from the Profile List and click the Connect button. This method uses a pre-defined ad hoc profile created by the Profile Wizard. The ad hoc profile is displayed in the Profile List. When joining an ad hoc network, the transmit channel established by the first computer is used. This channel may be different than the one selected when the ad hoc profile was created by the Profile Wizard. 2. Join a one-time ad hoc session without a profile. Refer to Starting an Ad Hoc (peer-to-
peer) Connection below for details. This method does not use a pre-defined profile. To connect to any ad hoc network, use the Scan button to scan for any ad hoc networks, enter the password (SSID), then click the Connect button to connect. To end the session, click the Close button to end the session. Start an Ad Hoc Network Refer to Starting an Ad Hoc (peer-to-peer) Connection below for details. This method uses your computer's SSID to establish the ad hoc network for other users to connect to. When you are the originator of an ad hoc network, all other users must use the channel and SSID. Ending an Ad Hoc Session To end an ad hoc session, click the Close button. After the session is ended, an attempt is made to re-connect to the last profile used from the Profile List. Creating an Ad Hoc Profile Using the Profile Wizard The following describes how to create a new ad hoc profile using the Profile Wizard and connect to an ad hoc network. You can also connect to a network, by using the Scan button. 1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Add button. 4. Enter the profile name in the text box. 5. Enter a network name (SSID) in the text box. 6. Select Ad Hoc for the operating mode. 7. Click the Configure TCP/IP and VPN settings check box and click the Next button to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked and proceed to step 11. 8. Click the Next button to select the WEP security settings. 9. Click the Password protect this profile checkbox and click Next button to access the Password Protection settings. Click Finish after the password information has been entered. If this option is not required, leave the box unchecked and proceed to step 11. 10. Click OK to save the profile settings and return to the Networks page. 11. Set the Transmit channel from the Adapter tab: Channel 7 is the default transmit channel. Unless the other computers in the ad hoc network use a different channel, there is no need to change the default channel. Click the Adapter tab, and click the Configure button under Ad Hoc Channel Selection. Choose the operating band select a channel. Click OK to save the setting. 12. Select the Networks tab 13. After creating the new profile, click the profile in the Profile List. Profiles using infrastructure mode are indicated by a computer icon next to the profile name. 14. Click the Connect button to connect to the ad hoc network. Starting an Ad Hoc (peer-to-peer) Connection To communicate properly, all computers/peers on an ad hoc network must have Intel wireless adapters installed. To connect to an ad hoc network for a one-time session:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Start button. 4. Enter the password (SSID) for your computer in the text box. If you establish the ad hoc network, then this SSID and assigned transmit channel must be used by other users to connect to the ad hoc network. The entered SSID can also be the same as the other users in the established ad hoc network, in this case your computer will join the ad hoc network. 5. To join the ad hoc network, select the peer name from the displayed list of computers in the ad hoc network and click the Connect button 6. To establish an ad hoc network, after your computer's SSID is entered, click the Connect button to scan for other users in the ad hoc network 7. Under Send Files, files can be sent to another computer in the ad hoc network. To send a file, click the Send File button. Locate the file you want to sent, and click Send. 8. Click the Close button to end the ad hoc session. Disconnecting from a Network To disconnect from a network, turn the radio to OFF from the General page in Intel(R) PROSet. Switching the Adapter Off and On The wireless adapter can be switched off and on from the optional hardware radio switch on your laptop computer, Intel(R) PROSet application, and the Windows operating system. Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. Use the following methods if you need to disable the radio and use your laptop without emitting radio signals. Using the optional hardware radio on/off switch If your laptop computer has an optional external hardware switch installed, it can be used to switch the radio on or off. Refer to the laptop manufacturer for more information about this switch. If you have Intel(R) PROSet installed, the current state of the radio is displayed on the General page. Using Intel(R) PROSet to switch the radio on/off From Intel(R) PROSet, the radio can be switched on or off from the General page. The current state of the radio is displayed, which also includes the state of the optional hardware radio switch. Hardware radio switch On/Off Depending on the current state of the external optional hardware switch, displays on or off on the General page. Switching the radio On/Off Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. To switch the radio OFF: From the General page, click the Off button. next to Switch Radio On/Off. The wireless adapter is not associated with the network when the radio is off. Intel(R) PROSet can be used to edit or add profile contents when the radio is off. To switch the radio ON: From the General page, click the On button, next to Switch Radio On/Off. When the radio is on, an attempt will be made to associate with the network access point using the last profile. If the adapter cannot connect to the access point, the Configuration Service will attempt to find an available network. Refer to Configuration Service for more information. Switching the radio on or off from the Task Tray Icon Right-click on the Intel(R) PROSet task tray icon and click Switch radio Off. Using the Windows operating system to switch the radio on/off The radio can be switched on or off via the Windows operating system from the Device Properties dialog. Switching Between Wired and Wireless Adapters Adapter switching enables your computer to automatically switch between wired and the wireless adapter, so your laptop computer can maintain the best possible connection to the network while moving from one location to another. When Adapter Switching is enabled, DHCP is disabled on all other wired adapters except for the adapter currently being used. However, connection is possible using another wired adapter using an auto IP address setting. Adapter switching switches between wired and wireless adapters for the following Intel PRO adapters:
Wired LAN adapters. This type of adapter connects to a network through an Ethernet network cable. Adapter Switching supports adapters in the PRO/100 family, including the PRO/100 Mobile Adapters. Intel PRO/Wireless LAN 7100 3B Mini PCI adapter and the Intel PRO/Wireless LAN 2100 3B Mini PCI adapter. These adapter send data to and from the network through the adapter's antenna. By default, adapter switching uses the wired Ethernet adapter when both wired and wireless adapters are present and working. If you detach the wired adapter, adapter switching automatically switches to the wireless adapter. When you attach an Ethernet cable again, adapter switching automatically switches back to the wired Ethernet connection. You can change your wireless preferences from the Advanced Settings dialog and prioritize your wireless and wired adapters from the Adapter Switching dialog. You can also install multiple wired adapters, or install two wireless adapters if the network supports both 802.11a and 802.11b wireless standards. Then when you detach the wired adapter, your computer uses the wireless adapter that gives the best data rate. Wireless Preferences One or more wired adapter and one or two wireless adapter can be installed in the same computer. Using the adapter switching feature, you can select your priority for a specific type of adapter, wired or wireless. If adapter switching is enabled, the installed adapters are selected from a preference list. To access the network preferences:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Advanced button. 4. Select your preferences from the options shown. 5. Click OK to save the settings and return to the Profiles dialog. Adapter Switching Considerations Consider the following issues when switching adapters:
Adapter switching requires the use of DHCP. It cannot be used with fixed IP addressing. Only Intel wired and wireless adapters are supported when using the Start button to connect to an ad hoc network. Adapter switching cannot be used on a Virtual Private Network (VPN). Adapter switching should not be applied while an active data transfer is in progress. Intel(R) PROSet determines how many wireless adapters are present in the computer. Intel(R) PROSet supports simultaneous wireless adapter operation for the following:
o 2.4 GHz and 5 GHz installed adapters: Supports simultaneous operation in either ad hoc or infrastructure mode. o 2.4 GHz and 2.4 GHz installed adapters: Supports simultaneous operation where one adapter is in ad hoc mode and the other adapter is in infrastructure mode. Simultaneous operation with both adapters in infrastructure or ad hoc mode is not be supported. o The second adapter added is not supported. o 5 GHz and 5 GHz installed adapters: Supports simultaneous operation where one adapter is in ad hoc mode and the other adapter is in infrastructure mode. Simultaneous operation with both adapters in infrastructure mode or ad hoc is not supported. o The second adapter added is not supported. o Maximum of four adapters is supported. Switching Between 2.4 and 5 GHz Bands Intel(R) PROSet supports switching between 802.11a (5 GHz) and 802.11b (2.4 GHz) bands. Using the Advanced Settings options, you can define band priorities. Changing the Settings for Adapter Switching If you have two adapters installed, you can define the adapter to be used first. Adapter priorities can be set in the Adapter Switching dialog. To change the adapter switching settings:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Adapter Switching icon on the left side pane. 3. Click the Adapter Switching checkbox under the Settings heading. 4. Prioritize adapters in the lower adapter display list. Select an adapter in the Adapter Type list and use the up/down arrows on the left side of the dialog to arrange the adapters in priority. The adapter in the highest position is used first. 5. Click the adapter name that you want to use in the upper display list. The current adapter link status displays next to the adapter name. NOTE: One wireless adapter can be used for each band operating at a time. 6. After you have switched to the desired adapter, click OK to close the Adapter Switching dialog and return to the General tab. 5.Security Overview Wireless Security Since wireless networking devices transmit information through radio waves, it is imperative that you protect your information by configuring your security settings. There are three main components that, when used together, can protect your wireless network:
Service Set Identifier (SSID) The name of a device on a network, the SSID is the first level of security, but it is not fool-proof because the access points broadcast the SSIDs across a wireless network. This level of security is okay if you are on a peer-to-peer network without any access points, but for larger networks, more complex security measures should be put in place. Wired Equivalent Privacy (WEP) Supported by the IEEE 802.11 standard, WEP uses 64- or 128-bit encryption keys to encrypt data as it is sent or received by each client on a wireless network. The way these keys are authenticated determines the level of security on your wireless network. Using the default keys, however, makes your wireless network vulnerable and you should not use them. Authentication Server An authentication server works with each client to authenticate access with a session-specific WEP key. This type of server protects sensitive user and password information from intruders. Security Guidelines The following can help to achieve maximum security for your wireless network:
1. Enable WEP on your wireless network and change the WEP key daily or weekly. 2. Protect your drives and folders with passwords. 3. Change the default SSID. 4. Change the WEP key with each session, if possible. 5. Enable MAC address filtering, if possible. 6. Implement a Virtual Private Network (VPN) system to increase security. A VPN client is included in most operating systems. Protecting Your Network Authentication Types The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication protocols. Encryption Keys To protect client traffic, the 802.11 standard defines Wireless Encryption Privacy (WEP) with fixed encryption keys (and three optional key lengths). The use of fixed keys has made it easy to mount several types of attack against WEP. WEP Encryption You can prevent unauthorized reception of your wireless data using the IEEE 802.11 Wired Equivalent Privacy (WEP). The standard includes two levels of security, using a 64-bit key
(sometimes referred to as 40-bit) or a 128-bit key. For better security, use a 128-bit key. If you use encryption, all wireless devices on your WLAN must use the same encryption settings. Refer to Setting up WEP Encryption for more information. 802.1x A WAN client initiates an authorization request to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords) or the machine (by MAC address). IPSEC Software based IPSEC transport security. TKIP (Temporal key Integrity Protocol) Uses an encryption method called fast-packet rekeying, that changes the encryption keys frequency. Virtual Private Networks (VPN) The following VPN client software is supported by PROSet. Refer to Virtual Private Network
(VPN) for more information. Netstructure VPN (SST) Netstructure VPN (IPsec-IKE) Cisco 3000 VPN Checkpoint VPN (Non office transparent mode, connect office mode and connect non-
office mode) Microsoftt VPN (L2TP over IPsec transport, L2TP for configuration with ESP-in-UDP) 802.11a and 802.11b can be augmented with VPN security to protect TCP/IP based services. 6.Setting Up WEP Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point. Supported authentication schemes are Open and Shared-Key authentication:
Shared-Key authentication is supported using 64-bit and 128-bit WEP encryption keys. Open mode does not use an encryption authentication method to associate to a specific access point. Encryption Overview Security in the WLAN can be achieved by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically. You have the option of either using a pass phrase or entering a WEP key manually. Using 64-bit encryption, the pass phrase is 5 characters long and you can choose to enter any arbitrary and easy to remember phrase like Acme1 or enter 10 Hexadecimal numbers for the WEP key corresponding to the network the user wants to connect to. For 128-bit encryption, the pass phrase is 13 characters long or you can enter a 26 hexadecimal numbers for the WEP key to get connected to the appropriate network. Note: You must use the same encryption type, key index number, and WEP key as other devices on your wireless network. Also, if 802.1x authentication is being used, WEP encryption must be disabled. To enable 64-bit (40-bit) or 128-bit encryption with authentication:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Select the profile from the Profile List and click the Edit button or click the Add button if you are using the Profile Wizard. 4. Click the Security tab. Select Security Settings, the third dialog if using the Profile Wizard. 5. Select Shared from the Network Authentication drop-down box. 6. Select 64-bit or 128-bit from the Encryption Level drop-down box. 7. Select a key index number 1, 2, 3, or 4 from the Encrypt data with key index drop-down box to use for encryption. Key selection corresponds to the WEP encryption pass phrase or WEP key. 8. Select either of the following:
Pass phrase: Click Use Pass Phrase to enable it. Enter a text phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters
(0-9, a-z or A-Z), in the pass phrase field. WEP key: Click Use WEP Keys to enable it. Enter up to ten (using 64-bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-
bit) alphanumeric characters, 0-9, A-F in the WEP key field. 9. Click OK if editing a profile or Finish if in the Profile Wizard to save the settings. NOTE: You must use the same encryption type, index number, and WEP key as other devices on your wireless network. 7.Troubleshooting Using a Profile with an incorrect WEP Encryption Key When connected to an access point using a profile with an incorrect WEP key encryption, the task tray icon and the General page will both indicate good signal strength and that you are associated with the AP. However, when you attempt to send data to the AP using this profile, because of the incorrect WEP key encryption, authentication cannot be established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key:
A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point. No data transfer Open Authentication with no WEP encryption:
Allows association to an access point Data transfer is allowed Shared Authentication:
Associated to an AP always allows data transfer. Problems with installation Windows does not detect the wireless adapter:
1. Remove and re-install the adapter. 2. Uninstall and reinstall the adapter's drivers. Before calling Customer Support Make a note of the following answers before calling customer support:
How many remote units do you have talking to each access point?
What channels are you using, and how are they dispersed?
How much coverage overlap is there between access points?
How high above the floor are the access points mounted?
What revision of Intel(R) PROSet software or other LAN software are you running?
What other electronic equipment is operating in the same band?
What construction materials are used in wall and floors?
Users are dropped from the wireless network Suggested causes and solutions:
Find out if a person or workgroup moved or if the building has been rearranged. If two or more users are seated too close to each other, performance can suffer. Instruct your users to space themselves a small distance apart to keep receivers from being overloaded. Delivery trucks with very large metal sides can affect performance by reflecting destructive signals back into a building. If you have an installation that includes a shipping dock, check to see if the problem coincides with the arrival of large trucks. Personal systems can also interfere with your network. Wireless speakers, cordless earphones, some Bluetooth devices, and similar systems can be the source of an infrequent but hard to find the problem. Some systems do not conform to wireless regulations. Shut off suspect devices or remove them from the area. If possible, remove and reinstall your new software. Conflicts with other resident software packages are always a possibility, and they are not always the fault of the newest addition. Sometimes just starting over fixes the problem. Swap units around. Does your problem follow the changed units, or is it unique to a specific location? If it follows the product, the swapped unit could be damaged, or improperly configured. If the problem stays with the location, try to find out what is different about that particular room or area. Range decreases as data rate increases This is a normal condition. Range is inversely proportional to data rate: the faster the data, the shorter the range. This has to do with the modulation technology used. Very fast data rates require extremely complex signal waveforms, where even minor distortions can result in data errors. Slower data rates are much more tolerant, and consequently will get through even in the presence of some amount of noise, interference, distortion and echo. Signal doesn't pass through a short or thin wall Range is highly dependent on the physical environment. In a line-of-sight location, with elevated and calibrated antennas, range predictions are quite accurate. This is not true in a typical office building, where the walls may be simple drywall (which is almost transparent to microwaves), or could be plaster with metal underneath. Most sites are somewhere between these two extremes, and consist of a mixture of surfaces. You cant tell what is inside a wall by just looking at it, and we cant tell you exactly what distance you will achieve. Consider published range information to be typical, average, common or usual. Do not expect it to be exact. Signal strength drops when a cell phone is used in the area Range also depends on the electronic environment. If other equipment that could cause interference is nearby, the range of your transceiver could vary widely, and could change suddenly when the other equipment activates. This is particularly true for 802.11b installations, which share their frequencies with microwave ovens, cordless phones, wireless hi-fi speakers, electronics toys and similar devices. Try to keep your system away from other transmitters, and from other sources of electrical noise, such as large motors, spot welders, and similar electronically noisy devices. Range is shorter than it should be Repeat some tests late in the evening, or on a weekend, when there may be less interference. However, some users leave their networks turned all the time so this test is not foolproof. By all means, try more than one channel. Your range problem may just be a nearby user whose system uses your present test channel. Interference from fluorescent lights If you mount an access point close to fluorescent light fixtures, the lamp glow appears constant, but inside the lamp tube, ionization appears and disappears 120 times a second. This can modulate or chop an incoming signal and interfere with reception. When too much range is undesirable Too much range is not necessarily a good thing. At first it would appear that you would want as much range as possible, but with the increase in range comes an increase in interference potential, as your unit hears not only your other units but also manages to hear the systems of other companies up and down the street. If you have a large installation, you will also wind up with more than one access point using the same channel. If a remote unit hears two or more access points, this will slow the network Prevent access to wireless networks from outside the building Excess transmit range presents a special reverse problem. For example, putting an access point adjacent to a second floor bay window invites anyone with the right software on the street below to pick up and enjoy all network transmissions. We discuss some possible solutions to this problem further on. Problems with Network Connectivity If you cannot connect to the wireless network, try the following:
Check Network Settings 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. From the General page, check that the Network Name (SSID) and operating mode are correct. If the laptop is configured for ad hoc networking, make sure that the channel is correct. 3. To correct these settings, click the Networks tab. 4. Select the profile being used. 5. Click the Edit button and make the changes. Check Security Settings 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. From the General page, check that the security settings are correct. 3. To correct the security settings, click the Networks tab. 4. Select the profile being used. 5. Click the Edit button. 6. Click the Security tab. Make sure that the settings for WEP encryption are correct. Check Adapter Switching 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. Select the Adapter Switching icon. 3. Check that the adapter is "Linked" to the network. Checking Adapter Statistics Adapter Statistics If the adapter is communicating with an access point (infrastructure mode) or other computers in peer-to-peer mode, click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information. 8.Specifications Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter Model WM3B2100 Physical Characteristics Form Factor Dimensions (HxWxD) Mini PCI Type 3B (model WM3B2100) Type 3B card: 2.34 in x 1.75 in x 0.20 in (59.45 mm x 44.45 mm x 5 mm) 0.6 oz (17 g) Hirose U.FL-R-SMT mates with cable connector U.FL-LP-
066 On-board dual diversity switching 124-pin SO-DIMM edge connector 0 to +70 degrees Celsius 50 to 85% non-condensing 2.4 GHz (802.11b) 2.4 GHz to 2.497 GHz CCK, DQPSK, DBPSK 2.4 GHz ISM: Direct Sequence Spread Spectrum
(DSSS) 11 channel support 11, 5.5, 2, 1 Mbps 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps 16 dBm (typical) 1.6 W 1.0 W Weight Antenna Interface Connector Dual Diversity Antenna Connector Interface Operating Temperature Humidity Frequency Modulation Frequency band Modulation Wireless Medium Channels Data Rates Indoor Range Outdoor Range Power Transmit Output Power Adapter Power Consumption Transmit Receive Standby Sleep Voltage Operating Systems WECA WHQL WLAN Standard Architecture Roaming 135 mW 45 mW 3.3 V Windows* XP, 2000, 98, 98SE, Me, NT 4.0 WiFi certification for 802.11b Yes IEEE 802.11b Infrastructure or ad hoc (peer-to-peer) 802.11b compliant for seamless roaming between respective access points (802.11b) LEAP, TKIP, 802.1x, EAP-TLS, 128-bit and 64-bit WEP UL, C-UL, CB (IEC 60590) Security Product Safety 9.Glossary Numerical 802.11 x: A series of IEEE specifications for LANs: currently 802.11b, 802.11a, and 802.11g. Using any one of these extensions to the 802.11 standard permits wireless communication between a client and an access point or between two clients. The various specifications govern transmission speeds and radio frequencies as well as fall-back rates and other characteristics. The upcoming standard 802.11i will provide additional security specific to WLANs, and 802.11e will address quality of service. A Access Point: A device that serves as a communications hub for wireless clients and provides a connection to a wired LAN. Advanced Encryption Standard (AES): A federal information-processing standard, supporting 128-, 192-, and 256-bit keys. B Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions. Bluetooth: An incompatible, very short-range lower speed communications system (PAN), developed first in Europe as a cable replacement for printers and similar peripheral connections. Its usage has expanded to include cordless earphones and similar devices. It uses the 2.4 GHz ISM band, and co-exists with 802.11b. Here the term, co-exist means that not all researchers agree on the amount of mutual interference generated when both systems operate in the same location. Broadcast SSID: Used to allow an access point to respond to clients on a wireless network by sending probes. D Data Rate (Information Rate): Not all bits carry user information. Each group (packet) of bits contains headers, trailers, echo control, destination information, and other data required by the transmission protocol. It is important to understand the difference between bit rate and data rate, since the overhead information may consume more than 40% of the total transmission. This difference is common to many such data systems, including Ethernet. Direct-Sequence Spread Spectrum (DSSS) and Frequency-Hop Spread Spectrum (FHSS):
Two incompatible technologies used in radio transmission. E Extensible Authentication Protocol (EAP): An authentication protocol that supports multiple authentication methods, such as Kerberos, passwords, or smart cards. Cisco's authentication protocol, LEAP, is based on EAP, an extension to PPP (Point-to-Point Protocol). Encryption: Scrambling data so that only the authorized recipient can read it. Usually a key is needed to decrypt the data. Extended Service Set IDentifier (ESSID): A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet. This allows the AP to recognize each wireless client and its traffic. F Frequencies: Strike a piano key and you generate a tone. Pick up the tone with a microphone and your tone turns in to a vibrating or cycling electronic signal. The rate of vibration depends on the key struck. In electronics we refer to this rate of vibration as the number of cycles per second. The formal term for this value is Hertz. As we move up in rate, such as in the Broadcast Band, we can use Kilohertz (KHz) to represent 1,000 Hz, or Megahertz (MHz) to represent 1,000,000 Hz. Continuing much further upward, we finally reach 1,000,000,000 Hz, which we can fortunately shorten to a Gigahertz (GHz). These frequencies are the home of both 802.11a (5 GHz) and 802.11b (2.4 GHz). I Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Mode: A wireless network centered around an access point. In this environment, the access point not only provides communication with the wired network but also mediates wireless network traffic in the immediate neighborhood. Institute of Electrical and Electronics Engineers (IEEE): An organization involved in setting computing and communications standards. ISM Bands: A series of frequency bands, set aside by the FCC for Industrial, Scientific and Medical applications. Users of these bands operate equipment on a shared basis, meaning that they must expect, and accept interference from other legal users. Products manufactured for ISM Band use must be approved by the FCC, but the user does not have to be licensed. In addition to WLAN, ISM bands support cordless phones, microwave ovens, baby monitors, toys, ham radio transceivers, and other wireless services. K Kerberos: An authentication system enabling protected communication over an open network using a unique key called a ticket. M Media Access Control (MAC) Address: A hardwired address applied at the factory. It uniquely identifies network hardware, such as a wireless PC Card, on a LAN or WAN. Microcell: A bounded physical space in which a number of wireless devices can communicate. Because it is possible to have overlapping cells as well as isolated cells, the boundaries of the cell are established by some rule or convention. Microwave: Technically, the term describes any frequency above 1.0 GHz. Unfortunately the advertising industry has contorted this meaning considerably. In our discussion we will stick to the technical definition. Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. O Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. P Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point. Personal Area Network (PAN): A personal area network, or PAN, is a networking scheme that enables computing devices such as PCs, laptop computers, handheld personal computers, printers and personal digital assistants (PDAs) to communicate with each other over short distances either with or without wires. Preamble: A preliminary signal transmitted over a WLAN to control signal detection and clock synchronization. R Radio Frequency (RF) Terms (GHz, MHz, Hz): The international unit for measuring frequency is Hertz (Hz), which is equivalent to the older unit of cycles per second. One Mega-Hertz (MHz) is one million Hertz. One Giga-Hertz (GHz) is one billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz. Range: The distance over which a given system can communicate. This subject is discussed in detail below. RC4: An encryption algorithm designed at RSA Laboratories; specifically, a stream cipher of pseudo-random bytes that is used in WEP encryption. Remote Authentication Dial-In User Service (RAID): An authentication and accounting system that verifies users' credentials and grants access to requested resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. S Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first units transmitted signal. By moving the transmitter around, and repeating the plots, you can develop a plan as to the best locations for access points. You will also identify dead zones and other areas in need of special attention. This can be a long, slow process, but it beats ripping up an unsatisfactory installation and starting over. These tests require special software commands. Refer to your manual for specific instructions. If you have a very large, or unusually complex installation situation, you might want to consider calling in professionals to do your survey. We are not permitted to suggest installer names, but you can check your yellow pages or similar sources for likely candidates. T Transceiver: A commonly used term that describes a combination transmitter and receiver. Both 802.11a and 802.11b devices would be properly described as data transceivers. U UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing. W WECA: The Wireless Ethernet Compatibility Alliance... WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. It is extremely important to understand that WEP is not some CIA-proof supercode! It performs as intended, giving the user a simple level of data security and protection from casual electronic eavesdropping. Use of the 128 bit option at all possible times is recommended. Remember that 802.11 devices transmit
(broadcast) in all directions, and that it is possible, with very complex software, to copy and decode WEP transmissions. The task is not trivial, but it is possible. If your data is extremely sensitive, you should consider some form of secondary protection, such as strong passwords and an additional level of encryption. Suitable software packages are available from reputable suppliers. Although not intended by the original architects, WEP also prevents unauthorized access to your system by an outsider. Hackers have been known to access systems from outside a building, and to then to access the Web for a leisurely session, all at the system owners expense. Wide Area Network (WAN): A wide area network (WAN) is a voice, data, or video network that provides connections from one or more computers or networks within a business to one or more computers or networks that are external to such business. Wireless: A microwave transceiver system. Wireless LAN (WLAN): Wireless LAN is a type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. WLAN is a flexible data communication system used as an alternative to, or an extension of a wired LAN. Wireless Node: A user computer with a wireless network interface card (adapter). 10.Customer Support Intel support is available online or by telephone. Available services include the most up-to-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.com 11.Software License Agreement INTEL SOFTWARE LICENSE AGREEMENT IMPORTANT - READ BEFORE COPYING, INSTALLING OR USING Do not use or load this software and any associated materials (collectively, the
"Software") until you have carefully read the following terms and conditions. By loading or using the Software, you agree to the terms of this Agreement. If you do not agree with the terms of this Agreement, do not install or use the Software. LICENSE. You may copy the Software onto a single computer for your personal, non-
commercial use, and you may make one back-up copy of the Software, subject to these conditions:
1. This Software is licensed for use only in conjunction with Intel component products. Use of the Software in conjunction with non-Intel component products is not licensed hereunder. 2. You may not copy, modify, rent, sell, distribute or transfer any part of the Software except as provided in this Agreement, and you agree to prevent unauthorized copying of the Software. 3. You may not reverse engineer, decompile, or disassemble the Software. 4. You may not sublicense or permit simultaneous use of the Software by more than one user. 5. The Software may contain the software or other property of third party suppliers, some of which may be identified in, and licensed in accordance with, any enclosed
"license.txt" file or other text or file. OWNERSHIP OF SOFTWARE AND COPYRIGHTS. Title to all copies of the Software remains with Intel or its suppliers. The Software is copyrighted and protected by the laws of the United States and other countries, and international treaty provisions. You may not remove any copyright notices from the Software. Intel may make changes to the Software, or to items referenced therein, at any time without notice, but is not obligated to support or update the Software. Except as otherwise expressly provided, Intel grants no express or implied right under Intel patents, copyrights, trademarks, or other intellectual property rights. You may transfer the Software only if the recipient agrees to be fully bound by these terms and if you retain no copies of the Software. LIMITED MEDIA WARRANTY. If the Software has been delivered by Intel on physical media, Intel warrants the media to be free from material physical defects for a period of ninety (90) days after delivery by Intel. If such a defect is found, return the media to Intel for replacement or alternate delivery of the Software as Intel may select. EXCLUSION OF OTHER WARRANTIES. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY EXPRESS OR IMPLIED WARRANTY OF ANY KIND INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE. Intel does not warrant or assume responsibility for the accuracy or completeness of any information, text, graphics, links or other items contained within the Software. LIMITATION OF LIABILITY. IN NO EVENT SHALL INTEL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, OR LOST INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF INTEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS PROHIBIT EXCLUSION OR LIMITATION OF LIABILITY FOR IMPLIED WARRANTIES OR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM JURISDICTION TO JURISDICTION. TERMINATION OF THIS AGREEMENT. Intel may terminate this Agreement at any time if you violate its terms. Upon termination, you will immediately destroy the Software or return all copies of the Software to Intel. APPLICABLE LAWS. Claims arising under this Agreement shall be governed by the laws of California, excluding its principles of conflict of laws and the United Nations Convention on Contracts for the Sale of Goods. You may not export the Software in violation of applicable export laws and regulations. Intel is not obligated under any other agreements unless they are in writing and signed by an authorized representative of Intel. GOVERNMENT RESTRICTED RIGHTS. The Software is provided with "RESTRICTED RIGHTS." Use, duplication, or disclosure by the Government is subject to restrictions as set forth in FAR52.227-14 and DFAR252.227-7013 et seq. or their successors. Use of the Software by the Government constitutes acknowledgment of Intel's proprietary rights therein. Contractor or Manufacturer is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95052. 12.Safety and Regulatory Notices undesired operation. This notebook has been tested and certified to FCC part 15 and RSS 210 for operation of the Wireless LAN device. FCC Part 15 Declaration of Conformity (DoC) This device is herewith confirmed to comply with the requirements of FCC Part 15 rules. The operation is subject to the following two conditions:
1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause FCC Rules and Regulations - Part 15 Warning: This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the Federal Communications Commissions Rules and Regulation. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
Relocate your WLAN and Bluetooth equipped laptop computer. Increase the separation between the WLAN and Bluetooth equipped laptop computer and other electronics. Connect the WLAN and Bluetooth equipped laptop computer into an outlet on a circuit different from that of other electronics. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The RF transmission power from the antenna conforms to the general public FCC limit of SAR (Specific Absorption Rate) 1.6 W/kg. The maximum SAR value measured from this device was 0.35 W/kg. This device must not be co-located or operating in conjunction with any other antenna or transmitter Canadian Notice To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing."
13.Limited Warranty Users are not authorised to modify this product. Any modifications invalidate the Warranty. This equipment may not be modified, altered or changed in any way without signed written permission from Fujitsu. Unauthorised modification will void the equipment authorisation from the FCC and Industry Canada and the warranty. Limited Lifetime Hardware Warranty Intel warrants to the original owner that the adapter product delivered in this package will be free from defects in material and workmanship. This warranty does not cover the adapter product if it is damaged in the process of being installed or improperly used. THE ABOVE WARRANTY IS IN LIEU OF ANY OTHER WARRANTY, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF NONINFRINGEMENT OF INTELLECTUAL PROPERTY, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. This warranty does not cover replacement of adapter products damaged by abuse, accident, misuse, neglect, alteration, repair, disaster, improper installation, or improper testing. If the adapter product is found to be defective, Intel, at its option, will replace or repair the hardware product at no charge except as set forth below, or refund your purchase price provided that you deliver the adapter product along with a Return Material Authorization (RMA) number (see below), along with proof of purchase (if not registered), either to the dealer from whom you purchased it or to Intel with an explanation of any deficiency. If you ship the adapter product, you must assume the risk of damage or loss in transit. You must use the original container (or the equivalent) and pay the shipping charge. Intel may replace or repair the adapter product with either new or reconditioned parts, and any adapter product, or part thereof replaced by Intel becomes Intel's property. Repaired or replaced adapter products will be returned to you at the same revision level as received or higher, at Intel's option. Intel reserves the right to replace discontinued adapter products with an equivalent current generation adapter product. Returning a Defective Product From North America:
Before returning any adapter product, contact Intel Customer Support and obtain a Return Material Authorization (RMA) number by calling +1 916-377-7000. If the Customer Support Group verifies that the adapter product is defective, they will have the RMA department issue you an RMA number to place on the outer package of the adapter product. Intel cannot accept any product without an RMA number on the package. All other locations:
Return the adapter product to the place of purchase for a refund or replacement. Intel Adapter Money-back Guarantee (North America Only) Intel wants you to be completely satisfied with the Intel adapter product that you have purchased. Any time within ninety (90) days of purchase, you may return your Intel adapter to the original place of purchase for a full refund of the purchase price from your dealer. Resellers and distributors, respectively, accepting returns and refunding money back to their customers may return Intel adapters to their original place of purchase. Intel guarantees that it will accept returns under this policy and refund the original purchase price to customers purchasing directly from Intel. Limitation of Liability and Remedies INTEL'S SOLE LIABILITY HEREUNDER SHALL BE LIMITED TO DIRECT, OBJECTIVELY MEASURABLE DAMAGES. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY FOR ANY INDIRECT OR SPECULATIVE DAMAGES (INCLUDING, WITHOUT LIMITING THE FOREGOING, CONSEQUENTIAL, INCIDENTAL, AND SPECIAL DAMAGES) INCLUDING, BUT NOT LIMITED TO, INFRINGEMENT OF INTELLECTUAL PROPERTY, REPROCUREMENT COSTS, LOSS OF USE, BUSINESS INTERRUPTIONS, LOSS OF GOODWILL, AND LOSS OF PROFITS, WHETHER ANY SUCH DAMAGES ARISE OUT OF CONTRACT NEGLIGENCE, TORT, OR UNDER ANY WARRANTY, IRRESPECTIVE OF WHETHER INTEL HAS ADVANCE NOTICE OF THE POSSIBILITY OF ANY SUCH DAMAGES. NOTWITHSTANDING THE FOREGOING, INTEL'S TOTAL LIABILITY FOR ALL CLAIMS UNDER THIS AGREEMENT SHALL NOT EXCEED THE PRICE PAID FOR THE PRODUCT. THESE LIMITATIONS ON POTENTIAL LIABILITIES WERE AN ESSENTIAL ELEMENT IN SETTING THE PRODUCT PRICE. INTEL NEITHER ASSUMES NOR AUTHORIZES ANYONE TO ASSUME FOR IT ANY OTHER LIABILITIES. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitations may not apply to you. Critical Control Applications: Intel specifically disclaims liability for use of the adapter product in critical control applications (including, for example only, safety or health care control systems, nuclear energy control systems, or air or ground traffic control systems) by Licensee or Sublicensees, and such use is entirely at the user's risk. Licensee agrees to defend, indemnify, and hold Intel harmless from and against any and all claims arising out of use of the adapter product in such applications by Licensee or Sublicensees. Software: Software provided with the adapter product is not covered under the hardware warranty described above. See the applicable software license agreement which shipped with the adapter product for details on any software warranty. 14.Legal Notice Copyright (C) 2001-2003, Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.
*Other names and brands may be claimed as the property of others. Intel(R) is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2003-08-21 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2003-08-21
|
||||
1 | Applicant's complete, legal business name |
Fujitsu Client Computing Limited (FCCL)
|
||||
1 | FCC Registration Number (FRN) |
0009379173
|
||||
1 | Physical Address |
1-1, Kamikodanaka 4-chome
|
||||
1 |
Nakahara-ku, Kawasaki, N/A 211-8588
|
|||||
1 |
Japan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@curtis-straus.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
EJE
|
||||
1 | Equipment Product Code |
WL0001
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
M****** U******
|
||||
1 | Title |
Engineer
|
||||
1 | Telephone Number |
+81-4********
|
||||
1 | Fax Number |
+81-4********
|
||||
1 |
u******@jp.fujitsu.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Notebook/Pentablet PC T3010 | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Grant conditions: Power listed is conducted. The transmitter in the Tablet PC is to be installed only by the Grantee. Only the antenna documented in this filing, installed in the manner specified, can be used with this device. The antenna must not be co-located or operating in conjunction with any other antenna or transmitter during customer usage. End-users must be provided with operating instructions for satisfying RF exposure compliance requirements. The highest reported SAR value is 0.35 W/kg. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Lexmark International, Inc.
|
||||
1 | Name |
J****** F******
|
||||
1 | Telephone Number |
859-2********
|
||||
1 | Fax Number |
859-2********
|
||||
1 |
f******@lexmark.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0332000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC