all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
EUT User Guide | Users Manual | 511.06 KiB | ||||
1 |
|
User Manual | Users Manual | 2.04 MiB | ||||
1 |
|
User Manual Part1 | Users Manual | 2.14 MiB | ||||
1 |
|
User Manual Part2 | Users Manual | 11.89 KiB | ||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | Test Report | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Cover Letter(s) | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | Internal Photos | |||||||
1 | Test Setup Photos |
1 | EUT User Guide | Users Manual | 511.06 KiB |
FCC ID: EJE-WL0003 (IC: 337J-WL0003) Report No. M030949_Certification_Ocampa_Calexico EMC Technologies Pty Ltd - Report No. M030949_Certification_Ocampa_Calexico APPENDIX L USER GUIDE EMC Technologies Pty Ltd. 57 Assembly Drive, Tullamarine VIC 3043 Australia www.emctech.com Intel(R) PRO/Wireless LAN Mini PCI Adapter User's Guide This document provides information for the following wireless devices:
Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter, operating at 2.4 GHz These wireless adapters operate with high-capacity networks using multiple access points within large or small environments. Using the Intel(R) PROSet Windows utility you can configure, manage wireless local area network (WLAN) management tasks, adapter switching functions, and connections. Wireless LAN General Information 1.About Wireless LAN Technology Adapter Setup and Configuration 2.Software Installation 3.Using Intel(R) PROSet 4.Connecting to a Network using Intel PROSet 5.Security Overview 6.Setting Up WEP Encryption and Authentication 7.Troubleshooting 8.Specifications 9.Glossary Support and Warranty 10.Customer Support 11.Software License 12.Safety and Regulatory Notices 13.Limited Warranty 14.Legal Notices Copyright (c) 2003 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein. Intel, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
*Other names and brands may be claimed as the property of others. 1.About Wireless LAN Technology A wireless network connects computers without using network cables. Computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point. When you set up your wireless adapter, you select the operating mode for the kind of wireless network you want. You can use your Intel(R) PRO/Wireless adapter to connect to other similar wireless devices that comply with the 802.11 standard for wireless networking. Choosing a Wireless LAN Mode Wireless LANs can operate with or without access points, depending on the number of users in the network. Infrastructure mode uses access points to allow wireless computers to send and receive information. Wireless computers transmit to the access point, the access point receives the information and rebroadcasts it to other computers. The access point can also connect to a wired network or to the Internet. Multiple access points can work together to provide coverage over a wide area. Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless LAN There are three basic components that must be configured for a wireless LAN to operate properly:
Network NameEach wireless network uses a unique Network Name to identify the network. This name is called the Service Set Identifier (SSID). When you set up your wireless adapter, you specify the SSID. If you want to connect to an existing network, you must use the name for that network. If you are setting up your own network you can make up your own name and use it on each computer. The name can be up to 32 characters long and contain letters and numbers. ProfilesWhen you set up your computer to access a wireless network, Intel(R) PROSet creates a profile for the wireless settings that you specify. If you want to connect to another network, you can scan for existing networks and make a temporary connection, or create a new profile for that network. After you create profiles, your computer will automatically connect when you change locations. SecurityThe 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data. If you are connecting to an existing network, use the encryption key provided by the administrator of the wireless network. If you are setting up your own network you can make up your own key and use it on each computer. Identifying a Wireless Network Depending on the size and components of a wireless LAN, there are many ways to identify a wireless LAN:
The Network Name or Service Set Identifier (SSID)Identifies a wireless network. All wireless devices on the network must use the same SSID. Extended Service Set Identifier (ESSID)A special case of SSID used to identify a wireless network that includes access points. Independent Basic Service Set Identifier (IBSSID)A special case of SSID used to identify a network of wireless computers configured to communicate directly with one another without using an access point. Basic Service Set Identifier (BSSID)A unique identifier for each wireless device. The BSSID is the Ethernet MAC address of the device. Broadcast SSIDAn access point can respond to computers sending probe packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network. It greatly reduces the amount of troubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing. To conduct a site survey, you will need the following tools:
An access point (or laptop computer) that is set up to be the transmitter. It should be mounted near and at the same height as the designated location of your wireless LAN. A laptop that will act as the mobile receiver. It must contain your site survey software. An area or building map, which will be used to plot the strength of your signals. Once you have the tools you need, you are ready to survey the inside of the building. Launch the site survey software on the mobile receiver laptop and carry it around in the intended wireless LAN area to test the signal strength. Be sure to also check the signal strength of each intended access point location. If you encounter problems while surveying the site, make sure your transmitter laptop is not located on a wall containing metal, such as an air-conditioning duct, which will interfere with the range of your signal. Simply move the transmitter and test the signal strength again. For users to have seamless coverage when moving from access point to access point, the signal levels at each point must overlap. There is software available that will seamlessly hand off changing signal levels from one access point to another. Your building's infrastructure can sometimes interfere with the microwave signal, but finding the location and cause of the interference will allow you to figure out the best place to mount your access points for optimal area coverage. Microwave signals travel in all directions, which means there is one access point for a multi-floor building. However, the range is highly dependent on the material used to construct the flooring, especially metal materials. Once your signal strength is strong inside the building, you are ready to check the strength outside the building. To do so, simply carry the mobile receiver laptop as far down the street or around the building as you can go without losing significant signal strength. If possible, you should be aware of the types of networks being used by the companies on the floors above and below you, so that you can work together in harmony. With wireless networks, security is very important and if you communicate with those around you, you are better prepared to select the right channels, as well as the best location for access points. Factors Affecting Range Although access points can transmit signals up to 60 feet away in an area with many walled barriers or as much as 500 feet away in a large open area, the range is affected by the following factors:
Building materials, such as steel and drywall, can shorten the range of the radio signals. Physical layout of the area can interfere with the signals and cause them to be dropped. Electronic noise from cell phones, microwave ovens, or other devices on the same frequency can interfere with the transmission of the signals. Range is inversely proportional to data rate, so the faster that the signals are sent, the less distance they will travel. Taking these factors into consideration when you survey the site for your WLAN is key to providing all of your users with undisturbed mobile connectivity. Using multiple access points will, of course, reduce the impact of these factors if your area has dividing walls throughout. Stronger Security Although wireless networks are easy to use, the main issue lies with security. Even if you enable the security settings defined in the 802.11b standard, as well as the security settings of your hardware, your network is still vulnerable. There are a few things you can do to make it more difficult for outsiders to access your network:
Change the default network name of your WLAN. Every manufacturer's default settings are public knowledge. Do not allow the name of your network to be broadcasted by your access points. This makes it more difficult for hackers to identify your network. Enable Wired Equivalent Privacy (WEP) encryption, which is the same security feature used by online shopping websites. Change your encryption keys as often as possible. Temporal Key Integrity Protocol
(TKIP), which is being developed by a IEEE task group, will change the keys automatically. Enable MAC address filtering so that each access point can generate a list of approved MAC addresses for your WLAN. If you have a small network, use virtual private network encryption for additional security. If you have a large network, you may want to install a gateway between your access points and network clients. 2.Software Installation Installing Drivers and Intel(R) PROSet Software See the instructions for your operating system:
-Installation under Windows XP Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINXP on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Before proceeding, make sure that you are operating Windows XP with administrative rights. If you log in to Windows XP without administrative rights, you may run into problems during the installation. The Intel(R) PROSet utility or the Windows XP wireless configuration feature can be used to configure wireless network settings. The instructions below include steps for installing the Intel(R) PROSet utility and for turning off the Windows XP configuration feature. If you do not turn off the Windows XP feature, you will not be able to use Intel(R) PROSet to configure wireless network settings. For information on how to use the Windows XP feature, see your Windows XP documentation. Driver Installation To install drivers under Windows* XP, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights if prompted by Windows XP. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. Verify that Install the software automatically
(Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive. The New Hardware Found Wizard searches for the correct driver files and copies them to your hard drive. 5. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 6. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 7. On the Found New Hardware Wizard screen, click Finish. Proceed to disable the Windows XP wireless configuration feature. Disable Windows XP Wireless Configuration (Required) To disable the Windows XP wireless configuration feature so that you can use Intel(R) PROSet for wireless configuration, continue as follows:
Instructions are written for use with the Windows XP Start Menu and Control Panel Category View, not with "Classic" Start Menu or Control Panel views. 8. Click Start and Control Panel. 9. On the Pick a category screen, click Network and Internet Connections, then under the heading or pick a Control Panel icon click Network Connections. 10. In the Network Connections window, right-click your Wireless Network Connection and select Properties. 11. Select the Wireless Networks tab. 12. Click to clear ("deselect") the check box Use Windows to configure my wireless network settings, then click OK on the Wireless Network tab. Do not click any other tabs. Continue with the installation of Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility
(required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 15. 13. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless LAN Adapters. 14. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 15. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 16. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 17. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 18. On the Ready to Install the Program screen click Install. 19. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen or leave it open if you wish to install Wireless Administration Tools. 20. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 21 and 22 below and continue with Step 23. 21. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 22. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 23. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 24. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 25. On the Setup Type screen, verify that Typical is selected, then click Next. 26. On the Ready to Install the Program screen click Install. 27. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 28. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WIN2K on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. After loading the Windows 2000 operating system, be sure to log in with administrative rights. If you log in to Windows 2000 without administrative rights, you may run into problems during the installation. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Driver Installation To install driver software in Windows* 2000, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights when prompted by Windows 2000. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD-ROM into your CD-ROM drive. If the Intel(R) PRO Network Connections menu screen appears, leave it open and click the Found New Hardware Wizard dialog to make that the active window. 5. On the Install Hardware Device Drivers screen verify that Search for a suitable driver for my device (recommended) is selected, then click Next. 6. When the Locate Driver Files dialog appears, verify that the item CD-ROM drives is checked and click Next. 7. When the Driver Files Search Results dialog appears, indicating that a driver was found, click Next. 8. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 9. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 10. On the Found New Hardware Wizard screen, click Finish. Proceed to install Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility
(required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 11 and 12 below and continue with Step 13. 11. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. This screen may have been launched in step 4 above. If the screen is not visible when you close the Found New Hardware Wizard dialog, display it by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 12. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 13. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 14. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 15. On the Setup Type screen, verify that Typical is selected, then click Next. This is the recommended setting for a first-time installation. 16. On the Ready to Install the Program screen click Install. 17. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen or leave it open if you wish to install Wireless Administration Tools. 18. To launch Intel(R) Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Administration Tools Installation (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/2K-NET32 on the Intel CD supplied with the product. Skip Steps 19 and 20 below and continue with Step 21. 19. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. This screen may have been launched in step 4 above. If the screen is not visible when you close the Found New Hardware Wizard dialog, display it by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 20. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 21. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 22. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 23. On the Setup Type screen, verify that Typical is selected, then click Next. 24. On the Ready to Install the Program screen click Install. 25. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 26. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows NT 4.0 Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in the computer in which the Mini PCI Adapter hardware has been installed. Install Network Drivers for Windows* NT* 4.0 NOTE: Before installing drivers, install Service Pack 6 or later. Advanced features for Intel adapters require Service Pack 6a or later. NOTE: Use the following information if NT Networking has already been installed on the PC. If NT Networking is not installed, please refer to your Windows NT documentation or consult your network administrator for instructions. Also refer to your Windows NT documentation for information about installing the TCP/IP protocol. 1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows NT to start, then log in as administrator. 3. Insert the Intel CD into your CD-ROM drive. If the Intel(R) PRO Network Connections screen displays, you may disregard it or close it (you will redisplay it later to install Intel(R) PROSet II). 4. Click Start, Settings, Control Panel, then double-click the Network icon. 5. When the Networking dialog appears, select the Adapters tab and click the Add button. 6. Click the Have Disk button after the available network adapters display. 7. Enter the path D:\PROW2100\WINNT4\ (where D: is your CD-ROM drive) and click OK. 8. Select Intel(R) PRO/Wireless 2100 Mini PCI Adapter from the list of supported adapters and click OK. 9. If prompted for additional Windows NT files, re-enter the path to your CD drive (for example, D:\). 10. The Adapter Properties dialog displays. Click the Configure button. 11. On the Wireless Network tab, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click OK to continue. (Default setting under the Advanced button is no security; consult your network administrator if security is required.) 12. Click Close. 13. Enter TCP/IP settings for your network and click OK. 14. When prompted to restart the computer, remove the CD-ROM and click Yes. 15. After the computer has restarted, double-click the Network Neighborhood icon on your desktop. Make sure that you have access to the network. If you can log on your adapter has been properly installed. 16. Proceed to Install Intel(R) PROSet II. Install Intel(R) PROSet II (Required) Intel Intel(R) PROSet II enables you to test and configure Intel network adapters on computers running Windows* NT with Service Pack 5 or later. For details about installing Intel Intel(R) PROSet II, see the instructions below. When you run the Intel(R) PROSet Installer, it checks to see if a previously installed version of Intel(R) PROSet exists on your computer. If another installation is detected, you will be asked to remove it before proceeding with the installation of Intel(R) PROSet II. Use Add/Remove Programs in the Control Panel to find and remove any previous versions of Intel(R) PROSet software. Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of Intel(R) PROSet II. If the Intel(R) PRO Network Connections menu screen does not appear when you insert the Intel CD, or if it appears but does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet II installer manually using Start > Run and browsing to the file WSetup.exe in the path APPS\PROSet\WINNT4 on the Intel CD. Then skip to Step 4 below and continue with the installation. 1. Insert the Intel CD into your CD-ROM drive. The Intel(R) PRO Network Connections screen displays. (If it doesn't display, use Start, Run and launch the file autorun.exe from the Intel CD.) 2. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. 3. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 4. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 5. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 6. On the Setup Type screen, verify that Typical is selected, then click Next. This is the recommended setting for a first-time installation. Click Custom if you wish to install Intel(R) PROSet in a nondefault location. 7. On the Ready to Install the Program screen click Install. 8. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen, if displayed. 9. To launch Intel(R) PROSet II, double-click the Intel(R) PROSet II icon in the system tray or in the Control Panel. For additional information, press F1 or click Help while the program is running. 10. Restart the computer if prompted. Install Administration Tools (Optional) Continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
1. Insert the Intel CD into your CD-ROM drive. The Intel(R) PRO Network Connections screen displays. (If it doesn't display, use Start, Run and launch the file autorun.exe from the Intel CD.) 2. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. 3. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 4. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 5. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 6. On the Setup Type screen, verify that Typical is selected, then click Next. 7. On the Ready to Install the Program screen click Install. 8. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 9. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows Me Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINSE-ME on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Driver Installation To install the software in Windows* Me (Millennium Edition), follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows to detect the newly installed hardware and display the Add New Hardware Wizard dialog. DO NOT click Next. Verify that Automatic search for a better driver (Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 3. Insert the Intel CD into your CD drive. Windows installs the driver from the CD. If the installation does not start automatically, click Next on the Add New Hardware Wizard screen. 4. On the Network Name screen, click Next to accept the default Network Name (SSID) 101, or enter a specific SSID for your network, then click Next. 5. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 6. Click Finish on the Add New Hardware Wizard screen when the driver installation is complete. 7. When prompted to restart the computer, click No. You will restart it manually later. Proceed to install Intel(R) PROSet. Intel(R) PROSet Installation (Required) To install the Intel(R) PROSet utility, continue with the following steps:
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 8 and 9 below and continue with Step 10. 8. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless Adapters. 9. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 10. On the Welcome to the InstallShield Wizard for Intel(R) PROSet II screen, click Next. 11. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 12. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 13. On the Ready to Install the Program screen click Install. 14. After the software is installed on your computer, click Finish. 15. When prompted to restart the computer, click Yes. 16. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) After restarting the computer, continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 17 and 18 below and continue with Step 19. 17. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 18. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 19. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 20. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 21. On the Setup Type screen, verify that Typical is selected, then click Next. 22. On the Ready to Install the Program screen click Install. 23. After the software is installed on your computer, click Finish. 24. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running.
-Installation under Windows 98SE Preliminary Notes The installation instructions in this section are based on the following assumptions:
The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed. No other wireless LAN card is installed in the computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW7100\WINSE-ME on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Driver Installation To install the software in Windows* 98SE, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Wait for Windows to detect the newly installed hardware and display the Add New Hardware Wizard dialog. Click Next. If Windows does not detect the new hardware, see Troubleshooting. 3. Insert the Intel CD into your CD drive. 4. On the New Hardware Wizard screen, select Search for the best driver for you device (Recommended), and click Next, then select CD drive and click Next. 5. On the Network Name screen, click Next to accept the default Network Name (SSID), or enter a specific SSID for your network, then click Next. 6. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 7. On the Add New Hardware Wizard screen, click Finish. 8. When prompted to restart the computer, click No. You will restart it manually later. Proceed to the installation of Intel(R) PROSet. Intel(R) PROSet Installation (Required) To install the Intel(R) PROSet utility, continue with the following steps:
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start > Run and browsing to the file PROSet.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 9 and 10 below and continue with Step 11. 9. Display the Intel(R) PRO Network Connections screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless Adapters. 10. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 11. On the Welcome to the InstallShield Wizard for Intel(R) PROSet II screen, click Next. 12. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 13. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 14. On the Ready to Install the Program screen click Install. 15. After the software is installed on your computer, click Finish. 16. When prompted to restart the computer, click Yes. 17. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Administration Tools Installation (Optional) After restarting the computer, continue with the following steps to install the Intel(R) Wireless Administration Tools Site Survey and AP Discovery (optional):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of the Administration Tools. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Administration Tools installer manually using Start > Run and browsing to the file APAdmin.msi in the path APPS/PROSet/WN98SEME on the Intel CD supplied with the product. Skip Steps 18 and 19 below and continue with Step 20. 18. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. You can display this screen by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 19. On the Intel PRO/Wireless LAN Adapters menu screen, click Install AP Admin Tools. 20. On the Welcome to the InstallShield Wizard for Intel(R) Wireless Administration Tools screen, click Next. 21. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 22. On the Setup Type screen, verify that Typical is selected, then click Next. 23. On the Ready to Install the Program screen click Install. 24. After the software is installed on your computer, click Finish. 25. To launch the Wireless Administration Tools, follow the path Start > Programs >
Intel(R) PRO Wireless > Access Point Administration Tools and select AP Discovery or Site Survey. For additional information on either program, press F1 or click Help while the program is running. 3.Using Wireless Profiles in Intel(R) PROSet A profile is a saved group of network settings. Profiles are displayed in the Profile List in the Intel(R) PROSet General page. Profiles can be arranged in order of network connection priority. You can connect to one network using the first profile in the Profile List, then automatically connect to another network using the next profile. This allows you to stay connected while roaming freely from one wireless network to another. Although you can assign multiple profiles to a single network, you can only use one profile per connection. Profile general settings include, the network name (SSID), channel, security settings, and TCP/IP settings. The Networks tab allows you to add, edit and delete profiles. Creating a New Profile To add a new profile, use the Profile Wizard sequence of dialogs to configure the profile contents. The following example uses all of the Profile Wizard dialogs. Some settings may not be required for all profiles. To create a new profile and connect to a network:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Add button. The General Settings dialog displays. NOTE: If this is the first time you have created a profile, click the profile named Default in the Profile List, click the Edit button and rename the default profile in the Profile Name field on the General page. Step 1 of 4: General Settings 4. Enter a profile name in the Profile Name field. 5. Enter the network SSID, in the Network Name (SSID) field. 6. Click the operating mode to use, Infrastructure or Ad hoc. 7. The Mandatory AP option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8. Click the Configure TCP/IP and VPN settings checkbox to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked, proceed to step 9. 9. Check the Enable Auto-Import check box to allow this profile to be imported. Refer to Automatic Profile Distribution for more information. 10. Click Next. Step 2 of 4: TCP/IP and VPN Client Settings 11. Use these options to configure TCP/IP and VPN settings for a VPN profile. Click Next when finished. Step 3 of 4: Security Settings 12. Select Open or Shared in the Network Authentication drop-down menu. Open, does not use any authentication method. Shared uses the WEP key as the authentication method. 13. Click the Enable data encryption (WEP) checkbox to configure WEP encryption settings. 14. Click the Password protect this profile checkbox to assign a password to the profile. 15. Click Next. Step 4 of 4: Password Protection Settings 16. Click the Password protect this profile checkbox. 17. Enter a password in the Password field. 18. Reenter the same password in the Confirm New Password field. 19. Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page. 20. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list. 21. Click the Advanced button to set the network connection preferences. 22. Click the Connect button to connect to the network. 23. Click OK to close the Intel(R) PROSet dialog. Creating a VPN Profile To create a VPN profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Select the profile to add VPN settings to from the Profile List. 4. Click the Edit button and the General page appears. 5. Click the Network tab. 6. Click the Configure button for the TCP/IP Settings. Make sure that Obtain an IP address automatically and Obtain DNS address automatically is selected. 7. Click the Close button to close the dialog. 8. Click the Configure button for the VPN Client Settings. 9. Click Enable VPN for this profile checkbox. 10. Select the VPN client software from the Available VPN Clients drop-down menu. 11. Select the VPN profile if your VPN client software displays the VPN tunnel name. 12. Click the Close button to close the dialog. 13. Click OK on any of the pages to save all the settings and return to the Networks page. 14. Click the VPN profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 15. Click the Connect button to connect to the network. The VPN profile name displays a connect icon. Note: There must be an IP address assigned before the VPN client software can be launched. Click the Details button to verify that an IP address has been assigned. 16. Follow the on-screen instructions and enter your credentials before connecting. 17. Click OK to close the Intel(R) PROSet dialog. Importing and Exporting Profiles Note: A password protected profile can be imported and exported, however, before editing the profile, the password must be entered. To import profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the Import/Export button. 4. Click the Import button. 5. Locate the profile to import on your hard disk or enter the profile name in the File name field. The profile extension is .profile. 6. Click the Import to import the profile into the Profile List. 7. Click OK twice to return to the General page. 8. Click OK to close the Intel(R) PROSet dialog. To export profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the profiles to export from the export profile list. 4. Click the Browse button and select a directory to save the profiles in. Click OK to return to the previous dialog. 5. Click the Export button to start exporting the profiles. 6. Click OK twice to return to the General dialog. 7. Click OK to close the Intel(R) PROSet dialog. Automatic Profile Distribution The Enable Auto-Import feature allows a network administrator to distribute a profile automatically to computers connected to a network. The Enable Auto-Import box is located on the Profile Wizard dialogs. When the checkbox is checked the profile must be copied to a specific directory on the host computer, from there it can be distributed to multiple computers. Once the profile is received by the remote computer it will automatically be available for use from the Scan profile list. If an attempt is made to edit a distributed profile that is password protected, a password prompt will appear. Automatically importing WLAN profiles is accomplished by monitoring the import folder on your hard disk for new profile files. Only profiles that have the Enable Auto-Import checked on the Profile Wizard dialog can be automatically imported. If a profile of the same name already exists in the Profile List, a dialog is displayed from which you can either reject the import, or accept in which case the existing profile will be replaced. All imported profiles will be placed at the bottom of the Profile List, and the profile file will be immediately deleted after the import whether the import was successful or not. To distribute a profile to other computers on a network:
1. Select a profile to be edited from the Profile List in the Networks page, and click the Edit button or click the Add button to create a new profile using the Profile Wizard. 2. Check the Enable Auto-Import checkbox on the General page. 3. Click OK (Edit a profile) or Finish (Add a profile) to save the setting. 4. Copy the profile to the Programs Files/Intel/PROSet/Import directory. The profile is now ready to distribute to other computers. Editing an Existing Profile To edit an existing profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Edit button. The General page displays. 4. Click on the General, Security, Network and Password tabs to make the necessary changes for the network profile settings:
5. Click OK on any of the pages to save all the settings and return to the Networks page. 6. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 7. Click the Advanced button to set the network connection preferences. 8. Click the Connect button to connect to the network. 9. Click OK to close the Intel(R) PROSet dialog. Deleting a Profile To delete a profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the profile to be deleted from the Profile List. 4. Click the Delete button. 5. Click Yes to permanently delete the profile. Connecting to a Network without a Profile To connect to an available network without a profile:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Click the Scan button. 4. Select the network profile name with <no profile> shown, and click the Connect button. 5. Click the No, connect me directly without creating a profile option. Note, you can click Yes, create a profile for this network now to create a profile to be used later. 6. Click OK to connect. Connecting to a Network if a Blank SSID displays If the wireless adapter receives a blank network name (SSID) from a stealth access point, both the blank SSID and <no profile> display in the available networks list. To associate with a stealth access point, a new profile must first be created before connection. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. To connect to an access point that transmits a blank network name (SSID) in the Available Networks list:
1. From the General page, click the Networks tab. 2. Click the Scan button. 3. Select the network name with a blank SSID and <no profile> shown in the Available Networks list. 4. Click the Connect button. 5. Click the Yes, create a profile for this network now option. 6. The Profile Wizard dialog displays. Enter a profile name and Network Name (SSID) and security settings if required. Click Finish to save the profile settings and return to the Networks page. 7. Select the new profile from the profile list and click Connect. Profile Connection Preferences To access the profile connection preference option:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options:
Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network. Connect to any available network if no matching profile is found: Connect to any available network without using a profile from the Profile List. 4. Click OK to save the setting and return to the previous dialog. Loading a Profile from the Task Tray To load a profile from the Task Tray:
1. Right-click Intel(R) PROSet icon in the task tray. 2. Select the Intel PRO/Wireless LAN 7100 3B Mini PCI Adapter or the Intel PRO/Wireless LAN 2100 3B Mini PCI Adapter. 3. Click Select Profile and select the profile to be launched. 4.Connecting to a Network using Intel(R) PROSet Connecting to a Network Automatically The Configuration Service feature operates in background to automatically display available networks not listed in the Profile List. This method provides automatic connection in a 2.4 or 5GHz environment to available networks in the range of your wireless adapter. The Configuration Service constantly monitors your wireless adapter's connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter. The Configuration Service can also be used if there is more than one wireless adapter installed using 802.11a and 802.11b bands. The Configuration Service features:
The Configuration Service is launched when you log on to your computer. No active profile switching will be performed. Once the adapter is associated with the access point, if a higher priority profile becomes available, no switching will occur. The Configuration Service is only be available if the Intel(R) PROSet is installed. If a connection to an access point cannot be made using any of the profiles in the Profile List, a dialog will display the available networks. If there are multiple profiles listed for an available network, a dialog box will list the profiles for you to choose from. If an available network is detected with WEP encryption and authentication, a dialog for setting up WEP encryption displays before the connection is made. The Configuration Service can be used in two ways:
1. Connect to available network using profiles only: In this mode the Configuration Service attempts to connect to a network access point using profiles from the Profile List only. If no matching profile is found, a dialog appears that lists the available networks. You can also close this dialog without connecting by clicking the Cancel button. The adapter will remain unassociated, and the list of available networks will NOT be displayed again unless another available network is detected. This mode is set in the Advanced Setting options. 2. Connect to any available network if no matching profile found: In this mode the Configuration Service attempts to connect to a network access point first using profiles from the Profile List. If no matching profile is found, the Configuration Service automatically connects to any available network. This mode is set in the Advanced Setting options. Enabling Automatic Connection The Configuration Service also monitors for the "resume status" after a laptop computer suspend event. When this occurs, the Configuration Service will re-enable the automatic connection service. These features can be enabled again after rebooting your computer or after a suspend and resume cycle. Enable profile management features: Check this setting in the Advanced Settings options to manually re-enable the Configuration Service profile management features after being disabled from the notification dialog when another profile management application is detected. This option can only be used to re-enable the Configuration Service features, it cannot be used to manually disable the Configuration Service features. Refer to Profile Switching for more information. Profile Management Options The following Profile Management options can be found in Advanced Settings. Display available networks when not associated: If no networks are available that match any profiles in the Profile List, the Configuration Service dialog is displayed, listing the available networks. By checking "Dont show this again" option, the dialog listing the available networks will not be displayed again, if the adapter becomes unassociated. The Configuration Service will continue to function and attempt to connect, using a profile from the Profile List, or to an available network depending on the selection mode. This mean that if Connect Using Preferred Profiles Only is selected and no matching profile is found, then the adapter will remain unassociated. You can still use the Connect button from the Networks tab to connect to an available network. The Configuration Service dialog can be re-enabled from the Advanced Settings options. Notify when disabling profile management features: Check this box to display the service disabling notification dialog when another Profile Management service is detected such as Windows XP Zero Configuration or AAA clients. The notification dialog is displayed, indicating that another service has been detected and that some of the Intel(R) PROSet management features will be disabled. From this dialog, you can also choose "Dont show this again," in which case the Intel(R) PROSet features will automatically be disabled without notification. This dialog can be re-enabled from the Advanced Settings options. Features affected when another profile management application is detected For AAA Client:
Select OK, and the AAA Client application will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. To avoid conflicts, the Intel(R) PROSet profile management features have been temporarily disabled. To re-enable these features, first disable the other LAN utility and then either:
1. Re-enable from Intel(R) PROSet's Advanced Settings. 2. Resume after a computer suspend. 3. Reboot the computer. For Windows XP Zero Configuration:
Select Yes, to disable Windows XP Zero Configuration. Intel(R) PROSet will continue to manage the adapter. Select No, Windows XP will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. You can also prevent the dialog from being displayed again, in which case Windows XP Zero Configuration will automatically manage the wireless adapter. The notification dialog can be re-enabled from the Advanced Settings options. Affected Intel(R) PROSet features:
The Connect button on the Profile page is non-functioning. The Scan button can be used to scan for available networks, however, the Connect button is non-functioning when used to connect to an available network. Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is non-
functioning. Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. NOTE: If the buttons described above are used, the following message displays:
"Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features."
Scanning for Available Networks A fast way to connect to a network is to use the Scan button to search for a network access point in range of your wireless adapter. When a network is found, you can instantly connect without a profile or create a new profile. NOTE: Profiles with the Enable Auto-Import feature enabled will also be displayed in the profile list of available networks. Refer to Automatic Profile Distribution for more information. To scan for available networks:
1. From the General page, select the wireless adapter on the left side pane. 2. Select the Networks tab. 3. Click the Scan button. 4. The Available Networks dialog displays the names of the available networks. 5. Select the network from the list, and click the Connect button. Click the Refresh button to refresh the list of available networks. 6. To connect without creating a profile, click No, connect me directly without creating a profile. 7. To create a new profile using the Profile Wizard, click Yes, create a profile for this network now. 8. Click OK to connect to a network. Connecting to a Network Using an Access Point An infrastructure network consists of one or more access points and one or more computers with wireless adapters installed. Each access point must have a wired connection to the Local Area Network (LAN). The following describes how to create a new profile using the Profile Wizard and connect to an access point using the Connect button. You can also connect to a network, by using the Scan button. 1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Add button. 4. Enter the profile name in the text box. 5. Enter a network name (SSID) in the text box. 6. Select Infrastructure for the operating mode. 7. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8. Click the Configure TCP/IP and VPN settings check box and click the Next button to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked and proceed to step 11. 9. Click the Next button to select the WEP security settings. 10. Click the Password protect this profile checkbox and click Next button to access the Password Protection settings. Click Finish after the password information has been entered. If this option is not required, leave the box unchecked and proceed to step 11. 11. Click OK to save the profile settings and return to the Networks page. 12. After creating the new profile, click the profile in the Profile List. Profiles using infrastructure mode are indicated by a computer icon next to the profile name. 13. Click the Connect button to connect to the ad hoc network. Connecting to a Peer-to-Peer (Ad Hoc) Network In peer-to-peer (ad hoc) mode, you can send and receive information to other computers without using an access point. Each computer in a peer-to-peer network is called a peer. To create or join an ad hoc network, enter a personal password. Network related settings
(SSID), operating mode, WEP 128-bit encryption, and IP addresses are automatically created. Once a network connection is established, after permission rights are given by other computers in the ad hoc network, you can freely share files. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. NOTE: While scanning with an ad hoc profile set to a specific transmit channel, if an ad hoc network is found on another channel, you will be connected using the new channel. The new channel number is displayed in the Adapter Settings. Connect or Start an Ad Hoc Network Ad Hoc Profile using the Profile Wizard. NOTE: For information about connecting to an ad hoc using a profile, refer to Create an 1. Connect using an ad hoc profile. Refer to Creating a New Profile for details. Select an ad hoc profile from the Profile List and click the Connect button. This method uses a pre-defined ad hoc profile created by the Profile Wizard. The ad hoc profile is displayed in the Profile List. When joining an ad hoc network, the transmit channel established by the first computer is used. This channel may be different than the one selected when the ad hoc profile was created by the Profile Wizard. 2. Join a one-time ad hoc session without a profile. Refer to Starting an Ad Hoc (peer-to-
peer) Connection below for details. This method does not use a pre-defined profile. To connect to any ad hoc network, use the Scan button to scan for any ad hoc networks, enter the password (SSID), then click the Connect button to connect. To end the session, click the Close button to end the session. Start an Ad Hoc Network Refer to Starting an Ad Hoc (peer-to-peer) Connection below for details. This method uses your computer's SSID to establish the ad hoc network for other users to connect to. When you are the originator of an ad hoc network, all other users must use the channel and SSID. Ending an Ad Hoc Session To end an ad hoc session, click the Close button. After the session is ended, an attempt is made to re-connect to the last profile used from the Profile List. Creating an Ad Hoc Profile Using the Profile Wizard The following describes how to create a new ad hoc profile using the Profile Wizard and connect to an ad hoc network. You can also connect to a network, by using the Scan button. 1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Add button. 4. Enter the profile name in the text box. 5. Enter a network name (SSID) in the text box. 6. Select Ad Hoc for the operating mode. 7. Click the Configure TCP/IP and VPN settings check box and click the Next button to access the TCP/IP and VPN settings. If these settings are not required, leave the box unchecked and proceed to step 11. 8. Click the Next button to select the WEP security settings. 9. Click the Password protect this profile checkbox and click Next button to access the Password Protection settings. Click Finish after the password information has been entered. If this option is not required, leave the box unchecked and proceed to step 11. 10. Click OK to save the profile settings and return to the Networks page. 11. Set the Transmit channel from the Adapter tab: Channel 7 is the default transmit channel. Unless the other computers in the ad hoc network use a different channel, there is no need to change the default channel. Click the Adapter tab, and click the Configure button under Ad Hoc Channel Selection. Choose the operating band select a channel. Click OK to save the setting. 12. Select the Networks tab 13. After creating the new profile, click the profile in the Profile List. Profiles using infrastructure mode are indicated by a computer icon next to the profile name. 14. Click the Connect button to connect to the ad hoc network. Starting an Ad Hoc (peer-to-peer) Connection To communicate properly, all computers/peers on an ad hoc network must have Intel wireless adapters installed. To connect to an ad hoc network for a one-time session:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Start button. 4. Enter the password (SSID) for your computer in the text box. If you establish the ad hoc network, then this SSID and assigned transmit channel must be used by other users to connect to the ad hoc network. The entered SSID can also be the same as the other users in the established ad hoc network, in this case your computer will join the ad hoc network. 5. To join the ad hoc network, select the peer name from the displayed list of computers in the ad hoc network and click the Connect button 6. To establish an ad hoc network, after your computer's SSID is entered, click the Connect button to scan for other users in the ad hoc network 7. Under Send Files, files can be sent to another computer in the ad hoc network. To send a file, click the Send File button. Locate the file you want to sent, and click Send. 8. Click the Close button to end the ad hoc session. Disconnecting from a Network To disconnect from a network, turn the radio to OFF from the General page in Intel(R) PROSet. Switching the Adapter Off and On The wireless adapter can be switched off and on from the optional hardware radio switch on your laptop computer, Intel(R) PROSet application, and the Windows operating system. Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. Use the following methods if you need to disable the radio and use your laptop without emitting radio signals. Using the optional hardware radio on/off switch If your laptop computer has an optional external hardware switch installed, it can be used to switch the radio on or off. Refer to the laptop manufacturer for more information about this switch. If you have Intel(R) PROSet installed, the current state of the radio is displayed on the General page. Using Intel(R) PROSet to switch the radio on/off From Intel(R) PROSet, the radio can be switched on or off from the General page. The current state of the radio is displayed, which also includes the state of the optional hardware radio switch. Hardware radio switch On/Off Depending on the current state of the external optional hardware switch, displays on or off on the General page. Switching the radio On/Off Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. To switch the radio OFF: From the General page, click the Off button. next to Switch Radio On/Off. The wireless adapter is not associated with the network when the radio is off. Intel(R) PROSet can be used to edit or add profile contents when the radio is off. To switch the radio ON: From the General page, click the On button, next to Switch Radio On/Off. When the radio is on, an attempt will be made to associate with the network access point using the last profile. If the adapter cannot connect to the access point, the Configuration Service will attempt to find an available network. Refer to Configuration Service for more information. Switching the radio on or off from the Task Tray Icon Right-click on the Intel(R) PROSet task tray icon and click Switch radio Off. Using the Windows operating system to switch the radio on/off The radio can be switched on or off via the Windows operating system from the Device Properties dialog. Switching Between Wired and Wireless Adapters Adapter switching enables your computer to automatically switch between wired and the wireless adapter, so your laptop computer can maintain the best possible connection to the network while moving from one location to another. When Adapter Switching is enabled, DHCP is disabled on all other wired adapters except for the adapter currently being used. However, connection is possible using another wired adapter using an auto IP address setting. Adapter switching switches between wired and wireless adapters for the following Intel PRO adapters:
Wired LAN adapters. This type of adapter connects to a network through an Ethernet network cable. Adapter Switching supports adapters in the PRO/100 family, including the PRO/100 Mobile Adapters. Intel PRO/Wireless LAN 7100 3B Mini PCI adapter and the Intel PRO/Wireless LAN 2100 3B Mini PCI adapter. These adapter send data to and from the network through the adapter's antenna. By default, adapter switching uses the wired Ethernet adapter when both wired and wireless adapters are present and working. If you detach the wired adapter, adapter switching automatically switches to the wireless adapter. When you attach an Ethernet cable again, adapter switching automatically switches back to the wired Ethernet connection. You can change your wireless preferences from the Advanced Settings dialog and prioritize your wireless and wired adapters from the Adapter Switching dialog. You can also install multiple wired adapters, or install two wireless adapters if the network supports both 802.11a and 802.11b wireless standards. Then when you detach the wired adapter, your computer uses the wireless adapter that gives the best data rate. Wireless Preferences One or more wired adapter and one or two wireless adapter can be installed in the same computer. Using the adapter switching feature, you can select your priority for a specific type of adapter, wired or wireless. If adapter switching is enabled, the installed adapters are selected from a preference list. To access the network preferences:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Networks tab. 3. Click the Advanced button. 4. Select your preferences from the options shown. 5. Click OK to save the settings and return to the Profiles dialog. Adapter Switching Considerations Consider the following issues when switching adapters:
Adapter switching requires the use of DHCP. It cannot be used with fixed IP addressing. Only Intel wired and wireless adapters are supported when using the Start button to connect to an ad hoc network. Adapter switching cannot be used on a Virtual Private Network (VPN). Adapter switching should not be applied while an active data transfer is in progress. Intel(R) PROSet determines how many wireless adapters are present in the computer. Intel(R) PROSet supports simultaneous wireless adapter operation for the following:
o 2.4 GHz and 5 GHz installed adapters: Supports simultaneous operation in either ad hoc or infrastructure mode. o 2.4 GHz and 2.4 GHz installed adapters: Supports simultaneous operation where one adapter is in ad hoc mode and the other adapter is in infrastructure mode. Simultaneous operation with both adapters in infrastructure or ad hoc mode is not be supported. o The second adapter added is not supported. o 5 GHz and 5 GHz installed adapters: Supports simultaneous operation where one adapter is in ad hoc mode and the other adapter is in infrastructure mode. Simultaneous operation with both adapters in infrastructure mode or ad hoc is not supported. o The second adapter added is not supported. o Maximum of four adapters is supported. Switching Between 2.4 and 5 GHz Bands Intel(R) PROSet supports switching between 802.11a (5 GHz) and 802.11b (2.4 GHz) bands. Using the Advanced Settings options, you can define band priorities. Changing the Settings for Adapter Switching If you have two adapters installed, you can define the adapter to be used first. Adapter priorities can be set in the Adapter Switching dialog. To change the adapter switching settings:
1. From the General page, select the wireless adapter on the left side pane. 2. Click the Adapter Switching icon on the left side pane. 3. Click the Adapter Switching checkbox under the Settings heading. 4. Prioritize adapters in the lower adapter display list. Select an adapter in the Adapter Type list and use the up/down arrows on the left side of the dialog to arrange the adapters in priority. The adapter in the highest position is used first. 5. Click the adapter name that you want to use in the upper display list. The current adapter link status displays next to the adapter name. NOTE: One wireless adapter can be used for each band operating at a time. 6. After you have switched to the desired adapter, click OK to close the Adapter Switching dialog and return to the General tab. 5.Security Overview Wireless Security Since wireless networking devices transmit information through radio waves, it is imperative that you protect your information by configuring your security settings. There are three main components that, when used together, can protect your wireless network:
Service Set Identifier (SSID) The name of a device on a network, the SSID is the first level of security, but it is not fool-proof because the access points broadcast the SSIDs across a wireless network. This level of security is okay if you are on a peer-to-peer network without any access points, but for larger networks, more complex security measures should be put in place. Wired Equivalent Privacy (WEP) Supported by the IEEE 802.11 standard, WEP uses 64- or 128-bit encryption keys to encrypt data as it is sent or received by each client on a wireless network. The way these keys are authenticated determines the level of security on your wireless network. Using the default keys, however, makes your wireless network vulnerable and you should not use them. Authentication Server An authentication server works with each client to authenticate access with a session-specific WEP key. This type of server protects sensitive user and password information from intruders. Security Guidelines The following can help to achieve maximum security for your wireless network:
1. Enable WEP on your wireless network and change the WEP key daily or weekly. 2. Protect your drives and folders with passwords. 3. Change the default SSID. 4. Change the WEP key with each session, if possible. 5. Enable MAC address filtering, if possible. 6. Implement a Virtual Private Network (VPN) system to increase security. A VPN client is included in most operating systems. Protecting Your Network Authentication Types The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication protocols. Encryption Keys To protect client traffic, the 802.11 standard defines Wireless Encryption Privacy (WEP) with fixed encryption keys (and three optional key lengths). The use of fixed keys has made it easy to mount several types of attack against WEP. WEP Encryption You can prevent unauthorized reception of your wireless data using the IEEE 802.11 Wired Equivalent Privacy (WEP). The standard includes two levels of security, using a 64-bit key
(sometimes referred to as 40-bit) or a 128-bit key. For better security, use a 128-bit key. If you use encryption, all wireless devices on your WLAN must use the same encryption settings. Refer to Setting up WEP Encryption for more information. 802.1x A WAN client initiates an authorization request to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords) or the machine (by MAC address). IPSEC Software based IPSEC transport security. TKIP (Temporal key Integrity Protocol) Uses an encryption method called fast-packet rekeying, that changes the encryption keys frequency. Virtual Private Networks (VPN) The following VPN client software is supported by PROSet. Refer to Virtual Private Network
(VPN) for more information. Netstructure VPN (SST) Netstructure VPN (IPsec-IKE) Cisco 3000 VPN Checkpoint VPN (Non office transparent mode, connect office mode and connect non-
office mode) Microsoftt VPN (L2TP over IPsec transport, L2TP for configuration with ESP-in-UDP) 802.11a and 802.11b can be augmented with VPN security to protect TCP/IP based services. 6.Setting Up WEP Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point. Supported authentication schemes are Open and Shared-Key authentication:
Shared-Key authentication is supported using 64-bit and 128-bit WEP encryption keys. Open mode does not use an encryption authentication method to associate to a specific access point. Encryption Overview Security in the WLAN can be achieved by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically. You have the option of either using a pass phrase or entering a WEP key manually. Using 64-bit encryption, the pass phrase is 5 characters long and you can choose to enter any arbitrary and easy to remember phrase like Acme1 or enter 10 Hexadecimal numbers for the WEP key corresponding to the network the user wants to connect to. For 128-bit encryption, the pass phrase is 13 characters long or you can enter a 26 hexadecimal numbers for the WEP key to get connected to the appropriate network. Note: You must use the same encryption type, key index number, and WEP key as other devices on your wireless network. Also, if 802.1x authentication is being used, WEP encryption must be disabled. To enable 64-bit (40-bit) or 128-bit encryption with authentication:
1. Select the wireless adapter in the left-side pane. 2. From the General page, click the Networks tab. 3. Select the profile from the Profile List and click the Edit button or click the Add button if you are using the Profile Wizard. 4. Click the Security tab. Select Security Settings, the third dialog if using the Profile Wizard. 5. Select Shared from the Network Authentication drop-down box. 6. Select 64-bit or 128-bit from the Encryption Level drop-down box. 7. Select a key index number 1, 2, 3, or 4 from the Encrypt data with key index drop-down box to use for encryption. Key selection corresponds to the WEP encryption pass phrase or WEP key. 8. Select either of the following:
Pass phrase: Click Use Pass Phrase to enable it. Enter a text phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters
(0-9, a-z or A-Z), in the pass phrase field. WEP key: Click Use WEP Keys to enable it. Enter up to ten (using 64-bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-
bit) alphanumeric characters, 0-9, A-F in the WEP key field. 9. Click OK if editing a profile or Finish if in the Profile Wizard to save the settings. NOTE: You must use the same encryption type, index number, and WEP key as other devices on your wireless network. 7.Troubleshooting Using a Profile with an incorrect WEP Encryption Key When connected to an access point using a profile with an incorrect WEP key encryption, the task tray icon and the General page will both indicate good signal strength and that you are associated with the AP. However, when you attempt to send data to the AP using this profile, because of the incorrect WEP key encryption, authentication cannot be established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key:
A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point. No data transfer Open Authentication with no WEP encryption:
Allows association to an access point Data transfer is allowed Shared Authentication:
Associated to an AP always allows data transfer. Problems with installation Windows does not detect the wireless adapter:
1. Remove and re-install the adapter. 2. Uninstall and reinstall the adapter's drivers. Before calling Customer Support Make a note of the following answers before calling customer support:
How many remote units do you have talking to each access point?
What channels are you using, and how are they dispersed?
How much coverage overlap is there between access points?
How high above the floor are the access points mounted?
What revision of Intel(R) PROSet software or other LAN software are you running?
What other electronic equipment is operating in the same band?
What construction materials are used in wall and floors?
Users are dropped from the wireless network Suggested causes and solutions:
Find out if a person or workgroup moved or if the building has been rearranged. If two or more users are seated too close to each other, performance can suffer. Instruct your users to space themselves a small distance apart to keep receivers from being overloaded. Delivery trucks with very large metal sides can affect performance by reflecting destructive signals back into a building. If you have an installation that includes a shipping dock, check to see if the problem coincides with the arrival of large trucks. Personal systems can also interfere with your network. Wireless speakers, cordless earphones, some Bluetooth devices, and similar systems can be the source of an infrequent but hard to find the problem. Some systems do not conform to wireless regulations. Shut off suspect devices or remove them from the area. If possible, remove and reinstall your new software. Conflicts with other resident software packages are always a possibility, and they are not always the fault of the newest addition. Sometimes just starting over fixes the problem. Swap units around. Does your problem follow the changed units, or is it unique to a specific location? If it follows the product, the swapped unit could be damaged, or improperly configured. If the problem stays with the location, try to find out what is different about that particular room or area. Range decreases as data rate increases This is a normal condition. Range is inversely proportional to data rate: the faster the data, the shorter the range. This has to do with the modulation technology used. Very fast data rates require extremely complex signal waveforms, where even minor distortions can result in data errors. Slower data rates are much more tolerant, and consequently will get through even in the presence of some amount of noise, interference, distortion and echo. Signal doesn't pass through a short or thin wall Range is highly dependent on the physical environment. In a line-of-sight location, with elevated and calibrated antennas, range predictions are quite accurate. This is not true in a typical office building, where the walls may be simple drywall (which is almost transparent to microwaves), or could be plaster with metal underneath. Most sites are somewhere between these two extremes, and consist of a mixture of surfaces. You cant tell what is inside a wall by just looking at it, and we cant tell you exactly what distance you will achieve. Consider published range information to be typical, average, common or usual. Do not expect it to be exact. Signal strength drops when a cell phone is used in the area Range also depends on the electronic environment. If other equipment that could cause interference is nearby, the range of your transceiver could vary widely, and could change suddenly when the other equipment activates. This is particularly true for 802.11b installations, which share their frequencies with microwave ovens, cordless phones, wireless hi-fi speakers, electronics toys and similar devices. Try to keep your system away from other transmitters, and from other sources of electrical noise, such as large motors, spot welders, and similar electronically noisy devices. Range is shorter than it should be Repeat some tests late in the evening, or on a weekend, when there may be less interference. However, some users leave their networks turned all the time so this test is not foolproof. By all means, try more than one channel. Your range problem may just be a nearby user whose system uses your present test channel. Interference from fluorescent lights If you mount an access point close to fluorescent light fixtures, the lamp glow appears constant, but inside the lamp tube, ionization appears and disappears 120 times a second. This can modulate or chop an incoming signal and interfere with reception. When too much range is undesirable Too much range is not necessarily a good thing. At first it would appear that you would want as much range as possible, but with the increase in range comes an increase in interference potential, as your unit hears not only your other units but also manages to hear the systems of other companies up and down the street. If you have a large installation, you will also wind up with more than one access point using the same channel. If a remote unit hears two or more access points, this will slow the network Prevent access to wireless networks from outside the building Excess transmit range presents a special reverse problem. For example, putting an access point adjacent to a second floor bay window invites anyone with the right software on the street below to pick up and enjoy all network transmissions. We discuss some possible solutions to this problem further on. Problems with Network Connectivity If you cannot connect to the wireless network, try the following:
Check Network Settings 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. From the General page, check that the Network Name (SSID) and operating mode are correct. If the laptop is configured for ad hoc networking, make sure that the channel is correct. 3. To correct these settings, click the Networks tab. 4. Select the profile being used. 5. Click the Edit button and make the changes. Check Security Settings 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. From the General page, check that the security settings are correct. 3. To correct the security settings, click the Networks tab. 4. Select the profile being used. 5. Click the Edit button. 6. Click the Security tab. Make sure that the settings for WEP encryption are correct. Check Adapter Switching 1. Select the wireless adapter in the Intel(R) PROSet left side pane. 2. Select the Adapter Switching icon. 3. Check that the adapter is "Linked" to the network. Checking Adapter Statistics Adapter Statistics If the adapter is communicating with an access point (infrastructure mode) or other computers in peer-to-peer mode, click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information. 8.Specifications Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter Model WM3B2100 Physical Characteristics Form Factor Dimensions (HxWxD) Mini PCI Type 3B (model WM3B2100) Type 3B card: 2.34 in x 1.75 in x 0.20 in (59.45 mm x 44.45 mm x 5 mm) 0.6 oz (17 g) Hirose U.FL-R-SMT mates with cable connector U.FL-LP-
066 On-board dual diversity switching 124-pin SO-DIMM edge connector 0 to +70 degrees Celsius 50 to 85% non-condensing 2.4 GHz (802.11b) 2.4 GHz to 2.497 GHz CCK, DQPSK, DBPSK 2.4 GHz ISM: Direct Sequence Spread Spectrum
(DSSS) 11 channel support 11, 5.5, 2, 1 Mbps 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps 16 dBm (typical) 1.6 W 1.0 W Weight Antenna Interface Connector Dual Diversity Antenna Connector Interface Operating Temperature Humidity Frequency Modulation Frequency band Modulation Wireless Medium Channels Data Rates Indoor Range Outdoor Range Power Transmit Output Power Adapter Power Consumption Transmit Receive Standby Sleep Voltage Operating Systems WECA WHQL WLAN Standard Architecture Roaming 135 mW 45 mW 3.3 V Windows* XP, 2000, 98, 98SE, Me, NT 4.0 WiFi certification for 802.11b Yes IEEE 802.11b Infrastructure or ad hoc (peer-to-peer) 802.11b compliant for seamless roaming between respective access points (802.11b) LEAP, TKIP, 802.1x, EAP-TLS, 128-bit and 64-bit WEP UL, C-UL, CB (IEC 60590) Security Product Safety 9.Glossary Numerical 802.11 x: A series of IEEE specifications for LANs: currently 802.11b, 802.11a, and 802.11g. Using any one of these extensions to the 802.11 standard permits wireless communication between a client and an access point or between two clients. The various specifications govern transmission speeds and radio frequencies as well as fall-back rates and other characteristics. The upcoming standard 802.11i will provide additional security specific to WLANs, and 802.11e will address quality of service. A Access Point: A device that serves as a communications hub for wireless clients and provides a connection to a wired LAN. Advanced Encryption Standard (AES): A federal information-processing standard, supporting 128-, 192-, and 256-bit keys. B Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions. Bluetooth: An incompatible, very short-range lower speed communications system (PAN), developed first in Europe as a cable replacement for printers and similar peripheral connections. Its usage has expanded to include cordless earphones and similar devices. It uses the 2.4 GHz ISM band, and co-exists with 802.11b. Here the term, co-exist means that not all researchers agree on the amount of mutual interference generated when both systems operate in the same location. Broadcast SSID: Used to allow an access point to respond to clients on a wireless network by sending probes. D Data Rate (Information Rate): Not all bits carry user information. Each group (packet) of bits contains headers, trailers, echo control, destination information, and other data required by the transmission protocol. It is important to understand the difference between bit rate and data rate, since the overhead information may consume more than 40% of the total transmission. This difference is common to many such data systems, including Ethernet. Direct-Sequence Spread Spectrum (DSSS) and Frequency-Hop Spread Spectrum (FHSS):
Two incompatible technologies used in radio transmission. E Extensible Authentication Protocol (EAP): An authentication protocol that supports multiple authentication methods, such as Kerberos, passwords, or smart cards. Cisco's authentication protocol, LEAP, is based on EAP, an extension to PPP (Point-to-Point Protocol). Encryption: Scrambling data so that only the authorized recipient can read it. Usually a key is needed to decrypt the data. Extended Service Set IDentifier (ESSID): A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet. This allows the AP to recognize each wireless client and its traffic. F Frequencies: Strike a piano key and you generate a tone. Pick up the tone with a microphone and your tone turns in to a vibrating or cycling electronic signal. The rate of vibration depends on the key struck. In electronics we refer to this rate of vibration as the number of cycles per second. The formal term for this value is Hertz. As we move up in rate, such as in the Broadcast Band, we can use Kilohertz (KHz) to represent 1,000 Hz, or Megahertz (MHz) to represent 1,000,000 Hz. Continuing much further upward, we finally reach 1,000,000,000 Hz, which we can fortunately shorten to a Gigahertz (GHz). These frequencies are the home of both 802.11a (5 GHz) and 802.11b (2.4 GHz). I Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Mode: A wireless network centered around an access point. In this environment, the access point not only provides communication with the wired network but also mediates wireless network traffic in the immediate neighborhood. Institute of Electrical and Electronics Engineers (IEEE): An organization involved in setting computing and communications standards. ISM Bands: A series of frequency bands, set aside by the FCC for Industrial, Scientific and Medical applications. Users of these bands operate equipment on a shared basis, meaning that they must expect, and accept interference from other legal users. Products manufactured for ISM Band use must be approved by the FCC, but the user does not have to be licensed. In addition to WLAN, ISM bands support cordless phones, microwave ovens, baby monitors, toys, ham radio transceivers, and other wireless services. K Kerberos: An authentication system enabling protected communication over an open network using a unique key called a ticket. M Media Access Control (MAC) Address: A hardwired address applied at the factory. It uniquely identifies network hardware, such as a wireless PC Card, on a LAN or WAN. Microcell: A bounded physical space in which a number of wireless devices can communicate. Because it is possible to have overlapping cells as well as isolated cells, the boundaries of the cell are established by some rule or convention. Microwave: Technically, the term describes any frequency above 1.0 GHz. Unfortunately the advertising industry has contorted this meaning considerably. In our discussion we will stick to the technical definition. Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. O Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. P Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point. Personal Area Network (PAN): A personal area network, or PAN, is a networking scheme that enables computing devices such as PCs, laptop computers, handheld personal computers, printers and personal digital assistants (PDAs) to communicate with each other over short distances either with or without wires. Preamble: A preliminary signal transmitted over a WLAN to control signal detection and clock synchronization. R Radio Frequency (RF) Terms (GHz, MHz, Hz): The international unit for measuring frequency is Hertz (Hz), which is equivalent to the older unit of cycles per second. One Mega-Hertz (MHz) is one million Hertz. One Giga-Hertz (GHz) is one billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz. Range: The distance over which a given system can communicate. This subject is discussed in detail below. RC4: An encryption algorithm designed at RSA Laboratories; specifically, a stream cipher of pseudo-random bytes that is used in WEP encryption. Remote Authentication Dial-In User Service (RAID): An authentication and accounting system that verifies users' credentials and grants access to requested resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. S Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first units transmitted signal. By moving the transmitter around, and repeating the plots, you can develop a plan as to the best locations for access points. You will also identify dead zones and other areas in need of special attention. This can be a long, slow process, but it beats ripping up an unsatisfactory installation and starting over. These tests require special software commands. Refer to your manual for specific instructions. If you have a very large, or unusually complex installation situation, you might want to consider calling in professionals to do your survey. We are not permitted to suggest installer names, but you can check your yellow pages or similar sources for likely candidates. T Transceiver: A commonly used term that describes a combination transmitter and receiver. Both 802.11a and 802.11b devices would be properly described as data transceivers. U UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing. W WECA: The Wireless Ethernet Compatibility Alliance... WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. It is extremely important to understand that WEP is not some CIA-proof supercode! It performs as intended, giving the user a simple level of data security and protection from casual electronic eavesdropping. Use of the 128 bit option at all possible times is recommended. Remember that 802.11 devices transmit
(broadcast) in all directions, and that it is possible, with very complex software, to copy and decode WEP transmissions. The task is not trivial, but it is possible. If your data is extremely sensitive, you should consider some form of secondary protection, such as strong passwords and an additional level of encryption. Suitable software packages are available from reputable suppliers. Although not intended by the original architects, WEP also prevents unauthorized access to your system by an outsider. Hackers have been known to access systems from outside a building, and to then to access the Web for a leisurely session, all at the system owners expense. Wide Area Network (WAN): A wide area network (WAN) is a voice, data, or video network that provides connections from one or more computers or networks within a business to one or more computers or networks that are external to such business. Wireless: A microwave transceiver system. Wireless LAN (WLAN): Wireless LAN is a type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. WLAN is a flexible data communication system used as an alternative to, or an extension of a wired LAN. Wireless Node: A user computer with a wireless network interface card (adapter). 10.Customer Support Intel support is available online or by telephone. Available services include the most up-to-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.com 11.Software License Agreement INTEL SOFTWARE LICENSE AGREEMENT IMPORTANT - READ BEFORE COPYING, INSTALLING OR USING Do not use or load this software and any associated materials (collectively, the
"Software") until you have carefully read the following terms and conditions. By loading or using the Software, you agree to the terms of this Agreement. If you do not agree with the terms of this Agreement, do not install or use the Software. LICENSE. You may copy the Software onto a single computer for your personal, non-
commercial use, and you may make one back-up copy of the Software, subject to these conditions:
1. This Software is licensed for use only in conjunction with Intel component products. Use of the Software in conjunction with non-Intel component products is not licensed hereunder. 2. You may not copy, modify, rent, sell, distribute or transfer any part of the Software except as provided in this Agreement, and you agree to prevent unauthorized copying of the Software. 3. You may not reverse engineer, decompile, or disassemble the Software. 4. You may not sublicense or permit simultaneous use of the Software by more than one user. 5. The Software may contain the software or other property of third party suppliers, some of which may be identified in, and licensed in accordance with, any enclosed
"license.txt" file or other text or file. OWNERSHIP OF SOFTWARE AND COPYRIGHTS. Title to all copies of the Software remains with Intel or its suppliers. The Software is copyrighted and protected by the laws of the United States and other countries, and international treaty provisions. You may not remove any copyright notices from the Software. Intel may make changes to the Software, or to items referenced therein, at any time without notice, but is not obligated to support or update the Software. Except as otherwise expressly provided, Intel grants no express or implied right under Intel patents, copyrights, trademarks, or other intellectual property rights. You may transfer the Software only if the recipient agrees to be fully bound by these terms and if you retain no copies of the Software. LIMITED MEDIA WARRANTY. If the Software has been delivered by Intel on physical media, Intel warrants the media to be free from material physical defects for a period of ninety (90) days after delivery by Intel. If such a defect is found, return the media to Intel for replacement or alternate delivery of the Software as Intel may select. EXCLUSION OF OTHER WARRANTIES. EXCEPT AS PROVIDED ABOVE, THE SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY EXPRESS OR IMPLIED WARRANTY OF ANY KIND INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE. Intel does not warrant or assume responsibility for the accuracy or completeness of any information, text, graphics, links or other items contained within the Software. LIMITATION OF LIABILITY. IN NO EVENT SHALL INTEL OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, OR LOST INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF INTEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS PROHIBIT EXCLUSION OR LIMITATION OF LIABILITY FOR IMPLIED WARRANTIES OR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM JURISDICTION TO JURISDICTION. TERMINATION OF THIS AGREEMENT. Intel may terminate this Agreement at any time if you violate its terms. Upon termination, you will immediately destroy the Software or return all copies of the Software to Intel. APPLICABLE LAWS. Claims arising under this Agreement shall be governed by the laws of California, excluding its principles of conflict of laws and the United Nations Convention on Contracts for the Sale of Goods. You may not export the Software in violation of applicable export laws and regulations. Intel is not obligated under any other agreements unless they are in writing and signed by an authorized representative of Intel. GOVERNMENT RESTRICTED RIGHTS. The Software is provided with "RESTRICTED RIGHTS." Use, duplication, or disclosure by the Government is subject to restrictions as set forth in FAR52.227-14 and DFAR252.227-7013 et seq. or their successors. Use of the Software by the Government constitutes acknowledgment of Intel's proprietary rights therein. Contractor or Manufacturer is Intel Corporation, 2200 Mission College Blvd., Santa Clara, CA 95052. 12.Safety and Regulatory Notices undesired operation. This notebook has been tested and certified to FCC part 15 and RSS 210 for operation of the Wireless LAN device. FCC Part 15 Declaration of Conformity (DoC) This device is herewith confirmed to comply with the requirements of FCC Part 15 rules. The operation is subject to the following two conditions:
1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause FCC Rules and Regulations - Part 15 Warning: This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the Federal Communications Commissions Rules and Regulation. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
Relocate your WLAN and Bluetooth equipped laptop computer. Increase the separation between the WLAN and Bluetooth equipped laptop computer and other electronics. Connect the WLAN and Bluetooth equipped laptop computer into an outlet on a circuit different from that of other electronics. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The RF transmission power from the antenna conforms to the general public FCC limit of SAR (Specific Absorption Rate) 1.6 W/kg. The maximum SAR value measured from this device was 0.36 W/kg. This device must not be co-located or operating in conjunction with any other antenna or transmitter Canadian Notice To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing."
13.Limited Warranty Users are not authorised to modify this product. Any modifications invalidate the Warranty. This equipment may not be modified, altered or changed in any way without signed written permission from Fujitsu. Unauthorised modification will void the equipment authorisation from the FCC and Industry Canada and the warranty. Limited Lifetime Hardware Warranty Intel warrants to the original owner that the adapter product delivered in this package will be free from defects in material and workmanship. This warranty does not cover the adapter product if it is damaged in the process of being installed or improperly used. THE ABOVE WARRANTY IS IN LIEU OF ANY OTHER WARRANTY, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF NONINFRINGEMENT OF INTELLECTUAL PROPERTY, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. This warranty does not cover replacement of adapter products damaged by abuse, accident, misuse, neglect, alteration, repair, disaster, improper installation, or improper testing. If the adapter product is found to be defective, Intel, at its option, will replace or repair the hardware product at no charge except as set forth below, or refund your purchase price provided that you deliver the adapter product along with a Return Material Authorization (RMA) number (see below), along with proof of purchase (if not registered), either to the dealer from whom you purchased it or to Intel with an explanation of any deficiency. If you ship the adapter product, you must assume the risk of damage or loss in transit. You must use the original container (or the equivalent) and pay the shipping charge. Intel may replace or repair the adapter product with either new or reconditioned parts, and any adapter product, or part thereof replaced by Intel becomes Intel's property. Repaired or replaced adapter products will be returned to you at the same revision level as received or higher, at Intel's option. Intel reserves the right to replace discontinued adapter products with an equivalent current generation adapter product. Returning a Defective Product From North America:
Before returning any adapter product, contact Intel Customer Support and obtain a Return Material Authorization (RMA) number by calling +1 916-377-7000. If the Customer Support Group verifies that the adapter product is defective, they will have the RMA department issue you an RMA number to place on the outer package of the adapter product. Intel cannot accept any product without an RMA number on the package. All other locations:
Return the adapter product to the place of purchase for a refund or replacement. Intel Adapter Money-back Guarantee (North America Only) Intel wants you to be completely satisfied with the Intel adapter product that you have purchased. Any time within ninety (90) days of purchase, you may return your Intel adapter to the original place of purchase for a full refund of the purchase price from your dealer. Resellers and distributors, respectively, accepting returns and refunding money back to their customers may return Intel adapters to their original place of purchase. Intel guarantees that it will accept returns under this policy and refund the original purchase price to customers purchasing directly from Intel. Limitation of Liability and Remedies INTEL'S SOLE LIABILITY HEREUNDER SHALL BE LIMITED TO DIRECT, OBJECTIVELY MEASURABLE DAMAGES. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY FOR ANY INDIRECT OR SPECULATIVE DAMAGES (INCLUDING, WITHOUT LIMITING THE FOREGOING, CONSEQUENTIAL, INCIDENTAL, AND SPECIAL DAMAGES) INCLUDING, BUT NOT LIMITED TO, INFRINGEMENT OF INTELLECTUAL PROPERTY, REPROCUREMENT COSTS, LOSS OF USE, BUSINESS INTERRUPTIONS, LOSS OF GOODWILL, AND LOSS OF PROFITS, WHETHER ANY SUCH DAMAGES ARISE OUT OF CONTRACT NEGLIGENCE, TORT, OR UNDER ANY WARRANTY, IRRESPECTIVE OF WHETHER INTEL HAS ADVANCE NOTICE OF THE POSSIBILITY OF ANY SUCH DAMAGES. NOTWITHSTANDING THE FOREGOING, INTEL'S TOTAL LIABILITY FOR ALL CLAIMS UNDER THIS AGREEMENT SHALL NOT EXCEED THE PRICE PAID FOR THE PRODUCT. THESE LIMITATIONS ON POTENTIAL LIABILITIES WERE AN ESSENTIAL ELEMENT IN SETTING THE PRODUCT PRICE. INTEL NEITHER ASSUMES NOR AUTHORIZES ANYONE TO ASSUME FOR IT ANY OTHER LIABILITIES. Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitations may not apply to you. Critical Control Applications: Intel specifically disclaims liability for use of the adapter product in critical control applications (including, for example only, safety or health care control systems, nuclear energy control systems, or air or ground traffic control systems) by Licensee or Sublicensees, and such use is entirely at the user's risk. Licensee agrees to defend, indemnify, and hold Intel harmless from and against any and all claims arising out of use of the adapter product in such applications by Licensee or Sublicensees. Software: Software provided with the adapter product is not covered under the hardware warranty described above. See the applicable software license agreement which shipped with the adapter product for details on any software warranty. 14.Legal Notice Copyright (C) 2001-2003, Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.
*Other names and brands may be claimed as the property of others. Intel(R) is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries.
1 | User Manual | Users Manual | 2.04 MiB |
FCC ID: EJE-WL0003 (IC: 337J-WL0003) Report No. M030949_Certification_Ocampa_Calexico EMC Technologies Report Number M030949_Certification_Ocampa_Calexico APPENDIX N - USER MANUAL EMC Technologies Pty Ltd 57 Assembly Drive, Tullamarine VIC 3043 Australia www.emctech.com.au Ocampa_UG_Active B.book Page i Monday, September 29, 2003 5:04 PM C o p y r i g h t Fujitsu PC Corporation has made every effort to ensure the accuracy and completeness of this document. Because ongoing development efforts are made to continually improve the capabilities of our products, however, the data contained herein represents Fujitsu design objectives and is provided for comparative purposes; actual results may vary based on a variety of factors. This product data does not constitute a warranty. Specifications are subject to change without knowledge. Fujitsu and the Fujitsu logo are registered trademarks of Fujitsu Limited; Stylistic is a registered trademark of Fujitsu PC Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation. PCMCIA and CardBus are registered trademarks of the Personal Computer Memory Card International Associa-
tion. Intel, Pentium, and SpeedStep are registered trademarks of Intel Corporation. Atheros is a registered trademark of Atheros Communi-
cations, Inc. Kensington and MicroSaver are registered trademarks of the Kensington Technology Group. Wi-Fi is a trademark of the Wireless Ethernet Compati-
bility Alliance (WECA). All other products are trademarks or registered trade-
marks of their respective companies. Warning Handling the cord on this product will expose you to lead, a chemical known to the State of California to cause birth defects or other reproductive harm. Wash hands after handling. Copyright 2002 - Fujitsu PC Corporation. All rights reserved. No part of this publication may be copied, reproduced, or translated, without the prior written consent of Fujitsu PC Corporation. No part of this publi-
cation may be stored or transmitted in any electronic form without the prior consent of Fujitsu PC Corpora-
tion B5FH-TBD-02EN-00 DECLARATION OF CONFORMITY according to FCC Part 15 Responsible Party Name:
Address:
Telephone:
Declares that product:
Fujitsu PC Corporation 5200 Patrick Henry Drive Santa Clara, CA 95054 408-982-9500 Model Series: Stylistic ST5000 Tablet PC Complies with Part 15 of the FCC Rules This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and, (2) This device must accept any interference received, including interference that may cause undesired operation. Note:
For more detailed information about the FCC rules and their applicability to the Stylistic ST5000 Series Tablet PC, refer to Chapter 5 of this document. Ocampa_UG_Active B.book Page ii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C - U s e r s G u i d e Ocampa_UG_Active B.book Page i Monday, September 29, 2003 5:04 PM T a b l e o f C o n t e n t s Table of Contents PREFACE About This Guide . v Fujitsu Contact Information . v Warranty Information . v 1 GETTING STARTED WITH YOUR TABLET PC In-box Items for the Stylistic ST5000 Series Tablet PC . 1 Optional Accessories . 2 Stylistic Tablet PC Features. 3 Status Display. 8 Application Buttons . 10 Navigation Buttons. 12 Tertiary Functions of Application and Navigation Buttons. 13 Security Functions of Application Buttons. 14 Setting up the Security Panel . 14 Passwords . 14 Using Your Security Panel . 15 Precautions . 15 Uninstalling the Security Panel Application . 15 Connectors and Peripheral Interfaces . 17 2 USING YOUR TABLET PC System States. 21 Powering Up the Tablet PC . 22 Shutting Down the System. 22 Suspending System Operation . 22 Resuming System Operation . 24 Adjusting the Display Brightness. 24 Using the Pen. 24 Calibrating the Pen. 25 Installing a Pen Tether . 25 Replacing the Pen Tip . 25 Charging the Battery . 26 Removing and Installing the Battery. 26 Tips for Conserving Battery Power . 27 Modem Connection . 27 PC Card Slot . 27 Removing and Installing Memory Modules . 28 3 CARE AND MAINTENANCE Protecting the Display Screen. 31 Storing the Tablet PC. 32 Avoiding Overheating . 32 Cleaning the Display Screen. 32 Troubleshooting. 32 Restoring Your Pre-Installed Software . 33 Drive Image Special Edition (DISE) . 33 4 SPECIFICATIONS Physical Specifications . 39 Processing Specifications . 39 Memory/Storage Specifications . 39 Display Specifications. 39 Interface Specifications . 39 Power Specifications . 40 Environmental Specifications . 40 Agency Approval Specifications . 40 Additional Specifications . 40 5 AGENCY NOTICES Notices . 43 Ocampa_UG_Active B.book Page ii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e APPENDIX:
WIRELESS LAN USERS GUIDE Before Using the Wireless LAN For better communications. 51 Stopping transmission . 52 Starting Transmission . 52 Connecting the WLAN Flow of operations . 53 Preparation for wireless LAN connection . 53 Connection to the network . 55 Other settings Setting of power-saving function . 59 Troubleshooting the WLAN Troubleshooting. 60 Wireless LAN Glossary Glossary . 62 IP address information Additional information . 64 WLAN Specifications Specification. 65 INDEX Index . 67 Ocampa_UG_Active B.book Page iii Monday, September 29, 2003 5:04 PM Preface Ocampa_UG_Active B.book Page iv Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e Ocampa_UG_Active B.book Page v Monday, September 29, 2003 5:04 PM Preface ABOUT THIS GUIDE The Stylistic ST5000 Series Tablet PC is a high-
performance, pen-based computer that has been designed to support Microsoft Edition. Windows XP Tablet PC This manual explains how to operate your Fujitsu Stylistic ST5000 Series Tablet PCs hardware and built-in system software. The Stylistic ST5000 Series Tablet PC is a completely self-
contained unit with an active-matrix (TFT) color LCD display and an active digitizer. It has a powerful interface that enables it to support a variety of optional features. Conventions Used in the Guide Keyboard keys appear in brackets. Example: [Fn], [F1], [ESC], [ENTER] and [CTRL]. Pages with additional information about a specific topic are cross-referenced within the text. Example: (See page xx.) On screen buttons or menu items appear in bold Example: Click OK to restart your Tablet PC. DOS commands you enter appear in Courier type. Example: Shut down the computer?
The information icon highlights information that will enhance your understanding of the subject material. The caution icon highlights information that is important to the safe operation of your computer, or to the integrity of your files. Please read all caution information carefully. The warning icon highlights information that can be hazardous to either you, your computer, or your files. Please read all warning information carefully. P r e f a c e FUJITSU CONTACT INFORMATION Service and Support You can contact Fujitsu Service and Support in the following ways:
Toll free: 1-800-8Fujitsu (1-800-838-5487) Fax: 408-764-2724 E-mail: 8fujitsu@fujitsupc.com Web site: http://www.fujitsupc.com Before you place the call, you should have the following information ready so the customer support representative can provide you with the fastest possible solution:
Product name Product configuration number Product serial number Purchase date Conditions under which the problem occurred Any error messages that have occurred Hardware configuration Type of device connected, if any Fujitsu Online You can go directly to the online Fujitsu product catalog for your Tablet PC by going to the Fujitsu Web site at:
http://www.fujitsupc.com You must have an active internet connec-
tion to use the online URL links. WARRANTY INFORMATION Your Stylistic ST5000 Series Tablet PC is backed an Inter-
national Limited Warranty. Check the service kit that came with your system for warranty terms and condi-
tions. Ocampa_UG_Active B.book Page vi Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e Ocampa_UG_Active B.book Page vii Monday, September 29, 2003 5:04 PM 1 Getting Started with Your Tablet PC Ocampa_UG_Active B.book Page viii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Ocampa_UG_Active B.book Page 1 Monday, September 29, 2003 5:04 PM Getting Started with Your Stylistic Tablet PC G e t t i n g S t a r t e d Figure 1-1. Stylistic ST5000 Series Tablet PC The Stylistic ST5000 Series Tablet PC is a high-
performance, pen-based computer that has been designed to support Microsoft XP Tablet PC Edition. This chapter provides an overview of the Stylistic ST5000 Series Tablet PC and its features. Windows IN-BOX ITEMS FOR THE STYLISTIC ST5000 SERIES TABLET PC Verify that the following items are included in the box with your Tablet PC:
Stylistic ST5000 Series active pen
Pen tips (quantity: 5)
Pen tether
Main battery
Power cord
AC adapter
Screen protectors (quantity: 2) 1 Ocampa_UG_Active B.book Page 2 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e OPTIONAL ACCESSORIES The following optional accessories can be used with the Stylistic ST5000 Series Tablet PC. Refer to the instructions provided with these accessories for details on their use. Peripheral/Accessory Fujitsu Part Number Docking Options Stylistic ST5000 Series Tablet Dock, with CD-ROM drive FPCPRTBD Stylistic ST5000 Series Tablet Dock, with Combo DVD/CD-RW drive FPCPRTBD Carrying Cases Stylistic ST5000 Series Executive Leather Portfolio Case Stylistic ST5000 Series Ballistic Nylon Road Warrior Case Stylistic ST5000 Series Bump Case Harsh Environment Case Storage Options External USB Floppy Disk Drive Memory 256MB SO DIMM, DDR333 512MB SO DIMM, DDR333 128MB Compact Flash Card 256MB Compact Flash Card Compact Flash Card Adapter Power Options AC Adapter with US Cord Main Battery Auto/Airline Adapter Battery Charger Additional Accessories Wireless Keyboard USB Keyboard Wireless Mouse Stylistic ST5000 Series Pen (2-pack) Screen Protectors (12-pack) FPCCCTBD FPCCCTBD FPCCCTBD FPCCCTBD FPCFDD12 FPCEMTBD FPCEMTBD FPCEMC02 FPCEMC03 FPCCFA01 FPCAC23 FPCBP63TBD FPCAA02 FPCBC06 FPCKBTBD FMWKB5A FPCMO07 FPCPN07AP FPCSPTBD
* For the latest list of accessories available for your Stylistic ST5000 Series Tablet PC, be sure to frequently check the Fujitsu Web site at: www.fujitsupc.com. Table 1-1. Stylistic ST5000 Series Optional Accessories 2 Ocampa_UG_Active B.book Page 3 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d STYLISTIC TABLET PC FEATURES Features and controls that you use to operate the Stylistic ST5000 Series Tablet PC are outlined below and illustrated in Figures 1-1 through 1-5. Details on using these features and controls are provided later in this manual. Power On/Suspend/
Resume Button System Status LEDs Speaker IrDA/FIR Port User-Programmable Application Buttons Application Buttons Built-in Microphone Infrared Keyboard/
Mouse Port Navigation Buttons Figure 1-2. Stylistic ST5000 Series Tablet PC Features (Front View) Front Features:
1
System status LEDs: Indicate the operational status of the Tablet PC and hard disk drive and the charge level of the battery.
Power On/Suspend/Resume button: Allows you to turn on, off, suspend, resume, hibernate or wake the Tablet PC in order to optimize battery life.
Infrared keyboard/mouse port: The infrared port wraps around the front and bottom of the display, and is used for communicating with a proprietary infrared keyboard or mouse.
Application buttons: Allow you to quickly launch pre-defined applications and utilities by pressing a button.
Navigation buttons: The navigation buttons allow you to move: Page Up/Page Down, Tab Right/Tab Left, Cursor Up/Cursor Down, and Cursor Right/
Cursor Left.
IrDA/FIR port: Provides an infrared interface for communication with devices compliant with IrDA Standard Revision 1.1.
Speaker: Allows you to listen to mono audio files.
Built-in Microphone: The built-in microphone allows you to input mono audio. These peripherals and accessories are sold separately. 3 Ocampa_UG_Active B.book Page 4 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Tablet Dock Latch Point System Interface Connector Latch Point Memory Module Cover Tablet Dock Latch Point Wireless LAN On/Off Switch Battery Release Latch Thermal Suede Wireless LAN On/Off Switch*
Wireless LAN Antenna*
(inside case) Wireless LAN and/or Modem Module Cover*
Hard Disk Drive Cover Battery Figure 1-3. Stylistic ST5000 Series Tablet PC Features (Back View)
* The system is configured with one of two modules: a standard modem module or an optional wireless LAN/LAN/modem combo module. Back Features:
System interface connector: Allows you to connect the optional Stylistic Tablet Dock.
Removable battery: Can be removed and replaced with a charged battery.
Battery release latch: Used to release the removable battery.
Tablet Dock latch point: Allows you to attach the system to an optional Tablet Dock. 1 not be removed. It is designed to minimize the temperature of the system for the user when a running system is carried for a period of time.
Wireless LAN module cover: Provides protection for the optional wireless LAN radio solution.
Wireless LAN On/Off switch: For systems with a wireless device installed, this switch turns the device on and off. You should switch the device off when it is not in use in order to maximize battery life.
Hard disk drive cover: Covers the hard disk drive
Memory module cover: Removable cover over the module. memory modules. These peripherals and accessories are sold separately.
Thermal Suede: Several areas of the system back are covered with thermal suede. This material should 4 Ocampa_UG_Active B.book Page 5 Monday, September 29, 2003 5:04 PM Pen Holder Smart Card Slot SD Card Slot Air flow vents G e t t i n g S t a r t e d PC Card Slot PC Card Eject Button Figure 1-4. Stylistic ST5000 Series Tablet PC Features (Top View) Top Features:
Pen: The main input device that you use to execute programs and enter data. A pen holder is built into the Tablet PC to store the pen when not in use. 1 This architecture allows you to transfer data between a variety of different digital devices.
PC Card slot: Allows you to install a Type I or Type II PCMCIA Card in the system.
Smart Card Slot: The dedicated Smart Card slot
Air flow vents: Provides secondary cooling for allows you to install a Smart Card on which you can store such data as medical information or electronic cash.
SD Card Slot: The Secure Digital (SD) card slot allows you to install a flash memory card for data storage. processor. (Do not obstruct the vents.) These peripherals and accessories are sold separately. 5 Ocampa_UG_Active B.book Page 6 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e USB 2.0 Ports Headphone Jack External Monitor Connector
(behind door) Modem Jack*
DC Input Jack Microphone Jack IEEE 1394 Jack Latch Point LAN Jack* Kensington Lock Slot Figure 1-5. Stylistic ST5000 Series Tablet PC Features (Left Side View)
* The system is configured with one of two modules: a standard modem module or an optional wireless LAN/LAN/modem combo module. The mini-PCI expansion slot into which these modules are plugged (located under the cover) can be used to accommodate other mini-PCI devices. Left-Side Features:
1 States due to FCC restrictions.
USB 2.0 ports: Allow you to connect Universal Serial Bus-compliant devices (compliant with USB Standard Revision 2.0) to the Tablet PC. Additional USB ports are located on the optional Tablet Dock.
Headphone Jack: Allows you to connect a set of stereo headphones.
External Monitor Connector: The External Monitor connector allows you to connect an external VGA, XGA, or SVGA CRT monitor.
Modem jack: Allows you to connect a standard RJ-11 connector to the Tablet PCs internal 56 Kbps modem. Note that the internal 56 Kbps LAN/modem module installed in the Stylistic ST5000 Series Tablet PC has actual maximum transfer rates of 53 Kbps
(receive), 33.6 Kbps (send), and 14.4 Kbps (fax). Download rates are limited to 53 Kbps in the United
DC input connector: Allows you to connect the AC adapter or auto adapter.
Microphone Jack: Allows you to connect an external microphone.
IEEE 1394 Jack: Allows you to connect between your Tablet PC and peripherals such as a digital video camera.
LAN jack: Allows you to connect a standard RJ-45 connector to the Tablet PCs internal local area network (LAN).
Kensington lock slot: Allows you to attach a Kensington MicroSaverTM-compatible security cable. These peripherals and accessories are sold separately. 6 Ocampa_UG_Active B.book Page 7 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d Infrared Keyboard/Mouse Port Optional Wireless LAN location Latch Point Pen / Pen Holder Figure 1-6. Stylistic ST5000 Series Tablet PC Features (Right Side View) Right-Side Features:
1
Pen: The main pointing device that you use to execute programs and enter data. A pen holder is built into the Tablet PC to store the pen when not in use.
Infrared keyboard/mouse port: The infrared port wraps around the front and bottom of the display, and is used for communicating with an optional proprietary infrared keyboard or mouse.
Wireless LAN location: The optional wireless LAN device is located inside of the system housing. These peripherals and accessories are sold separately. 7 Ocampa_UG_Active B.book Page 8 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e STATUS DISPLAY Icons appear in the status display indicating the status of system functions such as system power and battery charge level. The location of icons in the Status display is shown in Figure 1-7.. Table 1-2. explains how individual icons are displayed, and describes what the variations of that display indi-
cate. (If an icon is not displayed, it indicates that the related system function is off or inactive. Power Battery Security Charge/DC In HDD Access Figure 1-7. Status Display Icons In the following table, a blinking LED flashes at the rate of once per second; an LED that is blinking, slow flashes at the rate of one second on, five seconds off. Icon Mode/State LED State Remarks Power
On State Green, continuous The system is powered on and ready for use.
Idle Mode
Suspend-to-RAM Green, blinking
Off State Off
Hibernate
(Save-to-Disk) Charge/DC
On State In
Idle Mode
Suspend-to-RAM
Hibernate
(Save-to-Disk)
Off State Amber Green The system has suspended and saved active settings to RAM. The system has suspended and saved settings and data to the hard disk drive. AC adapter and battery are available and system is charging.
AC adapter and battery are available and system is not charging (battery fully charged).
AC adapter is available but battery is not present. Amber, blinking AC adapter and battery are available and waiting to charge (battery is out of thermal range). Off AC adapter is not available. 8 Ocampa_UG_Active B.book Page 9 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d In the following table, a blinking LED flashes at the rate of once per second; an LED that is blinking, slow flashes at the rate of one second on, five seconds off. Icon Mode/State LED State Remarks Battery
On State Green, continuous Battery charge is between 50%-100%
Idle Mode Amber, continuous Battery charge is between 13%-49%
Red, continuous Battery charge is between 0%-12%
Red, blinking There is a battery error. Green, blinking slow Battery charge is between 50%-100%. Amber, blinking slow Battery charge is between 13%-49%. Red, blinking slow Battery charge is between 0%-12%. Off Battery is not installed, or system is off or in Hibernate mode. If battery is inserted during power off, LED blinks amber for 4 seconds to detect battery. Battery status is displayed for 5 seconds after that. Green Displayed when hard disk drive is accessed.
Suspend-to-RAM, without AC adapter
Suspend-to-RAM with AC adapter
Hibernate
(Save-to-Disk), with AC adapter
Off State
Hibernate
(Save-to-Disk), without AC adapter HDD Access
On State (or flashing)
Idle Mode
Suspend-to-RAM Off Hard disk drive is not being accessed.
Hibernate
(Save-to-Disk)
Off State Security
On State Green, blinking (until password is entered) TBD The Security Indicator flashes (if a password was set) when the system resumes from Off or Standby modes. You must enter the password that was set in the Security Panel before your system will resume operation. Table 1-2. System Status Indicators 9 Ocampa_UG_Active B.book Page 10 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e APPLICATION BUTTONS The six application buttons are located on the upper right-hand side of a vertically-oriented system. (See figure 1-2 on page 3 for location). Three of the buttons have secondary functions. The secondary functions are activated by pressing the Function (Fn) button while pressing the application button. The buttons also have separate tertiary functions that can be used while the system is booting up. For more information about the tertiary functions, refer to Table 1-5 on page 13. Ctl-Alt-Del is the only Application button that can be used while the system is logging on or when the system is locked
(i.e., when you have the Logon or Computer Locked window showing on your desktop). Button Icon and Name
(Primary) Tablet Icon
(Fn +
Button)
(Secondary) Description The Ctl-Alt-Del button performs two functions:
Pressing the Ctl-Alt-Del button for approximately one second allows you to log on after boot, after locking the workstation, or after resuming from power management
After log-on, pressing the Ctl-Alt-Del button for two seconds launches the Windows Security screen. Security Button: All five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. See Security Functions of Application Buttons on page 14 When you press the EMail button, you automatically launch Microsoft Outlook where you can read, create, and send emails. When you press the Fn + EMail buttons at the same time, you automatically launch the Web browser. The default page to which you go is the Fujitsu home page. If you would like to change your home page, go to the Control Panel->
Internet Options. Select the General tab and enter the starting address you would like to use. When you press the Orientation button, the system screen orientation changes from portrait (vertical) to landscape (horizontal) or from landscape to portrait. When you would like to use the Tablet PC as an eBook, for example, you would use the portrait orientation, when accessing spreadsheets, you would more typically use a landscape orientation. When you press the Fn + Orientation buttons at the same time*, the Graphics Options Output menu is launched. From that menu you can choose the display mode you would like to use. Ctl-Alt-Del Button Security Button EMail Button Internet Button Orientation Button Display Mode Button 10 Ocampa_UG_Active B.book Page 11 Monday, September 29, 2003 5:04 PM Button Icon and Name
(Primary) Tablet Icon
(Fn +
Button)
(Secondary) Escape Button Application A Button Enter Button Application B Button G e t t i n g S t a r t e d Description The Escape application button acts the same way as an Escape key on a keyboard. When you press the Fn + Esc buttons at the same time*, they act to invoke a pre-
determined application or generate a combination keystroke, as assigned in the Tablet Button Settings utility. (You can change the settings in Control Panel ->
Tablet Button Settings). By default, pressing the Fn + Esc combination acts the same as if you had pressed Ctl + Esc on a keyboard: the Start menu is launched. The Enter application button acts the same way as an Enter key on a keyboard. Pressing the Fn + Ent buttons at the same time*, acts to invoke a pre-determined application or keystroke combination, as assigned in the Tablet Button Settings utility. (You can change the settings in Control Panel -> Tablet Button Settings). By default, pressing the Fn + Ent combination acts the same as if you had pressed Alt on a keyboard: it selects a main menu in the typical Windows application. The Function button works in conjunction with the other application buttons to provide additional functionality for the buttons. Refer to specific details above.*
Function Button Pressing the Fn button twice in succession (within the sticky time*), causes the Fujitsu menu to appear on your screen, allowing you to modify certain system settings. Table 1-3. Application Buttons - Primary and Secondary Functions
* The Fn button has a handy sticky feature that allows you to press two buttons in immediate succession, rather than at exactly the same time. After pressing the Fn button, you have a short time (2 to 3 seconds) to press the second button. 11 Ocampa_UG_Active B.book Page 12 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e NAVIGATION BUTTONS The two navigation buttons are located on the lower right-hand side of a vertically-oriented system. (See figure 1-2 on page 3 for location). Each of the buttons can be toggled by pressing either end of the button. The buttons have dual functions. The secondary func-
tions are activated by pressing the Function (Fn) button while pressing the application button*. The buttons also have separate tertiary functions that can be used while the system is booting up. For more information about the tertiary functions, refer to Table 1-5 on page 13. Ctl-Alt-Del is the only Application button that can be used while the system is logging on or when the system is locked
(i.e., when you have the Logon or Computer Locked window showing on your desktop). Buttons/icons Purpose (when pressed alone) Purpose (when pressed with Fn button)
(Primary function)
(Secondary function) This button consists of Page Up and Page Down segments. When the Page Up portion is pressed, you will scroll up one page. When the Page Down portion is pressed, you will scroll down one page. When pressed with the Function (Fn) button*, the Up portion of this button allows you to tab right. When pressed with the Function (Fn) button*, the Down portion of this button allows you to tab left. This button consists of Up and Down segments. When the Up portion is pressed, the cursor will move up. When pressed with the Function (Fn) button*, the Up portion of this button will move the cursor to the right. When the Down portion is pressed, the cursor will move down. When pressed with the Function (Fn) button*, the Down portion of this button will move the cursor to the left.
* The Fn button has a handy sticky feature that allows you to press two buttons in immediate succession, rather than at exactly the same time. After pressing the Fn button, you have a short time (2 to 3 seconds) to press the second button. Table 1-4. Navigation Buttons 12 Ocampa_UG_Active B.book Page 13 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d TERTIARY FUNCTIONS OF APPLICATION AND NAVIGATION BUTTONS While you are booting up your system, the Application Buttons and Navigation buttons can be used for entering and navigating through the Basic Input-Output System
(BIOS), and for invoking the Advanced Options Menu, where you can enter different modes (such as Safe Mode). The BIOS is a program and a set of parameters that are stored in ROM, which tests and operates your Tablet PC from when you turn it on until it loads your installed operating system from disk. Information from the BIOS is transferred to the operating system to provide it with information on the configuration and status of the hard-
ware. The system is booting up while the Fujitsu logo is displayed immediately after turning on the system. The table below indicates how the buttons act while the system is booting up and while you are in the BIOS. Buttons/icons Purpose (when pressed while the system is booting up) Pressing the Ctl-Alt-Del button while the system is booting up takes you into BIOS setup. This is the same as if you had tapped [F2] on a keyboard. Ctl-Alt-Del Button EMail Button Orientation Button Escape Button Enter Button Pressing the EMail button while the system is booting up opens the Boot Options menu. This is the same as if you had tapped [F12] on a keyboard. Pressing the Orientation button while the BIOS setup screen is open causes the selected item (if applicable) to change to the next item. Pressing this is the same as tapping the spacebar on a keyboard. Pressing the Esc button while the BIOS is open acts to escape from the BIOS. This is the same as if you had tapped [Esc] on a keyboard. Pressing the Ent button while the BIOS is open acts the same as the [Ent] button on a keyboard. Pressing the Fn button while the system is displaying the operating system boot menu, opens the Advanced Operating System Options menu. This menu allows you to enter different operating system modes (such as Safe Mode). Pressing this button is the same as if you had tapped [F8] on a keyboard. Function Button Pressing the top half of the upper navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move up. This is the same as if you had tapped Arrow Up on a keyboard. This feature is also functional in the operating system boot menu. Pressing the bottom half of the upper navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move down. This is the same as if you had tapped Arrow Down on a keyboard. This feature is also functional in the operating system boot menu. Pressing the top half of the lower navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move right. This is the same as if you had tapped Arrow Right on a keyboard. Pressing the bottom half of the lower navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move left. This is the same as if you had tapped Arrow Left on a keyboard. Table 1-5. Tertiary Functions of Application and Navigation Buttons 13 Ocampa_UG_Active B.book Page 14 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e SECURITY FUNCTIONS OF APPLICATION BUTTONS Five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. Instructions for using the security feature follow the table. Button Icons Security Icons Security Purpose Ctl-Alt-Del Button EMail Button Orientation Button Escape Button Enter Button 1 2 3 4 Security Enter Button Security Button 1 Security Button 2 Security Button 3 Security Button 4 Table 1-6. Security Functions of Application Buttons SETTING UP THE SECURITY PANEL When you receive your Tablet PC, the security panel application is pre-installed without any passwords. The following sections provide detailed information on your security panel, how to set, change or remove passwords. The following are valid button strokes:
Pushing [4] by itself Pushing [2] and [3] at the same time Pushing [1], [2], and [4] at the same time Pushing [1], [2], [3], and [4] at the same time Numbered Buttons Use these buttons to enter your password.(Figure 1-6) The following are valid passwords. The numbers within braces ({ }) are button strokes using more than one button. Enter Button After entering the button strokes, push this button to enter the password into the Tablet PC. (Figure 1-6)
{[2]+[3]}, [1], [Enter]
[4], [enter]
{[1]+[3]}, {[2]+[3]+[4]}, [1], [4], [2], [Enter]
PASSWORDS The user and supervisor password may be set on this Tablet PC. A supervisor password is typically the same for all Tablet PCs and notebooks in a work group, office, or company to allow for system management. Individual computers in a group environment should not use a common password. A password consists of one to five button strokes plus the enter button. A valid stroke consists of pushing one or up to four buttons simulta-
neously. Setting Passwords When shipped from the factory, no passwords are set. You have a choice of having no password or setting a supervisor and user password. You must set the super-
visor password before the user password. The purpose of supervisor password is to be able to bypass the user password in case the user password is forgotten. The supervisor password alone will not lock the system. You must set the supervisor and user passwords for the security panel to work. 14 Ocampa_UG_Active B.book Page 15 Monday, September 29, 2003 5:04 PM Setting Supervisor Password You must have set a supervisor password before setting any user passwords. The supervisor password can bypass the user password. 1. Go to the Start menu. 2. Click on Run. 3. Type in:
C:\Program Files\Fujitsu\Security Panel Application\Supervisor\
FJSECS.EXE, then press [Enter]
4. Follow the on-screen instructions to set the Supervisor password. Setting User Password 1 Go to the Start menu. 2. Click on All Programs. 3. Click on Security Panel Application -> Security Panel Application. 4. Follow the on-screen instructions to set the user password. You may change or remove the supervisor or user password by repeating the steps defined above. USING YOUR SECURITY PANEL The security lock feature is in effect both when the system resumes from Off, Standby, or Hibernation state. You always need to push the Security Panel buttons to input the user password. Your system will not begin the boot sequence until you enter your supervisor/user password. From Off State 1. Turn on your system. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. For example, if the password is 22222, first press Button 2 five times and press the Enter button. The Tablet PC will boot to normal operation. From Standby/Hibernation State 1. Press your Suspend/Resume button. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. The Tablet PC should resume normal operation. Incorrect Password Entry If an invalid supervisor or user password is entered three times in succession, the system will beep for about one minute. If a valid password is entered within a minute
(while system beeps), the beeping will stop and the Tablet G e t t i n g S t a r t e d PC will resume normal operation. If no password is entered or an invalid password is entered while the system beeps, the system will return to its previous locked state (standby or off) and the Security Indicator will go off. To reactivate the Tablet PC after a password failure, you must press the Suspend/Resume button, then enter a correct password. Remember the user password you specified on the Security Panel Application. If you forget the password you will not be able to use your computer. The supervisor pass-
word can override the user password. PRECAUTIONS Opening and Closing the Cover By default, closing the cover automatically places your system into Standby mode. (You can change the action the system takes when the cover is closed by opening the Power Options Properties icon in the Control Panel, and selecting the Advanced tab. Make a choice from the drop down menu for When I close the lid of my portable computer: and click the [OK] button.) Opening the cover does not automatically place the Tablet PC into normal operation. Instead, you must enter the proper security password after pushing the Suspend/Resume button. Low Battery Operations If your Tablet PC has a low battery, pushing the suspend/
resume button only turns on the Security Indicator. Your Tablet PC does not unlock, the Security Indicator turns off after one minute. To resume normal operation, first attach a power supply to the Tablet PC. Then you may unlock the Tablet PC. UNINSTALLING THE SECURITY PANEL APPLICATION You have two options when uninstalling the security panel application:
Remove passwords and uninstall the security panel application software. This will disable all security features. Uninstall the security panel application with password still active. This will not allow any changes to the password. Uninstalling the Security Panel Application Software Remove passwords when User wants no password protec-
tion whatsoever and doesnt want to give anybody the utility to set a password on their computer. In this case, if passwords (supervisor, user, or both) are set, the pass-
words must first be cleared BEFORE removing the appli-
15 Ocampa_UG_Active B.book Page 16 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e respectively. FJSECU.exe for the user password cannot run without first setting a supervisor password. You need to run FJSECS.exe first to set the supervisor pass-
word. Follow instructions under Setting Passwords on page 14. If you forget both passwords, please contact Fujitsu PC Corporation Service and Support at 1-800-8FUJITSU
(1-800-838-5487). Fujitsu PC Corporation charges a service fee for unlocking a password-restricted Tablet PC. When calling please have a valid credit card and provide proof of ownership. You will then be given instructions on where to ship your Tablet PC. cation. To clear passwords, follow same procedure in SETTING PASSWORD CODES except this time, select REMOVE, enter current password then click Next. When asked to confirm select Yes. Removing Security Panel Application with Passwords Still Active Using this feature will not allow any changes to the password. Removing the applications does not remove the password. It simply removes the utility to change/add/remove passwords. To change your password you must reinstall the application. User:
1. Go to Start -> Control Panel. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Supervisor:
1. Go to Start -> Control Panel. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application for Supervisor in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Reinstalling the Security Panel Application To reinstall supervisor or user security application, you will need your Drivers and Applications CD. The Utilities\Security Panel Application folder contains two separate folders: Supervisor and User. The setup files for supervisor and user security applications are contained in those folders. 1. Go to the Utilities\Security Panel Applica-
tion\Supervisor folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instruc-
tions on the screen. 2. Go to the Utilities\Security Panel Application\User folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instructions on the screen. Supervisor and user passwords can be set via Windows software using the FJSECS.exe and FJSECU.exe files, 16 Ocampa_UG_Active B.book Page 17 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d CONNECTORS AND PERIPHERAL INTERFACES Connectors and peripheral interfaces on the Stylistic ST5000 Series Tablet PC allow the connection of a variety of devices. Specific locations are illustrated in Figures 1-2 through 1-5. Table 1-7 provides a description of each peripheral connector on the Stylistic ST5000 Series Tablet PC. Each of the illustrated icons is either molded into or printed on the Tablet PC chassis. Connector/
Peripheral Tablet PC Icon Purpose DC input connector USB Port PCMCIA Card slot SD Card slot Smart Card slot Microphone jack Headphone jack IrDA/FIR port Modem Tablet Dock port Infrared keyboard/
mouse port Connect an external power source such as the AC adapter or auto/
airline adapter. Connect Universal Serial Bus 1.1 compliant devices to the Tablet PC. Install a Type I or Type II PC Card. TBD TBD Install a Secure Digital (SD) Card Install a Smart Card. Connect an external microphone. The internal microphone is disabled when you plug in an external microphone. Connect stereo headphones or powered external speakers. The internal speaker is disabled when you plug in external headphones or powered speakers. An infrared transceiver built into the Tablet PC allows you to communicate with other devices that are compliant with the IrDA Standard Rev. 1.1. Effective range for infrared communication is about 3 feet, and within 15 degrees off center. A clear line-of-sight path must exist between the IrDA port on the Tablet PC and the IrDA transceiver on the other device. Connect a telephone line to the optional internal modem using a standard RJ-11 telephone plug. Connect the Stylistic ST5000 Series Tablet Dock or other approved docking device. Refer to documentation accompanying the docking device for more information. An infrared receiver built into the Tablet PC allows you to communicate with a wireless infrared keyboard or mouse. The keyboard infrared port works optimally when it is placed between 10 to 30 cm (approximately 4 in. to 12 in.) from the keyboard infrared port (which is located on the bottom edge of the Tablet PC). Ensure there is a clear line-of-sight path between the infrared receiver on the Tablet PC and the infrared transmitter on the keyboard or mouse. 17 Ocampa_UG_Active B.book Page 18 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Connector/
Peripheral Tablet PC Icon Purpose The Kensington MicrosaverTM security slot allows you to secure the Tablet PC using Kensington-compatible locking devices. The IEEE 1394 jack allows you to connect between your Tablet PC and peripherals such as a digital video camera. The Suspend/Resume/Power On button allows you to suspend Tablet PC activity without powering off, resume your Tablet PC from suspend mode, and power on the system when it has been shut down from Windows. The Page Up/Page Down button allows you to navigate quickly from page to page without scrolling. The LAN (RJ-45) jack is used to connect the internal Fast Ethernet (10/
100/1000* Base-T/Tx) to a Local Area Network (LAN) in your office or home, or broadband devices such as a cable modem, DSL, or satellite internet.
*1000 Mbps, commonly referred to as GigaLAN. The battery release latch allows you to remove the battery from your system for storage or replacement. The wireless LAN switch allows you to turn power to the optional wireless LAN device on and off. Table 1-7. Peripheral Connectors/Interfaces KensingtonTM Lock slot IEEE 1394 jack Suspend/
Resume button Page Up/
Page Down Local Area Network (LAN) Battery Release Latch Wireless LAN On-Off Switch 18 Ocampa_UG_Active B.book Page 19 Monday, September 29, 2003 5:04 PM 2 Using Your Stylistic ST5000 Series Tablet PC 19 Ocampa_UG_Active B.book Page 20 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o 20 Ocampa_UG_Active B.book Page 21 Monday, September 29, 2003 5:04 PM U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 Using the Stylistic ST5000 Series Tablet PC This chapter covers the fundamental concepts, basic system operation and use, and system functions of the Stylistic ST5000 Series Tablet PC. You should familiarize yourself with this information before you attempt to operate the system. Prior to using your system, be sure to fully charge the battery if you plan to run on battery power. Failure to do so may result in erratic performance. SYSTEM STATES Before you begin using the Stylistic ST5000 Series Tablet PC, review the different system states (or modes) that the system can use. Being familiar with these states will help you determine whether it is appropriate to turn on, resume, suspend, hibernate or shut down the system when you begin or end a session. System behavior for each system state is described briefly in the following, with each system state listed in decreasing order of power usage:
On state: The system is running and the display screen is on.
Idle state: Some system functions are regulated or turned off to conserve power. The display screen may be turned off. The system returns to the On state when pen activity or other input is detected.
Suspend-to-RAM mode (S3): System operation is suspended. Most system functions are turned off to conserve power. Power to memory is on, maintaining data in programs that were running before system operation was suspended. The system does not respond to the pen or other input when in Suspend-
to-RAM mode. Refer to the Resuming System Operation section later in this chapter for information on returning the system to the On state.
Hibernate mode (Save-to-Disk) (S4): System operation is suspended. All system functions are turned off to conserve power. Active data in programs that were running before suspending system operation is stored on the hard disk drive. The system does not respond to the pen or other input. Refer to the Resuming System Operation section later in this chapter for information on returning the system to the On state.
Off state: All system functions are turned off to conserve power. The system does not respond to the pen or other input. The system boots at the next system power-on. The system consumes the same amount of power whether it is in Hibernate (Save-to-
Disk) mode or the Off state. Your system may be configured to enter some of these states automatically after a period of inactivity to conserve battery power. When you use the Stylistic ST5000 Series Tablet PC, you can change the current system state in a number of ways, depending on the systems current state. To determine the current system state, observe the Power icon in the Status display. Table 2-1 on page 22 gives the different system states represented by the Power icon and describes how you can change the system state from the current state. 21 Ocampa_UG_Active B.book Page 22 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o Icon Appearance Current State To Change State*
On State or Idle State Power icon displayed continuously To enter the Off state, shut down the system using the Start menu on your system. To enter Suspend-to-RAM or Hibernate (Save-to-Disk) state, suspend system operation using either a hardware or software suspend. Power icon blinking Suspend-to-
RAM To enter the On state, resume system operation by pressing the Suspend/
Resume button. Power icon not displayed Off State, or, Hibernate
(Save-to-Disk) To enter the Off state, resume system by pressing the Suspend/Resume button, then shut down your system. To enter the On state, start your system, or resume system operation by pressing the Suspend/Resume button. Table 2-1 Changing System States
* Information in Table 2-1 on page 22 is supplied to help you understand which system states your system can enter from the current system state. Refer to the procedures on starting the system, shutting down the system, suspending system operation, and resuming system operation given later in this chapter. Your system may be configured to use either Suspend-to-RAM mode or Hibernate mode. POWERING UP THE TABLET PC Follow the procedure below to start the Stylistic ST5000 Series Tablet PC. Before you begin, confirm that the system is in the Off state. To do so, observe the Status display. If the Power icon is not visible in the Status display, the system is in Off state or in Hibernate (Save-
to-Disk) mode and it is safe to perform this procedure. If the Power icon is visible (either blinking or on continu-
ously), do not perform this procedure. See System States earlier in this chapter for details on modes repre-
sented by the Power icon. 1. Ensure that the battery in your Tablet PC is sufficiently charged, or connect an external power source such as the AC adapter or auto adapter to your Tablet PC. 2. Press the Power On/Suspend/Resume button to start the system. After performing initialization, the system starts the operating system installed on the hard disk drive. Once the operating system is running, you can use the system. SHUTTING DOWN THE SYSTEM Follow these steps to shut down and turn off your system:
1. If system operation has been suspended, resume system operation. See Resuming System Opera-
tion later in this chapter for details. 2. Save your work and close all running programs. 3. Choose Shut Down from the Windows Start menu. 4. Carry out the Shut Down command. The system is now in the Off state. SUSPENDING SYSTEM OPERATION The Tablet PC allows you to suspend the system opera-
tion without closing programs or exiting the operating system. Use this feature to conserve battery power when a system shutdown is not practical or when the battery needs to be changed. If you have set your system to turn power off from the Power Options utility in the Control Panel, the following procedure will not be possible, since pressing the button shuts the system down rather than suspending it. To change your power options, go to Start -> Settings -> Control Panel -> Power Options. 22 Ocampa_UG_Active B.book Page 23 Monday, September 29, 2003 5:04 PM To suspend system operation:
1. Press the Suspend/Resume button, or carry out the Standby command from your operating system or power management program. (If your system is configured to suspend operation using Hibernate
(Save-to-Disk) mode, which is explained later in this procedure, a message is displayed while data is saved to your hard disk.) If you are replacing the battery, wait until system operation is suspended and the power icon is flashing before you remove the battery. Failure to do so could result in loss of your unsaved data. (Note that if the Resume On LAN function is enabled in the BIOS setup, you should not remove the battery unless the system is shut down. When Resume ON LAN is enabled, the bridge battery is disabled in order to optimize battery life.) 2. The Power icon either flashes (Suspend-to-RAM) or is not displayed (Hibernate) when system operation is suspended, depending on how your system is configured. At this point, programs that were running are stopped, active data is saved, and the system enters one of two different low-power states, or suspend modes, as explained in the following paragraphs. 3. Observe the Power icon in the Status display to deter-
mine which suspend mode your system is using.
Power icon is blinking: Suspend-to-RAM mode. In this mode, active data is saved by maintaining power to RAM while most other system components are powered off. The Battery Gauge icon in the Status display indicates the battery charge level.
Power icon is not displayed: Hibernate (Save-to-Disk) mode. In this mode, active data is stored on the hard disk drive and power usage is reduced to the same level used in the Off state. When the system is in Hibernate mode, the Battery Gauge icon is not visible in the Status display. In this mode, there is no danger of losing data if battery power is lost. If you have successfully performed this procedure, system operation is now suspended. Refer to Resuming System Operation later in this chapter to resume system operation. Also, note the following with regard to suspending system operation:
U s i n g Y o u r S t y l i s t i c S T 5 0 0 0
You can remove the battery while the system is in Suspend-to-RAM or Hibernate modes in order to install a charged battery. To prevent losing unsaved data, wait until system operation has suspended before you remove the battery. Note that after you remove the battery, you have approximately five minutes to replace it with a new battery or to plug in a power supply before the bridge battery is depleted.
Your system may be configured to suspend operation automatically after a period of inactivity.
Your system may be configured to enter Hibernate mode automatically after a period of time in Suspend-
to-RAM mode.
The system uses a small amount of battery power when in Suspend-to-RAM mode. Eventually, the battery will become fully discharged. If you will not be using the system for an extended period of time, shut down the system rather than using Suspend-to-RAM mode.
If the battery charge drops to a Low-Battery Warning level while the system is running, the system will beep periodically. If this occurs, suspend system operation, shut down the system, or attach an external power source, such as the AC adapter, to the Tablet PC. If the battery charge drops to a Critically Low level while the system is running, the system is forced into a pre-selected mode (Suspend-to-RAM or Hibernate). If this occurs, you must either install a charged battery, or connect an appropriate external power source such as the AC adapter before you can resume system operation. (If the battery charge drops to a Critically Low level while the system is in Suspend-to-RAM mode, the system stays in Suspend-
to-RAM mode until power is restored or totally dissipated.)
Suspending system operation interrupts data communications; therefore, some programs may block the system from suspending to prevent an interruption.
The suspend action of the Suspend/Resume button may be disabled to prevent accidental interruption. If this is the case, pressing the Suspend/Resume button will not suspend system operation as described here.
(In this case, suspend mode can only be achieved using the system software). Contact your local help desk or reseller if your system configuration is not suitable. 23 Ocampa_UG_Active B.book Page 24 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o
If your system is equipped with a PC Card that allows you to connect to a wired or wireless network, you may be logged off the network after a period of inactivity while system operation is suspended. Contact your network administrator or help desk, or call Fujitsu Service and Support at 1-800-8Fujitsu
(1-800-838-5487) for details on log-off parameters for your network. RESUMING SYSTEM OPERATION To resume operation from either Suspend-to-RAM or Hibernate modes, press the Suspend/Resume button.
From Suspend-to-RAM mode Status lights indicate that the system state is changing. It may take up to a minute before the system returns to the On state and system operation resumes. Note that the display turns on shortly before the pen becomes active due to the power-up sequences observed by the system.
From Hibernate (Save-to-Disk) mode Active data is read from the hard disk drive, and the system returns to the On state after a short time. Note that power to several system components must be restored before system operation resumes. Allow sufficient time for system operation to resume before attempting to use the system. If your system uses Hibernate mode, it will take longer to resume operation as compared to using Suspend-to-RAM mode. Time is needed to read data from the hard disk drive. Use the system as you normally would once system oper-
ation resumes. All programs resume at the point where execution stopped when system operation was suspended. ADJUSTING THE DISPLAY BRIGHTNESS There are three ways to adjust the brightness of your display:
Depending upon whether you are running your system on battery or AC power, the default screen brightness settings will be different. The screen brightness default for running on battery is lower than that on AC power in order to optimize battery life. Click the Tablet icon in the system tray at the bottom right of the screen. (When the cursor is on top of the icon, a message stating Change tablet and pen set-
tings is displayed.) When the Tablet and Pen Settings 24 window appears, select the Display tab, and move the Screen Brightness slider to change the brightness. Click Start -> Control Panel -> Tablet and Pen Set-
tings. Select the Display tab, and move the Screen Brightness slider to change the brightness. Click the Fujitsu Menu icon in the system tray at the bottom right of the screen. (When the cursor is on top of the icon, a message stating Fujitsu Menu... is dis-
played.) Select Tablet and Pen Settings and select the Display tab. Move the Screen Brightness slider to change the brightness. USING THE PEN You can use the Stylistic ST5000 Series pen to generate and create electronic ink, to select items, and to navi-
gate through programs on the Tablet PC. Programs that support handwriting recognition also allow you to write characters directly on the screen with the pen. You can also use the pen as a drawing tool. Pen Tether Attachment Point Tip Switch Barrel Switch Figure 2-1. Stylistic ST5000 Series Pen The Stylistic ST5000 pen is a sophisticated, high-quality electronic instrument that can be damaged if used improperly. Treat the pen as you would any precision device. The following list contains guidelines for proper pen handling:
Do not gesture with the pen, use it as a pointer, or tap it on surfaces other than the Tablet PC screen.
Do not try to turn the thumb grip on the pen; it is designed for inserting and removing the pen from the pen holder and for attaching a pen tether.
Never store the pen with the tip bearing the weight of the pen (e.g., sitting tip down in a pencil cup). Storing the pen tip down could distort the internal mechanism over a period of time
(especially in higher temperatures), causing the tip to act as if it is always depressed. To avoid damage, the pen should be stored in the pen holder when not in use. Ocampa_UG_Active B.book Page 25 Monday, September 29, 2003 5:04 PM The screen reacts when the pen tip is approximately 1/8 inch (3-5mm) from the screen. The pen has three switches: a tip switch and a barrel button toggle switch with switches at both ends. When activated, the tip switch corresponds to the left mouse button, and the front toggle (closest to the pen tip) barrel button switch, when used in combination with the tip switch, corre-
sponds to the right mouse button. The rear toggle of the barrel button switch acts as an electronic ink eraser.
Ensure that a screen protector is installed on the Tablet PC screen before you use the pen. The warranty does not cover a scratched screen.
Use only the pen provided with your Tablet PC. Do not use substitutes that were not designed for the Stylistic ST5000 Series Tablet PC. Here are some hints that may help you use the pen more effectively:
To activate the tip switch, tap or hold the pen tip against the screen.
To activate the barrel button switch, press and hold the end of the button you wish to use (front toggle is the right mouse button switch; the rear toggle acts as an electronic eraser.
To move the cursor, hold the pen tip within 1/8 inch
(3 - 5mm) from the screen and move the pen.
To start a program, double-tap the pen tip (tap the pen tip twice rapidly) on the program icon as you would double-click a mouse.
To select an object, tap the pen tip on the object once.
To double-click an object, tap twice on the object quickly.
To move, or drag, an object on the screen, place the pen tip directly over the object, then as you hold the pen tip against the screen, move the pen. CALIBRATING THE PEN For information about calibrating your pen, refer to the literature that came with the operating system. INSTALLING A PEN TETHER To prevent dropping or losing your pen, you should attach it to your system using the pen tether that is included with the system. To attach the pen tether to your Tablet PC, perform the following steps:
U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 1. Attach the end of the pen tether with the smaller loop to your pen. Do do so, push the end of the tether through the hole in the pen, then thread the opposite end of the tether through the loop. (See Figure 2-2.) Pen tether attachment point Larger loop Smaller loop Figure 2-2. Installing a Pen Tether 2. Attach the end of the pen tether with the larger loop to the attachment point on your pen tablet. To do so, insert the end of the pen tether through the attach-
ment point, then feed the pen through the large loop in the tether. REPLACING THE PEN TIP With use, the pen tip may become worn or may pick up foreign particles that can scratch the screen. A damaged or worn tip may not move freely, causing unpredictable results when using the pen. If your pen exhibits these problems, you should replace the pen tip. To do so, use the pen tip removal tool included with your pen. Gap Figure 2-3. Tip Removal Tool To remove the tip, position the tip in the gap between the two ends of the tool. Pinch the tool together so the tip is firmly clasped, then pull it from the barrel. If the tip is worn or damaged, discard it. To replace the tip, retrieve one of the new tips that accompanied your pen. Insert the flat end of the tip into the barrel and push it in firmly until it is seated. If you need more tips, they can be ordered from the Fujitsu Web site at: www.fujitsupc.com. 25 Ocampa_UG_Active B.book Page 26 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o CHARGING THE BATTERY REMOVING AND INSTALLING THE BATTERY The Stylistic ST5000 Series battery can be charged while it is installed in the Tablet PC. To do so:
1. Connect a DC power source, such as the AC adapter, to the DC input connector on the Tablet PC. The DC Input icon appears in the Status display. If the battery charge is below 90%, the battery begins charging and the Charging icon appears in the Status display. If the battery charge is 90% or higher when you connect DC power, the battery will not charge, preventing battery overcharging. 2. Look at the Battery Gauge icon in the Status display to determine the percent of charge in the battery. See Status Display in Chapter 1 of this manual for a description of the Battery Gauge icon. As long as DC power remains connected to the Tablet PC, the charging process continues until the battery charge reaches 100%. Charge times shown in Table 2-2, Battery Charging Time" are for a fully discharged battery charging both while the Tablet PC is and is not in use. Battery Charge Level Reached Approximate Charge Time
(not in use) Approximate Charge Time
(in use) 90%
100%
3.5 hours TBD -7 hours*
4.5 hours 8 hours*
Table 2-2. Battery Charging Time
* Depends upon the applications in use. Also note the following with respect to charging the battery:
You can use the system, suspend system operation, or shut down and turn off the system without interrupting the charging process; however, using the system while the battery is charging will cause the battery to charge at a slower rate, as noted in Table 2-
2, Battery Charging Time".
As noted in the procedure above, the system will not begin charging the battery if the battery charge level is 90% or higher when the system is initially connected to external DC power. (This prevents the battery from being overcharged.)
The battery uses Lithium ion battery cells which have no memory effect. You do not need to discharge the battery before you begin charging. 26 The battery can be removed from the Tablet PC and swapped with a charged battery. The battery can then be charged in an external charger if one is available. To remove the battery from the Tablet PC:
1. Choose one of the following:
If a charged battery is available, you can suspend system operation. A built-in bridge battery will maintain the system in Suspend-to-RAM mode for about 5 minutes while the battery is removed; this allows time for replacement with a charged battery.
If a charged battery is not available, save your work and close all running programs, then shut down the system or Hibernate (Save-to-Disk).
Plug in an external DC power source. 2. Slide the battery release latch in the direction indicated. (See Figure 2-4 on page 26 for location). 3. Pull the battery away from the system, as shown in the illustration and remove the battery from the Tablet PC. If you are using an external battery charger, refer to the instructions provided with the battery charger. Under Federal, state, or local law, it may be illegal to dispose of batteries by putting them in the trash. Be sure to dispose of batteries in accordance with local government regulations. To install the battery:
1. Orient the battery with the slides in the empty battery tray. Slide the battery into the tray and press it firmly until it is seated. When it is properly seated, the battery release latch should return to position and lock the battery. Figure 2-4. Removing the Battery Once the battery is installed, you can resume system operation or start and use your system normally. Ocampa_UG_Active B.book Page 27 Monday, September 29, 2003 5:04 PM TIPS FOR CONSERVING BATTERY POWER You can extend the charge life of your battery by conserving battery power. (Your results may vary depending on your application and how the system is configured.) Here are some suggestions to help you conserve battery power:
Use an external power source such as the AC adapter whenever the system is docked.
Suspend system operation if you know that you wont be using the system for a while.
Shut down the system if you wont be using the system for an extended period of time.
Use power management (available on the desktop) to help you conserve power automatically.
Battery life is dependent upon the operating system, power settings, and applications in use. Operation of the Bridge Battery When installed in the Tablet PC, the battery provides power to some system componentseven when the system is in the Off state. When the battery is removed, power is supplied to these components by a bridge battery that is built into the Tablet PC. The bridge battery is not designed for long-term opera-
tion. To maintain the bridge battery properly, observe the following measures:
The bridge battery function is disabled if Wake On LAN is enabled in the BIOS.
The system arrives with the bridge battery in a discharged state. Be sure to charge it sufficiently before relying upon it to support the system in the event of battery removal.
To prevent draining the bridge battery, always store the system with a charged battery installed.
If the bridge battery becomes drained, it takes approximately 8 hours for it to be fully recharged. The bridge battery charges when the AC Adapter is connected and the system is in On or Off states or Suspend mode. It charges from the battery only when the system is in the On state. U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 MODEM CONNECTION The internal 56 Kbps LAN/modem module installed in the Stylistic ST5000 Series Tablet PC has actual maximum transfer rates of 53 Kbps (receive), 33.6 Kbps
(send), and 14.4 Kbps (fax). Download rates are limited to 53 Kbps in the United States due to FCC restrictions. The Stylistic ST5000 Series Tablet PC is designed to accept a standard RJ-11 telephone plug. Connect the plug to the modem jack located on the left-hand side of the Tablet PC (See Figure 1-4 on page 5 for location). The tele-
phone plug can be installed whether or not the Tablet PC has power applied. If you need assistance configuring the Stylistic ST5000 Series Tablet PC modem or LAN, contact your local help desk or reseller. PC CARD SLOT The Stylistic ST5000 Series Tablet PC Card slot allows you to install a Type I or Type II PCMCIA Card. Installing a PC Card To install a PC card, position the side with the arrow facing up (i.e., when looking at the tablets display side, the arrow on the card should be visible.) Slide the card into the PC Card slot, and press it firmly to ensure proper seating. (See Figure 2-5 for location) If you need assistance installing a PC Card in the Stylistic ST5000 Series Tablet PC, contact your corporate help desk or reseller. Figure 2-5. Installing a PC Card Removing a PC Card To remove a PC Card, first click the Safely Remove Hard-
ware icon in the system tray in the bottom right-hand corner of the display. Select PC Card from the list, and click [Stop]. Press the PC Card eject button so that it pops out. Once the button has popped out, press it firmly to eject the card. (See Figure 2-6 for location) 27 Ocampa_UG_Active B.book Page 28 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o Figure 2-6. Removing a PC Card REMOVING AND INSTALLING MEMORY MODULES There is one DIMM slot in your Tablet PC and 256 MB on the motherboard. 256 MB, 512 MB, and 1 GB modules are available, so you can install a combination of up to 2 GB in the system. DIMM replacement should be performed at a static-free workstation. Do not touch connector pins, circuit boards, or other circuit components on the drive or Tablet PC. Electrostatic discharge caused by doing so can damage sensitive components. Figure 2-8. Installing a DIMM Module 4. Reinstall the cover and screws that you removed in step 2. 5. Confirm that the DIMM module is recognized by the system. To do so, run BIOS Setup. The size of the DIMM module should be displayed in the Info menu in BIOS Setup. The DIMM module is installed in the Tablet PC and you can now use the system. Installing a Memory Module To install a DIMM module in the Tablet PC:
Removing a Memory Module To remove a DIMM module:
1. Ensure that the Tablet PC is off. To do so, carry out the Shut Down command in the Start menu. (Do not attempt to remove or install a DIMM module when the system is in Suspend mode or running.) 1. Ensure that the Tablet PC is off. To do so, carry out the Shut Down command in the Start menu. (Do not attempt to remove or install a DIMM module when the system is in Suspend mode or running.) 2. Remove the two screws from the cover plate on the back of the Tablet PC and remove the cover plate as shown in Figure 2-7. 2. Remove the screws from the cover plate on the back of the Tablet PC and remove the cover plate as shown in Figure 2-7. 3. Spread the fingers on the socket that lock the DIMM module in place until the DIMM module is loose. Figure 2-7. Accessing the Memory Slot Insert the DIMM module in the socket at an angle and push it down until it locks into place as shown in Figure 2-8. Note that the DIMM module is keyed to prevent it from being inserted backwards. Figure 2-9. Removing a DIMM Module 4. Remove the DIMM module from the socket. The DIMM module is now removed from the Tablet PC. Refer to Installing a Memory Module on page 28 to install a new DIMM module. 3. 28 Ocampa_UG_Active B.book Page 29 Monday, September 29, 2003 5:04 PM 3 Care and Maintenance 29 Ocampa_UG_Active B.book Page 30 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 30 Ocampa_UG_Active B.book Page 31 Monday, September 29, 2003 5:04 PM C a r e a n d M a i n t e n a n c e Care and Maintenance
. This chapter gives you pointers on how to care for and maintain your Stylistic ST5000 Series Tablet PC. PROTECTING THE DISPLAY SCREEN The Stylistic ST5000 Series Tablet PC is designed to provide you with years of service. Using a screen protector will help ensure the screen remains as clear as possible. When installed, the screen protector becomes a durable, replaceable writing surface that protects the display screen from abrasion. To obtain additional screen protectors, use Fujitsu part number FPCSP03AP (5-pack) when ordering. Additional information about installation is included with the screen protectors. During normal use of the Tablet PC, small particles from the environment can become embedded in the pen tip and scratch the screen. To prevent scratching the screen, ensure that a screen protector is installed before using your Tablet PC. The warranty does not cover a scratched screen. To install a new screen protector on your Tablet PC:
1. If a screen protector is already installed on the display screen, remove it before installing the new screen protector. The screen protector is held onto the display screen surface by a thin strip of adhesive around the edges. A notch in one corner of the screen protector allows you to slide your fingernail under the screen protector for easy removal. 2. Clean the display by wiping the screen gently using a soft cotton cloth dampened with isopropyl alcohol. Ensure that all residue has been removed from the screen before applying a new screen protector.Remove the protective coating from the adhesive side of the screen protector first, as shown in Figure 3-1. The Stylistic ST5000 Series Tablet PC is not waterproof. Do not pour liquids on the system or wash it with a heavily soaked cloth. Do not place items on the top of the dis-
play, or damage may occur. Figure 3-1 Removing the Protective Sheet 3. Apply the screen protector to the display screen surface. When doing so, orient the screen protector with the adhesive side of the screen protector facing the display screen and the notched corner of the screen protector oriented as shown in Figure 3-2. Figure 3-2 Installing the screen protector 4. Apply pressure to the screen protector with your finger using a continuous wiping motion along the edges. The adhesive sets completely within 48 hours. To ensure a good seal between the screen protector and the display, do not lift the screen protector from the display once it has been applied. 5. Remove the protective plastic cover from the face of the screen protector, as shown in Figure 3-3. Figure 3-3 Removing the protective cover 31 Ocampa_UG_Active B.book Page 32 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 6. Clean any residue left behind by the protective coating from the exposed surface of the screen protector by wiping gently with a soft cotton cloth dampened with isopropyl alcohol. Wipe the screen protector with a soft dry cloth to remove any low-
tack adhesive; this will help prevent the pen tip from squeaking. The screen protector is now installed. STORING THE TABLET PC Store the Stylistic ST5000 Series Tablet PC in the Off state with a fully charged battery installed. You can store the Tablet PC in the Off state for about 30 days with a fully charged battery installed. After this period, the battery should be recharged or replaced with a charged battery. If you intend to store the Tablet PC for a longer period of time, the small battery that maintains system time may need to be replaced. Replacement of the clock battery should only be performed by authorized technicians. AVOIDING OVERHEATING The Tablet PC monitors its internal temperature. As the internal temperature approaches the tolerable limits of heat-sensitive components, system functions are auto-
matically limited or turned off to prevent damage. To avoid overheating the Tablet PC, do not obstruct the air vents on the top and bottom edges of the Tablet PC. CLEANING THE DISPLAY SCREEN To clean the Tablet PC display screen, wipe the screen surface gently using a soft cotton cloth slightly damp-
ened with water or isopropyl alcohol. The Stylistic ST5000 Series Tablet PC is not waterproof. Do not pour liquids on the Tablet PC or wash the Tablet PC with a heavily soaked cloth. TROUBLESHOOTING Solutions to some common problems are described in the following sections. If you are experiencing a problem with your Tablet PC that you cannot solve by taking the actions described, contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-
8Fujitsu (1-800-838-5487) for further assistance. System Will Not Resume Operation If the system will not resume operation after system operation has been suspended, check the following possible causes:
The battery may either be defective, or discharged to 32 a critically low level. When the battery reaches a critically low level, the system is forced into Suspend-
to-RAM mode to avoid a total system power failure. To correct this problem, either connect an external power supply (such as the AC adapter), or install a charged battery in the Tablet PC.
The system may be at the critical thermal limit. To avoid damage to heat-sensitive components, the system enters Suspend-to-RAM mode when it gets too hot. System operation cannot be resumed until the Tablet PC cools off to a tolerable temperature. Move the Tablet PC to a cooler location. Display Screen Blank or Difficult to Read If the display screen on your Tablet PC appears blank or is unreadable, confirm that the system is running (the Power icon is displayed continuously on the Status display), and check the following:
The system brightness may be set too low, causing the screen to appear too dark. To change system brightness, press the Fn button twice to open the Fujitsu menu. Brightness can be adjusted from the menu.
The video timeout may have expired. Tap on the display screen to reactivate the display. Note that this is a normal, power-saving feature. Cursor Is Not Tracking Pen If the cursor on the screen appears to be misaligned with the pen or is not accurately tracking the pen, calibrate the pen. See Calibrating the Pen on page 25 for more information. Infrared Data Transfer Is Not Working If you are experiencing problems transferring data over the systems infrared interface, note the following:
Can the IrDA port on the Tablet PC see the IrDA port on the other device? A direct line-of-sight path must exist between the IrDA port on the Tablet PC and the IrDA port on the other device.
The distance between the two devices must not be more than 3 feet.
The viewing angle from the IrDA port on the Tablet PC must not be more than 15 degrees from a center line between the IrDA port on the Tablet PC and the IrDA port on the other device.
The device with which you are trying to communicate must be compliant with the IrDA Standard Revision 1.1 (or 1.0).
It may be necessary for both computers to be using the same network connection protocols. Ocampa_UG_Active B.book Page 33 Monday, September 29, 2003 5:04 PM Tablet PC is Not Responding to the Pen If the Tablet PC does not respond to the pen, connect an external keyboard to the system to see if it responds to keyboard commands. If the system doesnt respond to a keyboard, the application or system may have crashed, and it may be necessary to reboot the system. If the system responds to a keyboard but not to a pen, contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-8Fujitsu (1-800-838-5487) for further assistance. Speaker/Headphone Volume Too Low If the audio volume on your Tablet PC speaker or external headphones is too low, check the following:
Ensure the speaker (or headphone output if using headphones) is enabled. To do so, open the Control Panel and double-click on the Sounds and Audio Devices icon. Select the proper tab, and increase the volume using the slider bar. (If you arent getting any sound, uncheck the Mute box if it is checked.)
Press the Fn button twice to open the Fujitsu menu. Volume can be adjusted from the menu.
Ensure the mute box in the system volume control
(accessible from the system tray) is not set.
Ensure any volume control in your audio software is set to an audible level. Configuring Peripheral Interfaces Certain peripheral devices can be disabled during the BIOS Setup. If the peripheral interface you want to use does not appear to be working with your peripheral device, ensure that it is enabled in the BIOS. Contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-8Fujitsu (1-800-838-5487) if you need assistance using BIOS Setup. RESTORING YOUR PRE-INSTALLED SOFTWARE The Drivers and Applications Restore (DAR) CD contains:
Sets of device drivers and Fujitsu utilities (in specific directories) that are unique to your Tablet PC configu-
ration for use as documented below. A link to the Drive Image Special Edition (DISE) utility on your hard disk drive. Read-me files that provide additional use information for items on this CD-ROM. C a r e a n d M a i n t e n a n c e In order to install applications and/or drivers from the DAR CD, you will need to connect an external CD drive to your system. If the DAR CD is in the drive when you boot up the system, and the Boot Sequence is set in the BIOS to boot from the CD drive first (see Creating a backup image when booting up on page 34), a message will appear informing you that if you proceed, you will have a choice of:
creating a new backup of drive C:, restor-
ing a previous backup, or restoring the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. If you wish to install drivers or applications only from the CD, remove the disk from the drive, reboot the system, and insert the CD after Windows has started. If you have access to the internet, visit the Fujitsu Support web site at www.fujitsupc.com to check for the most current information, drivers and hints on how to perform recovery and system updates. DRIVE IMAGE SPECIAL EDITION (DISE) PowerQuest Drive Image Special Edition (DISE) provides a way to restore your computer if you experience a hard disk crash or other system failure. Fujitsu has used DISE to create an image of everything installed on the computer at the time you purchased it. The image is saved on a separate partition on the hard disk. You can use DISE to restore the factory image and return your computer to the state in which it was shipped from Fujitsu. Although it is not necessary, you can use DISE to store additional image files you create. For example, if you install several applications and save data files on your hard disk, you can create a new image that includes them and then save that image file on the hard disk. Then, in the event of a hard disk failure, you can restore the image that includes the applications and data files you use. 33 Ocampa_UG_Active B.book Page 34 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e Using the DISE feature will reduce the amount of usable disk space on your hard disk drive. Creating a Backup Image You can create a system backup image of your C:\ drive at any time. The C:\ partition must be a FAT, FAT32, or NTFS partition, and it must be directly before the backup partition on your hard disk. There are two ways to implement the DISE utility: when booting up the system, or from the desktop. Creating a backup image when booting up Before creating an image at boot-up, you must first change the boot-up priority in the BIOS so that the system will go to the media drive first, rather than trying to boot-up from the hard drive or an external floppy disk drive. To change the boot-up priority:
1. Start your system and press the [F2] key when the Fujitsu logo appears. You will enter the BIOS Setup Utility. 2. Using the arrow keys, go to the Boot menu. 3. Arrow down to the Boot Device Priority submenu and press [Enter]. 4. Arrow down to the CD-ROM drive in the list, and press the space bar (or the + key) to move the CD-
ROM drive to the top of the list. (The system attempts to boot from the devices in the order in which they are listed.) 5. Press [F10], then click on [Yes] to exit the BIOS Setup Utility and return to the boot process. After you have changed the boot priority, you can create a backup image when you are booting up:
1. Install the DAR CD in the drive prior to booting up. When bootup begins, a message appears informing you that if you proceed, you will be able to:
Create a new backup of drive C Restore a previous backup, or, Restore the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. 2. After you click [Y]es. You will be presented with two options: [Create New Backup] and [Restore Backup]. 34 After you click [Create New Backup], follow the on-
screen instructions. By selecting [Create New Backup], a new image will be written to your backup partition. This will overwrite any previously created image. Creating a backup image from the desktop To create a backup image from the desktop, select Drive Image SE from the Program list. You will initially be prompted to create a backup diskette. It is not necessary to create the backup diskette, since the DAR CD performs the same function. 1. At the Drive Image Special Edition main screen, click Options> Create New Backup. DISE displays a warning that it must go to DOS to create the image. 2. Click Yes. DISE creates an image file in the backup partition. If you created a backup image previously, the new image overwrites the old one. Enlarging the Backup Partition If there is not enough unused space in the backup parti-
tion on your hard disk, DISE will resize the partition. DISE will display the minimum, maximum, and recom-
mended sizes for the backup partition. You choose the size you want. DISE takes the space from the FAT, FAT32, or NTFS partition that you are backing up. If there is not enough unused space in that partition to take, you will not be able to resize the backup partition and create an image file. You can delete files from the FAT, FAT32, or NTFS partition to create more unused space on the hard disk. Restoring a Backup Image You can restore either a factory image or a backup image you created. Be aware that restoring a backup image will replace the contents of the C:\ partition with the image you restore. 1. Disable virus protection software. If virus protection software is enabled, DISE will lock up. 2. From the DISE main window, click Options >
Restore Backup to restore an image you created, or click Options > Restore Factory Backup to restore the factory image. DISE shuts down to DOS and restores the image file. Re-Installing Individual Drivers and Applications The Drivers and Application CD can be used to selec-
tively re-install drivers and/or applications that may have been un-installed or corrupted. To re-install drivers and/or applications:
1. Boot up the system and insert the DAR CD after Windows has started. A Fujitsu Welcome screen is displayed after the CD is inserted. C a r e a n d M a i n t e n a n c e Ocampa_UG_Active B.book Page 35 Monday, September 29, 2003 5:04 PM 2. From the left frame of the Welcome screen, System Components and 3rd Party Applications can be selected. System Components are those drivers and utilities that have been developed by Fujitsu; 3rd Party Applications are applications developed by other vendors. Installing System Components 1. To install system components, click on System Components in the left frame of the Welcome screen. A list of utilities and drivers will be displayed. Select one or more items from the list, or click [Select All] to select all items in the list. (To de-select your choices, click the [Clear All] button. 2. Click [Install Selected Subsystems] to install the selected items. Installing 3rd Party Applications 1. To install 3rd party applications, click on 3rd Party Applications in the left frame of the Welcome screen. A list of applications will be displayed. 2. Select one of the items from the list, and follow the instructions that appear on the screen. Note that only one application may be installed at a time. 3. Repeat step 2 to install additional applications. 35 Ocampa_UG_Active B.book Page 36 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 36 Ocampa_UG_Active B.book Page 37 Monday, September 29, 2003 5:04 PM 4 Specifications 37 Ocampa_UG_Active B.book Page 38 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F o u r 38 Ocampa_UG_Active B.book Page 39 Monday, September 29, 2003 5:04 PM S y s t e m S p e c i f i c a t i o n s Stylistic ST5000 Series Hardware Specifications The following table provides general hardware specifica-
tions of the Stylistic ST5000 Series Tablet PC by category. Stylistic ST5000 Specifications (Continued) Stylistic ST5000 Specifications Physical Specifications Dimensions 8.66 w x 12.77 d x 0.82-0.88 h
(220 mm x 324.4 mm x 20.9-22.3 mm) Weight 3.2 lbs. (1.45 Kg) CPU Processing Specifications Ultra low voltage Mobile Intel Pentium III processor - M with SpeedStep technology*
Chip set Intel 855MGE - 400 MHz Processor Speed 1 GHz*
Main RAM Memory/Storage Specifications
256 MB SDRAM
144-pin SO DIMM modules
256 MB, 512 MB, and 1 GB module configurations available, with a system maximum of 2 GB. L1 cache
(CPU) 32 KB on-die L2 cache 1 MB on-die BIOS ROM 1 MB (FWH) Hard disk drive Display
2.5 HDD
Minimum 40 GB IDE HDD*
Ultra DMA 100
Shock-mounted Display Specifications
Color LCD
Active Digitizer
16-bit color
12. TFT XGA (1024 x 768), 16M colors
Brightness: 8 levels
Viewing Angle:
Horizontal: 30 degrees (min.) Vertical: 10 degrees (min.)
Contrast Ratio: Typ. 250, Min. 100 VRAM Intel 855MGE chipset with 8MB shared memory using Unified Memory Architecture (UMA) delivers low-
power, high-performance 3D/2D graphics, video, and display capabilities. Dynamic Video Memory Technology
(DVMT) dynamically responds to application requirements and efficiently allocates the proper amount of memory
(64 MB max.) for optimal graphics and system performance. Interface Specifications Card Slots
PCMCIA: One Type I or Type II, PCMCIA CardBus version 3.0 Integrated Interfaces
Secure Digital (SD) slot
Smart Card slot
Modem (RJ-11)
LAN (RJ-45)
IEEE 1394 (S400 4-pin)
USB 2.0 (Qty. 2)
DC-In
IrDA
15-pin D-SUB connector for external VGA monitor
Docking connector Infrared IrDA version 1.1 (FIR, 4Mbps) Keyboard/
Mouse support Audio User Controls
Keyboard/Mouse IR Port
System IR Port
SigmaTel STAC9767 codec
Internal mono microphone and speaker
Mono microphone and stereo headphone jacks
Application Buttons, each with primary, secondary, tertiary, and security functions
Power On/Suspend/Resume button
Emergency Shutoff Button (Power Off button)
Two Navigation buttons
* The specifications for your particular model may vary. To determine the specifications for your system, please visit our Web site at: www.fujitsupc.com. 39 Ocampa_UG_Active B.book Page 40 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F o u r Stylistic ST5000 Specifications (Continued) Stylistic ST5000 Specifications (Continued) Agency Approval Specifications
EN55022 (CISPR22) Class B
FCC 15, Class B
FCC 15C, 15.247
VCCI CLass B
ETSI EN 300-328
ICES-003
Canada RSS-210
EN55024 (1998)
ETSI EN 301-489-17 V.1.1.1
(2000-9)
UL and cUL Listed, UL 1950, 3rd edition
TuV T-Mark, EN60950
FCC Part 68
IC CS-03
Energy Star
JATE Emissions Immunity Safety Telecom Other Additional Specifications Operating systems
Microsoft Windows XP Tablet PC Edition Status Indicators
(LEDs) Main Battery Bridge Battery
Power
Charge/DC-In
Battery level
HDD
Security Power Specifications
6-cell
Removable, Lithium ion
10.8 V @ 4400 mAh
Warm-swappable
Recharge Time:
Suspend/Off: 3.5 hours (90%), 4.5 hours (100%) Operating: 8 hours (100%)
Life: Up to 5 hours. (Battery life is dependent upon the operating system, power management, and applications in use.)
Suspend Life: Minimum 5 days Off State: Approximately 30 days
6-cell NiMH, 35 mAh
Life (with Suspend-to-RAM on bridge battery only):
5 minutes from full charge AC Adapter
Autosensing 100 - 240V, supplying 16 VDC, with a current of 3.75 A Environmental Specifications Temperature Operating: 41o - 95o F (5o - 35o C) Non-operational: 5o - 140o F
(-15o - 60o C) Humidity Operating: 20 - 85% non-condensing Non-operating: 8 - 85% non-
condensing 40 Ocampa_UG_Active B.book Page 41 Monday, September 29, 2003 5:04 PM 5 Agency Notices 41 Ocampa_UG_Active B.book Page 42 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e 42 Ocampa_UG_Active B.book Page 43 Monday, September 29, 2003 5:04 PM Regulatory Information NOTICE Changes or modifications not expressly approved by Fujitsu could void this users authority to operate the equipment. FCC NOTICES Notice to Users of Radios and Television These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installa-
tion. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a partic-
ular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet that is on a different circuit than the receiver. Consult the dealer or an experienced radio/TV technician for help. Shielded interconnect cables must be employed with this equipment to ensure compliance with the pertinent RF emission limits governing this device. Notice to Users of the US Telephone Network This equipment (FMD MBH7MD33 Modem) complies with Part 68 of the FCC rules, and the requirements adopted by ACTA. On the bottom of this equipment is a label that contains, among other information, the FCC registration number and ringer equivalence number
(REN) for this equipment; or a product identifier in the format US:AAAEQ##TXXXX. If requested, this informa-
tion or number must be provided to the telephone company. This equipment is designed to be connected to the tele-
phone network or premises wiring using a standard jack type USOC RJ11C. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant tele-
phone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. A g e n c y N o t i c e s The ringer equivalent number (REN) of this equipment is 0.0B as shown on the label. The REN is used to deter-
mine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. If this equipment causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isnt practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary. The telephone company may make changes in its facili-
ties, equipment, operations or procedures that could effect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service. If trouble is experienced with this equipment, for repair or warranty information, please refer to the manual or contact Fujitsu PC Corporation, Customer Service. If the equipment is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. The equipment cannot be used on public coin service provided by the telephone company. Connection to party line service is subject to state tariffs. (Contact the state public utility commission, public service commission or corporation commission for information). If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this computer does not disable your alarm equipment. If you have any questions about what will disable alarm equipment, consult your telephone company or a quali-
fied installer. The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date an time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual. 43 Ocampa_UG_Active B.book Page 44 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e Avis Aux Utilisateurs Du Rseau Tlphonique Canadien AVIS: Le prsent matriel (FMD MBH7MD33 Modem) est conforme aux spcifications techniques dIndustrie Canada applicables au matriel terminal. Cette confor-
mit est confirme par le numro denregistrement. Le sigle IC, plac devant le numro denregistrement, signifie que lenregistrement sest effectu conform-
ment une dclaration de conformit et indique que les spcifications techniques dIndustrie Canada ont t respectes. Il nimplique pas quIndustrie Canada a approuv le matriel. Avant de connecter cet quipement une ligne tlpho-
nique, lutilisateur doit vrifier sil est permis de connecter cet quipement aux installations de tlcom-
munications locales. Lutilisateur est averti que mme la conformit aux normes de certification ne peut dans certains cas empcher la dgradation du service. Les rparations de lquipement de tlcommunications doivent tre eVectues par un service de maintenance agr au Canada. Toute rparation ou modification, qui nest pas expressment approuve par Fujitsu, ou toute dfaillance de lquipement peut entraner la compagnie de tlcommunications exiger que lutilisateur dcon-
necte lquipement de la ligne tlphonique. AVIS: Lindice dquivalence de la sonnerie (IES) du prsent matriel est de 0.0. LIES assign chaque dispositif terminal indique le nombre maximal de terminaux qui peuvent tre raccords une interface tlphonique. La terminaison dune interface peut consister en une combinaison quelconque de dispositifs, la seule condition que la somme dindices dquiva-
lence de la sonnerie de tous les dispositifs nexcde pas 5. Pour assurer la scurit, les utilisateurs doivent vrifier que la prise de terre du ser-
vice dlectricit, les lignes tlphoniques et les conduites deau mtalliques sont con-
nectes ensemble. Les utilisateurs NE doivent PAS tenter dtablir ces connex-
ions eux-mmes, mais doivent contacter les services dinspection dinstallations lectriques appropris ou un lectricien. Ceci peut tre particulirement important en rgions rurales. DOC (INDUSTRY CANADA) NOTICES Notice to Users of Radios and Television This Class B digital apparatus meets all requirements of Canadian Interference-Causing Equipment Regulations. CET appareil numrique de la class B respecte toutes les exigence du Rglement sur le matrial brouilleur du Canada. Notice to Users of the Canadian Telephone Network NOTICE: This equipment (Modem FMD MBH7MD33) meets the applicable Industry Canada Terminal Equip-
ment Technical Specifications. This is confirmed by the registration number. The abbreviation, IC, before the registration number signifies that registration was performed based on a Declaration of Conformity indi-
cating that Industry Canada technical specifications were met. It does not imply that Industry Canada approved the equipment. Before connecting this equipment to a telephone line the user should ensure that it is permissible to connect this equipment to the local telecommunication facilities. The user should be aware that compliance with the certification standards does not prevent service degradation in some situations. Repairs to telecommunication equipment should be made by a Canadian authorized maintenance facility. Any repairs or alterations not expressly approved by Fujitsu or any equipment failures may give the telecom-
munication company cause to request the user to disconnect the equipment from the telephone line. NOTICE: The Ringer Equivalence Number (REN) for this terminal equipment is 0.0. The REN assigned to each terminal equipment provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equiva-
lence Numbers of all the devices does not exceed five. For safety, users should ensure that the electrical ground of the power utility, the telephone lines and the metallic water pipes are connected together. Users should NOT attempt to make such connections themselves but should contact the appro-
priate electric inspection authority or elec-
trician. This may be particularly important in rural areas. 44 Ocampa_UG_Active B.book Page 45 Monday, September 29, 2003 5:04 PM A g e n c y N o t i c e s UL Notice This unit requires an AC adapter to operate. Use only UL Listed Class 2 Adapters with an output rating of 16 VDC, with a current of 3.75A minimum. AC Adapter output polarity:
The modem-to-telephone network connection must be a line cord using a minimum #26 AWG wire. For Authorized Repair Technicians Only For continued protection against risk of fire, replace only with the same type and rating fuse. Danger of explosion if Lithium (clock) battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the manufacturer. Dis-
pose of used batteries according to the manufacturers instruction. System Disposal LAMP(S) INSIDE THIS PRODUCT Hg CONTAIN MERCURY AND MUST BE RECYCLED OR DISPOSED OF ACCORDING TO LOCAL, STATE, OR FEDERAL LAWS. 45 Ocampa_UG_Active B.book Page 46 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e 46 Ocampa_UG_Active B.book Page 47 Monday, September 29, 2003 5:04 PM Appendix Wireless LAN* Users Guide
* Optional device 47 Ocampa_UG_Active B.book Page 48 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x 48 Ocampa_UG_Active B.book Page 49 Monday, September 29, 2003 5:04 PM FCC REGULATORY INFORMATION Please note the following regulatory information related to the optional wireless LAN device. Regulatory Notes and Statements Wireless LAN, Health and Authorization for use Radio frequency electromagnetic energy is emitted from Wire-
less LAN devices. The energy levels of these emissions, however, are far much less than the electromagnetic energy emissions from wireless devices such as mobile phones. Wireless LAN devices are safe for use by consumers because they operate within the guidelines found in radio frequency safety standards and recommendations. The use of Wireless LAN devices may be restricted in some situations or environments, such as:
On board an airplane, or In an explosive environment, or In situations where the interference risk to other devices or services is perceived or identified as harmful. In cases in which the policy regarding use of Wireless LAN devices in specific environments is not clear (e.g., airports, hospitals, chemical/oil/gas industrial plants, private buildings), obtain authorization to use these devices prior to operating the equipment. Regulatory Information/Disclaimers Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in the user documentation provided with the product. Any changes or modifications made to this device that are not expressly approved by the manufacturer may void the users authority to operate the equipment. The manufacturer is not responsible for any radio or television interference caused by unauthorized modification of this device, or the substitution or attachment of connecting cables and equipment other than those specified by the manufacturer. It is the responsibility of the user to correct any interference caused by such unauthorized modifica-
tion, substitution or attachment. The manufacturer and its authorized resellers or distributors will assume no liability for any damage or violation of government regulations arising from failure to comply with these guidelines. This device must not be co-located or operating in conjunction with any other antenna or transmitter. Federal Communications Commission statement This device complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause interference, and, (2) This device must accept any interference, including interference that may cause undesired operation of this device. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installa-
tion. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with W i r e l e s s L A N U s e r s G u i d e the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interfer-
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna. 2. Increase the distance between the equipment and the receiver. 3. Connect the equipment to an outlet on a circuit different from the one the receiver is connected to. 4. Consult the dealer or an experienced radio/TV technician for help. FCC Radio Frequency Exposure statement This Wireless LAN radio device has been evaluated under FCC Bulletin OET 65C and found compliant with the requirements as set forth in CFR 47 Sections 2.1091, 2.1093, and 15.247 (b)
(4) addressing RF Exposure from radio frequency devices. The radiated output power of this Wireless LAN device is far below the FCC radio frequency exposure limits.
(The maximum SAR value measured from this device was 0.36 W/kg.) Export restrictions This product or software contains encryption code which may not be exported or transferred from the US or Canada without an approved US Department of Commerce export license. This device complies with Part 15 of FCC Rules., as well as ICES 003 B / NMB 003 B. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesirable operation. Modifications not expressly authorized by Fujitsu PC Corpora-
tion may invalidate the user's right to operate this equipment. Canadian Notice To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. 49 Ocampa_UG_Active B.book Page 50 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Before Using the Wireless LAN The Integrated Wireless LAN is a standard device on Stylistic ST5000 Tablet PCs, and an option on Stylistic ST5000D Tablet PCs. This manual describes the basic operating procedures for the Wireless LAN (referred to as the device in this manual) and how to set up a wire-
less LAN network. Before using this device, read this manual carefully to ensure correct operation of the device. Keep this manual in a safe place for reference while using the device. Types of Wireless LANs Covered by this Document This document is applicable to systems containing one of the following two devices. Most of the procedures are identical. Sections that differ between the two devices have been noted in the text:
Intel PROSet Wireless LAN Atheros Wireless LAN To determine which device is present in your system, click [Start] -> Control Panel. If there is an icon named Intel PROSet, you have the Intel device; if there is an icon named Atheros Client Utility, you have the Atheros device. Characteristics of the Device This device consists of a wireless LAN card that is attached inside the computer via a mini-PCI slot. The main characteristics are as follows:
It operates in the 2.4 GHz Industrial, Scientific, and Medical (ISM) RF band. It does not require the procurement of an FCC license to operate. It uses Direct Sequence Spread Spectrum (DS-SS), an RF modulation scheme that is resistant to noise. Figure 1. Ad Hoc Mode Network This device complies with Wi-Fi, and is able to com-
municate at the maximum transfer rate of 11 Mbps. The maximum communication range is approxi-
mately 80 feet (25 meters) inside a building. The range may be shorter depending upon the installation fac-
tors, such as walls and columns. Unauthorized access can be prevented with the use of an SSID and an encryption key (also known as a WEP key). Wireless LAN Modes Using this Device Ad Hoc Mode (See Figure 1) Ad Hoc Mode refers to a type of wireless network that involves connecting multiple computers without the use of an Access Point. Network connectivity between computers can be established using only wireless LAN cards in a peer-to-peer fashion. Ad Hoc networks are an easy and inexpensive method for establishing network connectivity between multiple computers. In the Ad Hoc mode, you can use the function supported by Microsoft Network, such as File and Print Sharing to exchange files and share a printer or other peripheral devices. To use the Ad Hoc Mode, you must set the same SSID and the same encryption key for all the computers that are connected. All connected computers can communi-
cate with each other within the communication range. Access Point (Infrastructure) Mode (See Figure 2) If a number of computers are connected simultaneously in the Ad Hoc mode, the transfer rate may be reduced, communications may become unstable, or the network 50 Ocampa_UG_Active B.book Page 51 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Figure 2. Access Point (Infrastructure) Mode Network Internet ADSL modem, cable modem, or similar Wired LAN Access Point*
Wireless LAN connection could fail. This is because all wireless LAN cards are using the same radio frequency in the network. To improve this situation, you can use a wireless LAN access point, which is sold separately. The wireless LAN network is in the Access Point mode when it uses an access point, and such a connection is called the Access Point Network or Infrastructure Network. By using an access point, you can set and use a different communication channel for each network group. Each channel is given a different radio frequency, and it eliminates the collision of communications and provides a more stable communications environment. How to Handle This Device The Integrated Wireless LAN device is already installed in your mobile computer. Under normal circumstances, it should not be necessary for you to remove or re-install it. The LAN has been configured to support the operating system with which your system shipped. FOR BETTER COMMUNICATIONS This personal computer may not operate properly due to the operating environment. Strictly observe the following precautions when installing the main unit of the computer:
The recommended wireless communications distance is within a line-of-sight radius of 25 meters. For rea-
sons related to the characteristics of the wireless LAN,
* An optional hub for a wired LAN may be required depending upon the type of access point used. however, the actual communications distance depends on the structure of the building in which the wireless LAN function is to be used, the presence/absence of obstructions, the types of software to be used, installa-
tion status, radio-wave status, or other operating con-
ditions. Decreases in communications speed or a communications failure may also occur. Distance the main unit of this personal computer is from other electric appliances. If the main unit of the person computer is installed near a powered-on electric appliance, the computer may not be able to communi-
cate properly or trouble may occur in the electric appli-
ance. If the computer is unable to communicate properly, change the channel to be used or the installation loca-
tion. During the use of a microwave oven or other equipment generating strong high-frequency energy, in particular, the personal computer may be highly sus-
ceptible to the energy and unable to communicate properly. If a broadcasting station or wireless communications equipment is present nearby and this prevents the com-
puter from communicating properly, moving the main unit of the computer is suggested. Radio interference may also occur if the intensity of ambient radio waves is too high. 51 Ocampa_UG_Active B.book Page 52 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Atheros Wireless LAN 1. Click [Start] --> [Control Panel] --> [Atheros Cli-
ent Utility]. The Atheros Wireless Configuration Utility window will be displayed. 2. Click the Wireless Networks tab. 3. Click the [Enable Radio] box to clear it, then click the [OK] button. Wireless communications on/off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, check the [Enable Radio] checkbox to select it., then click the
[OK] button. STARTING TRANSMISSION To communicate using the wireless LAN function, set the computer to a status from which it can transmit, as follows:
Intel PROSet Wireless LAN:
1. Set the wireless switch to the On position. 2. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 3. Click the [General] tab if it is not already selected. 4. Select [ON] for the Switch radio: function, then click [OK]. Wireless communications on/off switching will be activated and the transmission of radio waves will be restarted. Atheros Wireless LAN:
1. Click the Wireless Network Connection icon in the system tray at the lower right of your screen. 2. Click [Enable Radio]. The radio will be turned on. Access Point Mode: Transmission is enabled. Ad Hoc Mode: Restart your computer to enable the radio. STOPPING TRANSMISSION To use this product inside hospitals, clinics, or airplanes, or in other places where the use of electronic equipment is regulated, stop the transmission of radio waves from the wireless LAN beforehand. Deactivation using the wireless switch The transmission of radio waves from the wireless LAN can be stopped by setting the wireless switch to the Off position. Note that the Wireless LAN On/Off switch has no effect on non-Wireless LAN models.
(See Figure 3 for Wireless LAN switch location.) Wireless LAN On/Off Switch Figure 3. Wireless LAN On/Off Switch Deactivation using Windows Intel PROSet Wireless LAN:
1. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the General tab. 3. Select [Off] for the wireless communications Switch Radio: function, and then click the [OK]
button. Wireless communications on/off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, select [On] for the wireless communications Switch Radio:
function, and then click the [OK] button. 52 Ocampa_UG_Active B.book Page 53 Monday, September 29, 2003 5:04 PM Connecting the WLAN FLOW OF OPERATIONS The wireless LAN connection procedure contained in this section is outlined below. 1. Make sure the mobile computer is ready for the transmission of radio waves from the wireless LAN. For further details, see (See Starting Transmission on page 52 for more information.). 2. Assign the parameters required for wireless LAN connection. (See Preparation for wireless LAN con-
nection on page 53 for more information.). Enter the network name (SSID) and other data. Enter the network key (the Wired Equivalent Privacy or WEP key used to encode 802.11b communications data). 3. Perform setting operations relating to network con-
nection. (See Connection to the network on page 55 for more information.) Specify TCP/IP as the protocol, and confirm the name of the work group and other settings. Enter the data required for file/printer sharing on the network. Perform this operation as required. For access point (or infrastructure) connection, enter data for the access point. Refer to the manual of the access point for further details. Verify that you are able to connect your computer to the network. PREPARATION FOR WIRELESS LAN CONNECTION This section explains the preparations required for the use of the wireless LAN. Assigning parameters Enter the network name (SSID), the network key, and other data required for wireless LAN connection. If there is the administrator of the network, contact the network administrator for data settings. W i r e l e s s L A N U s e r s G u i d e To use access point (infrastructure) con-
nection, refer to the access point manual for the access point-setting procedure. You do not need to set the channel when using access point (infrastructure) mode. Channel selection is controlled by the access point. In ad hoc networks, channel selection defaults to channel 11;
however, channel selection can be man-
ually changed if desired. This can be accomplished only when using the client utility. If it is necessary to change the channel, change the setting of the access point. For the setting procedure, refer to the manual of the access point. 1. Make sure the Wireless LAN switch is switched on. 2. Click the [Start] button first and then [Control Panel]. 3. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed instead.) 4. Double-click the Network Connections icon. A list of currently installed networks will be displayed. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. 6. Click the [Wireless Networks] tab. 7. Click [Refresh], then choose the correct SSID from the [Available Networks] window. Click [Config-
ure] and proceed to step 7. If the SSID of your access point does not appear in the list, click [Add]. The [Wireless Network Properties] window will be displayed. 8. 9. Select the Association tab if it is not already selected. Enter the information required for connection to the wireless LAN. a. Enter the network name (SSID). (i.e., Enter the name of the desired network in less than 33 ASCII characters). For ad hoc connection: Assign the same network name to all the personal computers to be connected. 53 Ocampa_UG_Active B.book Page 54 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x connected. For access point (infrastructure) connection:
Assign the identical network key that is pro-
grammed into the access point. For this set-
ting, refer to the access point manual or contact your network administrator. d. Confirm the Network key by re-entering the same data in the [Confirm network key:] field. e. Make sure that [Key index (advanced)] is set to 1. (Any value from 1 to 4 can be assigned to [Key index (advanced)]. 1 is usually assigned, however). 11. Click the [Authentication] tab and then verify the settings of [Enable network access control using IEEE 802.11x]. For internal use at an organization such as a com-
pany, when access by wireless LAN clients is to be limited using IEEE 802.11x authentication, check the [Enable network access control using IEEE 802.11x] check box. For home use, clear the check mark from [Enable network access control using IEEE 802.11x]. For the setting method relating to IEEE 802.11x authentication, refer to the manual of the access point which you are using. 12. After completion of setting operations, click the
[OK] button. Processing will return to the [Wire-
less Network Connection Properties] window. 13. Verify that the network name entered in step 7 above is added in [Preferred Networks], and then click the [OK] button. In [Preferred Networks], register only the desired connection settings. 14. Close the [Wireless Network] window. For access point (infrastructure) connection:
Assign the appropriate SSID. The SSID must be identical to the SSID of the access point. Refer to the access point manual, or contact your network administrator. b. For ad hoc connection, check the following field. For access point (infrastructure) connection, clear the check mark for the following field:
[This is a computer-to-computer (ad hoc) net-
work; wireless access points are not used.]
10. Enter the WEP key for encoding communications data. It is strongly recommended that you enter the network key for encoding communications data. If the network key is not entered, since the network can be accessed from all personal computers containing the wireless LAN function, there is the danger of your data being stolen or damaged by other users. a. Check the [Data encryption (WEP enabled)]
check box For ad hoc connection: Clear the check mark from the [Network Authentication (Shared mode)] check box. For access point (infrastructure) connection: If the access point to be accessed has acquired shared-key authentication, check the [Network Authentication (Shared mode)] check box. For open-system authentication, clear the check mark. For access point setting, refer to the man-
ual of the access point. b. Clear the check mark from the [The key is provided for me automatically] check box. c. Enter data in [Network Key]. Depending on the number of entered characters or digits, whether the key is an ASCII character code or a hexadec-
imal code will be identified automatically. Use five or thirteen characters to enter the key in the ASCII character code format. The char-
acters that can be used as the network key are as follows: 0 - 9, A - Z, _ (underscore), or, Use 10 or 26 characters to enter the key in the hexadecimal character code format. The char-
acters that can be used as the network key in this case are as follows: 0- 9, A - Z, a - f For ad hoc connection: Assign the same net-
work key to all the personal computers to be 54 Ocampa_UG_Active B.book Page 55 Monday, September 29, 2003 5:04 PM CONNECTION TO THE NETWORK This section explains connection to the network. Following this operation, confirm the names of the computer and the workgroup as follows. W i r e l e s s L A N U s e r s G u i d e If there is an administrator of the network, contact the network administrator for data settings. Setting the network Perform the Setting TCP/IP and Confirming the computer and work group names operations required for network connection. Setting TCP/IP To change the setting of the IP address, you need to be logged in from Windows as an administrator. 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. 5. Click the [General] tab if it is not already selected. 6. Click [Internet Protocol (TCP/IP] and then click
[Properties]. The [Internet Protocol (TCP/IP) Properties] window will be displayed. 7. Set the IP address as follows:
For ad hoc connection: Select [Use the following IP address:] and then enter data for [IP address]
and [Subnet mask]. See page 64 for IP address setting. For access point (infrastructure) connection: If your network uses DHCP, select [Obtain an IP address automatically] and [Obtain DNS server address automatically]. If your network uses static IP addresses, consult with your network adminis-
trator for the correct IP address settings. 8. Click the [OK] button. Processing will return to the
[Wireless Network Connection Properties] window. 9. Click the [OK] button. 10. Close the [Network Connection] window. Confirming the computer and work group names To modify the computer name and/or the work group name, you need to be logged in from Windows as an administrator. 1. Click the [Start] button, then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click the [System] icon. The [System Prop-
erties] window will be displayed. 4. Click the [Computer Name] tab. 5. Confirm the settings of [Full computer name:] and
[Workgroup:]. a. The setting of [Full computer name:] denotes the name for identifying the computer. Any name can be assigned for each personal computer. To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen. Enter the desired name in less than 15 ASCII character code format. Identifiability can be enhanced by entering the model number, the user name, and other factors. b. [Workgroup name] is the group name of the network. Enter the desired name in less than 15 ASCII character code format. For ad hoc connection: Assign the same network name to all personal computers existing on the network. For access point (infrastructure) connection:
Assign the name of the work group to be accessed. 6. Click the [OK] button. If a message is displayed that requests you to restart the personal computer, click [Yes] to restart the computer. Setting the sharing function Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid. 55 Ocampa_UG_Active B.book Page 56 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x This operation is not required unless the sharing func-
tion is to be used. The folder and printer for which the sharing function has been set will be usable from any personal computer present on the network. 2. Double-click [Local disk (C:)]. 3. Right-click the work folder (or whichever folder you want to share), and then click [Sharing and Security...] in the menu displayed. The [Folder Name Properties] window will be displayed. To share a file and/or the connected printer, you need to be logged in as an administrator. Setting the Microsoft network-sharing service 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. If [File and Printer Sharing for Microsoft Net-
works] is displayed, proceed to step 6. If [File and Printer Sharing for Microsoft Networks] is not dis-
played, skip to step 7. 6. Make sure that the [File and Printer Sharing for Microsoft Networks] check box is checked, and then click the [OK] button. Skip to Setting file-
sharing function. 7. Click [Install]. The [Select Network Component Type] window will be displayed. 8. Click [Service], then click the [Add] button. The
[Select Network Service] window will be displayed. 9. Click [File and Printer Sharing for Microsoft Net-
works] and then click the [OK] button. Processing will return to the [Wireless Network Connection Properties] window, and [File and Printer Sharing for Microsoft Networks] will be added to the list. 10. Click the [Close] button. Setting the file-sharing function The procedure for setting the file-sharing function follows, with the work folder in drive C: as an example. Setting the file-sharing function for the file which has been used to execute Network Setup Wizard is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the file-
sharing function easily without using Network Setup Wizard are given below. 4. Click [Sharing] if it isnt already selected. 5. Click the link stating If you understand the secu-
rity risks, but want to share files without running the wizard, click here. 6. Click Just enable file sharing and click [OK]. 7. Check the [Share this folder on the network] check box. To specify the corresponding folder as a read-only folder, select the [Read only]
checkbox under the General tab. 8. Click the [OK] button. The folder will be set as a sharable folder, and the display of the icon for the work. folder will change. Setting the printer-sharing function 1. Click the [Start] button first and then [Printers and FAX]. A list of connected printers will be displayed. 2. Right-click the printer for which the sharing func-
tion is to be set, and then click [Sharing] in the menu displayed. The property window correspond-
ing to the selected printer will be displayed. Setting the printer-sharing function when Network Setup Wizard has been executed is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the printer-sharing function without using Network Setup Wizard are laid down below. Click the [Start] button first and then [My Com-
puter]. 3. Click the [Sharing] tab. 4. Click [Share this printer]. 1. 56 Ocampa_UG_Active B.book Page 57 Monday, September 29, 2003 5:04 PM 5. Enter the sharing printer name in [Share name]. 6. Click the [OK] button. Confirming connection After you have finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure. In the case of access point (infrastructure) connection, enter the necessary data for the access point before confirming connection. Refer to the manual of the access point for the access point setup procedure. Connecting your personal computer to another personal computer 1. Click [Start] first and then [My Computer]. The
[My Computer] window will be displayed in the left frame. 2. Click [My Network Places] in the Other Places list. The window [My Network Places] will be dis-
played. 3. Click [View workgroup computers] under Network Tasks in the left frame. 4. Double-click the personal computer to which your personal computer is to be connected. The folder that was specified in Setting the file-sharing func-
tion on page 56 will be displayed. 5. Double-click the folder to be accessed. Confirming the status of the radio Intel PROSet Wireless LAN:
1. Click [Start] -> [All Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The [Intel(R) PROSet] window will be displayed. 2. Click the [General] tab and confirm radio status in the window displayed. The current connection sta-
tus will be displayed. Signal Quality The quality of the signals is displayed on a graph. Network name (SSID) The connected network name (SSID) is displayed. Profile name
<No profile> is displayed. Mode If access point (infrastructure) connection is in use, Infrastructure (AP) will be displayed. If ad W i r e l e s s L A N U s e r s G u i d e hoc connection is in use, Ad hoc (Peer-to-peer) will be displayed. Security The setting status of WEP is displayed. Speed The communications speed is displayed. Band (Frequency) The current operating frequency band is displayed. When communication is possible, 802.11b (2.4 GHz) is displayed. Channel The channel number currently being used for the communications is displayed. If connection cannot be made to the network or if you want to check for normal connection, see Trouble-
shooting on page 60. Atheros Wireless LAN:
1. Right-click the Atheros icon in the lower right cor-
ner of the screen. 2. Click [Open Client Utility]. The Atheros Wireless Configuration Utility window opens. 3. Contained within the Current Status tab and Advanced Current Status, you will find the current operating status of the radio. (When the radio is turned off or the computer is not yet connected, some of the conditions will not be displayed.) Profile Name The current configuration profile is displayed. Network Type - Configured Network Type
[Access Point] or [AdHoc] will be displayed. Current Mode Indicates the frequency and data rate currently used by the radio. Current Channel The channel number currently used by the radio. Link Status Displays the current connected state of the WLAN module. Encryption Type Displays the encryption type currently used by the radio. IP Address Displays the current TCP/IP address assigned to the WLAN adapter. Country The country with the country code for which the radio is configured. 57 Ocampa_UG_Active B.book Page 58 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Transmit Power Level Displays the current transmit power level of the radio. Network Name (SSID) Displays the Network Name (SSID) currently used by the radio. Power Save Mode Displays the configured Power Save Mode currently used by the radio. [Off], [Normal], or
[Maximum] will be displayed. BSSID Displays the Basic Service Set Identifier. This is typically the MAC address of the Access Point or in the case of AdHoc networks, is a randomly generated MAC address. Frequency Displays the center frequency currently being used by the radio. Transmit Rate Displays the current data rate used by the radio to transmit data. Receive Rate Displays the current data rate used by the radio to receive data. 58 Ocampa_UG_Active B.book Page 59 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Other settings SETTING OF POWER-SAVING FUNCTION You can set the power-saving function of wireless LAN. Default setting is auto-setting. In case of using the power-
saving function, manually control the communication performance. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Ad hoc settings]. The [Ad hoc settings] window will be displayed. 4. Change channels during ad hoc connection by selecting a new channel from the drop down list. 3. Click the [Configure] button in [Power settings]. 5. Click [OK]. The [Power settings] window will be displayed. Atheros Wireless LAN:
4. Select [Manual], and adjust the bar to set the power-
saving function. 1. Click on the My Computer icon. Select [View sys-
tem information] from the left frame. 2. Select the Hardware tab and click [Device Manager]. 3. Double-click Atheros BCM4306 Wireless LAN Adapter under [Network Adapters]. 4. 5. In the Atheros BCM4306 Wireless LAN Adapter window, select the Advanced tab. Select IBSS Channel Number from the list, and change the value from the [Value:] dropdown list to the desired channel. 6. Click [OK]. Setting of transmission power during ad hoc connection By controlling the transmission power during ad hoc connection, you can broaden or narrow the communica-
tion range. This setting is only effective during ad hoc connection. It will be ineffective during access point connection. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Power settings]. The [Power settings] window will be displayed. 4. Adjust the Transmission Power (Ad Hoc) bar to set the transmission power. Setting of channels during ad hoc connection You can set channels during ad hoc connection. Channel 11 is set by default. When connecting to an existing ad hoc network, no channel setting will be effective. This setting is only effective during ad hoc connection; it will be ineffective during access point connection. When changing channels during ad hoc connection, change the channel settings of all connected computers with the same Network name (SSID) at the same time. After changing the channels, turn off all computers and -- after they are all turned off -- turn them back on. 59 Ocampa_UG_Active B.book Page 60 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Troubleshooting Causes and countermeasures for troubles you may encounter while using your wireless LAN are described in the following table. Problem Possible Cause Possible Solution Unavailable network connection Incorrect network name (SSID) or network key Ad hoc connection: verify that the network names (SSIDs) and network keys (WEP) of all computers to be connected have been configured correctly. SSIDs and WEP key values must be identical on each machine. Access Point (Infrastructure) connection: set the network name (SSID) and network key to the same values as those of the access point. Set the Network Authentication value identically to that of the Access Point. Please consult your network administrator for this value, if necessary. For the method of setting network authentication, refer to the following pages: Assigning parameters on page 53 Poor radio wave condition Ad hoc connection: Retry connection after shortening the distance to the destination computer or removing any obstacles for better sight. Access Point (Infrastructure) connection: Retry connection after short-
ening the distance to the access point or removing any obstacles for better sight. To check the wave condition, refer to the following pages: Confirming the status of the radio waves on page 57. Radio wave transmission has stopped Check if the wireless switch is turned ON. Also verify Disable Radio is not checked in Network setting window. Refer to Starting Transmis-
sion on page 52. The computer to be connected is turned off Active channel duplication due to multiple wireless LAN networks No right of access to the network to be connected Incorrectly-
performed network setting Unmatched
[Network authentication
(shared mode)]
settings in Windows XP Check if the computer to be connected is turned ON. If there is any other wireless LAN network nearby, change channels to avoid active channel duplication. For the method of checking active channels, refer to the following pages: Confirming the status of the radio waves on page 57 Check if you have a right of access to the network to be connected with. Check the protocol, work group name or shared setting. For the method of checking, refer to the following pages: Connection to the Network on page 55. If the setting of [Network authentication (shared mode)] is not matched with that of access point or computer to be connected with, no commu-
nication can be established. Check the parameter setting.Refer to Assigning parameters on page 53. 60 Ocampa_UG_Active B.book Page 61 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Problem Possible Cause Possible Solution Unavailable network connection
(continued) It takes too long to retrieve the network and display the connected computers. Retrieve computers as follow:
1. Click [Start] button, then click [Search]. 2. Click [Computers or people]. 3. Click [Computers on the network]. 4. Input the name of computer to be connected with in [Computer name] and click [Search]. 5. Double-click the icon of connected computer. Incorrect setting of IP address Check the network setting. Setting the network on page 55. In case of using TCP/IP protocol, you can check IP address as follows:
1. 2. Click [Start] -> [All programs] -> [Accessories] ->
[Command prompt]. In [Command prompt] or [MS-DOS prompt] window, input
[IPCONFIG] command as follows, then press [Enter] key. Example: In case of C drive being the hard disk:
C:\ipconfig [Enter]
Check that the IP address is correctly displayed:. IP Address................: 10.0.1.3 Subnet Mask.............: 255.255.255.0 Default Gateway.........: 10.0.1.1 When IP address is displayed as [169.254.XXX.YYY] or [0.0.0.0], IP address is not correctly fetched from the access point. In that case, restart the computer itself. If the display is still unchanged, check the setting of TCP/IP. If [Cable Disconnected] or [Media Disconnected] is displayed without showing IP address, check the setting of network name
(SSID) and network key. Also, set the network authentication according to the access point. Communication is disconnected soon after connection to the access point Access control may be disabled Check the setting of Enable network access control using IEEE 802.1X.Refer to Assigning parameters on page 53. When restricting the access of wireless LAN clients using IEEE802.1X authentication, put a check mark on Enable network access control using IEEE 802.1X. When using at home, remove a check mark on Enable network access control using IEEE802.1X. For the method of setting related with IEEE802.1X authentication, refer to the access point manual. 61 Ocampa_UG_Active B.book Page 62 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Wireless LAN Glossary Ad hoc A designation for wireless LAN network configuration. It indicates a form of communication limited to those personal computers which have wireless LAN function. For details, refer to Ad hoc connection on page 50. Channel The frequency band of wireless LAN to be used in communications over wireless LAN or at the access point. DHCP (Dynamic Host Configuration Protocol) A protocol used for automatically fetching communica-
tion parameters such as IP addresses. The side which assigns IP address is called DHCP server and the side that is assigned it is called DHCP client. DNS (Domain Name System) A function that controls the correspondence of IP addresses assigned to a computer with the name. Even for those computers whose IP addresses are unknown, if their names are known, it is possible to communicate with them. IEEE802.11a One of the wireless LAN standards prescribed by the 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Electronic Engineers). It allows communications at the maximum speed of 54 Mbps by using a 5GHz band which can freely be used without radio communication license. IEEE802.11b One of the wireless LAN standards prescribed by 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Electronic Engineers). It allows communications at the maximum speed of 11Mbps by a band of 2.4 GHz (ISM band) which can freely be used without radio communication license. Access point A designation of Wireless LAN network configurations. It indicates a form of communication using an Access Point. For details, refer to access point connection on page 50. IP address An address used by computers for communicating in TCP/IP environment. IP addresses have global and private addresses. A global address is a unique address in 62 the world. A private address is a unique address within a closed network. LAN (Local Area Network) An environment connecting computers within a rela-
tively small range, such as the same floor and building. MAC address (Media Access Control Address) A physical address inherent to a network card. For Ethernet, the top three bytes are controlled/assigned as a vendor code. The remaining three bytes comprise the code uniquely (to avoid duplication) controlled by each vendor. As a result, there is no Ethernet card with the same physical address in the world. In Ethernet, the frame transmission/reception is performed based on this address. MTU (Maximum Transmission Unit) The maximum size of data which can be transmitted at one time in networks including the Internet. In an envi-
ronment whose maximum size of data is too large to correctly receive data, normal communications can be restored by setting the size of MTU to a smaller value. Network authentication The method of authentication performed by wireless LAN clients to connect with the access point. There are two types: open system authentication and shared key authentication. The type of authentication must be set to each client and also coincide with the setting of access point with which to communicate. Network authentica-
tion is sometimes called authentication mode. Network key Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication. Network name (SSID: Security Set Identifier) When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with Network name (SSID). In order to improve security, the network key is set allowing no communication unless Network name
(SSID) coincides with the network key. Open system authentication One of network authentication types for wireless LAN. Since there is no check of network key upon authentica-
tion, clients can connect to the access point without Ocampa_UG_Active B.book Page 63 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e submitting correct network keys. However, in case of actual communications, the same network key must be set. Open system authentication is sometimes called Open key authentication. PPPoE (Point to Point Protocol over Ethernet) A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet. Protocol A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into procedures. Shared key authentication One of the network authentication types for wireless LAN. Upon authentication, the access point checks whether the same network key is set to the client. If the client uses a wrong network key or the network key itself is not set, authentication is unsuccessful, allowing no communications with the access point. SSID (Security Set Identifier) See Network name Subnet mask TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other. TCP/IP (Transmission Control Protocol/Internet Protocol) A standard protocol of the Internet. Wi-Fi Indicates that the interconnectivity test of the organiza-
tion which guarantees the compatible connection of wireless LAN (Wi-Fi Alliance) has been passed. 63 Ocampa_UG_Active B.book Page 64 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x IP address information IP addressing is much more complicated than can be briefly explained in this document. You are advised to consult with your network administrator for additional information. If IP address is unknown, set IP address as follows:
If you have an access point (DHCP server) on the network, set the IP address as follows:
[Obtain an IP address automatically]
A DHCP server is a server that automatically assigns IP addresses to computers or other devices in the network. There is no DHCP server for the AdHoc network. If the IP address is already assigned to the computer in the network, ask the network administrator to check the IP address to be set for the computer. If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255. Set the each computer as follows: The value in paren-
theses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0) Computer B: 192.168.100.3 (255.255.255.0) Computer C: 192.168.100.4 (255.255.255.0)
Computer X: 192.168.100.254 (255.255.255.0) 64 Ocampa_UG_Active B.book Page 65 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Specifications Type of network Transfer rate Active frequency Number of channels Security Item Specification Conforms to IEEE 802.11a/802.11g (Wi-Fi based)*
(Automatic switching) 54 Mbps maximum data rate 802.11b/g: 2400~2473 MHz 802.11a: 4900 ~ 5850 MHz 802.11a: 8 independent channels 802.11b/g: 11 channels, 3 non-overlapping channels Network name (SSID) Network key (64 bits/128 bits)**
WPA 1.0 compliant Supports AES, TKIP, and WEP encryption algorithms Maximum recommended number of computers to be connected over wireless LAN (during ad hoc connection) 10 units or less ***
* Wi-Fi based indicates that the interconnectivity test of the organization which guarantees the interconnectivity of wireless LAN (Wi-Fi Alliance) has been passed.
** Encryption with network key (WEP) is performed using the above number of bits, however, users can set 40 bits/104 bits after subtracting the fixed length of 24 bits.
*** The maximum number of computers that can be supported by an Access Point is highly variable, and can be affected by such factors as application bandwidth utilization, broadcast packet traffic, type of applications used, etc. The number of 10 provided by this document is meant only as a guideline and not a limitation of the technology. 65 Ocampa_UG_Active B.book Page 66 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x 66 Ocampa_UG_Active B.book Page 67 Monday, September 29, 2003 5:04 PM I n d e x Index A adjusting the display brightness . 24 air flow vents . 5 application buttons . 3 application A . 11 application B . 11 Ctl-Alt-Del button . 10 display mode button . 10 EMail . 10 Enter button . 11 Escape button . 11 Function button . 11 Internet . 10 orientation button . 10 tertiary functions . 13, 14 B battery gauge . 26 battery gauge icon . 23 cleaning the display screen . 32 configuring peripherals interface . 33 connectors and peripheral interfaces . 17 conserving battery power . 27 conventions used in the guide . v critically low battery level . 23 cursor not tracking pen . 32 D DC input connector . 17 DC power connector . 6 DIMM card, removing . 28 DISE . 33 display screen is blank . 32 screen, cleaning . 32 battery icon . 9 Drive Image Special Edition (DISE) . 33 battery pack charging . 26 charging times . 26 critically low level . 23 low-battery warning . 23 no memory effect . 26 overcharge protection . 26 removing and installing . 26 will not begin charging . 26 battery power conserving . 27 used in suspend-to-RAM mode . 23 battery release latch . 4, 18 BIOS . 13 application buttons, for . 13, 14 Drivers and Application Restore CD . 34 E Enlarging the Backup Partition . 34 external monitor connector . 6 F Fujitsu contact information . v Fujitsu online . v H hard disk drive access icon . 9 HDD cover . 4 bridge battery . 27 headphone . 6 built-in microphone . 3 headphone jack . 17 C calibrating the pen . 25 care and maintenance . 31 charge/DC input icon . 8 charging the battery pack . 26 Hibernate (Save-to-Disk) mode . 23, 24 Hibernate mode . 21 I idle state . 21 67 Ocampa_UG_Active B.book Page 68 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C IEEE 1394 jack . 6, 18 infrared data transfer not working . 32 infrared keyboard port . 3, 7 infrared keyboard/mouse port . 17 interfaces connectors and peripherals . 17 IrDA port . 3 IrDA/FIR port . 17 K Kensington lock . 6, 18 L LAN jack . 6 LifeBook Security Application Panel operating . 15 passwords . 14 uninstalling . 15 P page up/page down . 18 PC card slot . 5, 17, 27 pen . 5, 7 installing a pen tether . 25 not responding . 33 replacing the tip . 25 using . 24 pen tether . 25 peripheral connectors . 17 power icon . 8, 22 blinking . 22, 23 not displayed . 22 power on/suspend/resume button . 3 power usage . 21 powering up the pen tablet . 22 Preparation for wireless LAN connection (XP) . 53 Local Area Network (LAN) . 18 problems, solving . 32 low-battery warning . 23 protecting the display screen . 31 M memory cover . 4 R Re-Installing Individual Drivers and Applications . 34 memory module . 28 removable battery pack . 4 microphone . 6 removing a DIMM card . 28 microphone jack . 17 Restoring a Backup Image . 34 modem . 17 connection . 27 port . 6 N navigation buttons . 3, 12 O Off state . 21, 22 optional accessories . 2 additional accessories . 2 carrying cases . 2 docking options . 2 memory . 2 power options . 2 storage options . 2 overheating, avoiding . 32 68 resuming system operation . 24, 32 RJ-45 . 18 S Save-to-Disk mode . 21 Setting up LifeBook Security Panel . 14 shutting down the system . 22 solving problems . 32 speaker . 3 speaker/headphone volume too low . 33 status display . 8 battery icon . 9 charge/DC input icon . 8 hard disk drive access icon . 9 power icon, blinking . 22 power icon, system states indicated by . 8, 22 storing the system unit . 32 Ocampa_UG_Active B.book Page 69 Monday, September 29, 2003 5:04 PM Stylistic ST4000 care and maintenance . 31 features . 3, 4, 5, 6, 7 items included with . 1 storing . 32 Stylistic ST4000 specifications additional . 40 agency approval . 40 display specifications . 39 environmental . 40 physical specifications . 39, 40 power . 40 suspend mode, determining . 23 Suspend/Resume disabled . 23 Suspend/Resume button . 18 suspending system operation . 22 Suspend-to-RAM . 21 mode . 23, 24 system interface connector . 4 system states . 21, 22 Hibernate (Save-to-Disk) . 21 Idle state . 21 Off state . 21 On state . 21 Suspend-to-RAM . 21 system status LEDs . 3 system will not resume operation . 32 T Tablet Dock latch point . 4 Tablet Dock port . 17 I n d e x thermal suede . 4 troubleshooting . 32 turning off the system . 22 U Universal Serial Bus . 6 USB port . 17 USB ports . 6 Using . 21 using the pen . 24 W warranty information . v Windows XP Tablet PC Edition . v, 1 Wireless LAN Ad Hoc Mode . 50 Broadcom Wireless LAN . 50 Connection using Windows XP . 53 For better communications . 51 Infrastructure Mode . 50 Intel PROSet Wireless LAN . 50 IP address information . 64 Other settings . 59 Setting of power-saving function . 59 Specifications . 65 Starting Transmission . 52 Stopping transmission . 52 Troubleshooting . 60 Wireless LAN Glossary . 62 wireless LAN . 4 before using . 50 characteristics . 50 tertiary functions of application buttons . 13, 14 wireless LAN on/off switch . 4, 18 69 Ocampa_UG_Active B.book Page 70 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C 70
1 | User Manual Part1 | Users Manual | 2.14 MiB |
Ocampa_UG_Active B.book Page i Monday, September 29, 2003 5:04 PM C o p y r i g h t Fujitsu PC Corporation has made every effort to ensure the accuracy and completeness of this document. Because ongoing development efforts are made to continually improve the capabilities of our products, however, the data contained herein represents Fujitsu design objectives and is provided for comparative purposes; actual results may vary based on a variety of factors. This product data does not constitute a warranty. Specifications are subject to change without knowledge. Fujitsu and the Fujitsu logo are registered trademarks of Fujitsu Limited; Stylistic is a registered trademark of Fujitsu PC Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation. PCMCIA and CardBus are registered trademarks of the Personal Computer Memory Card International Associa-
tion. Intel, Pentium, and SpeedStep are registered trademarks of Intel Corporation. Atheros is a registered trademark of Atheros Communi-
cations, Inc. Kensington and MicroSaver are registered trademarks of the Kensington Technology Group. Wi-Fi is a trademark of the Wireless Ethernet Compati-
bility Alliance (WECA). All other products are trademarks or registered trade-
marks of their respective companies. Warning Handling the cord on this product will expose you to lead, a chemical known to the State of California to cause birth defects or other reproductive harm. Wash hands after handling. Copyright 2002 - Fujitsu PC Corporation. All rights reserved. No part of this publication may be copied, reproduced, or translated, without the prior written consent of Fujitsu PC Corporation. No part of this publi-
cation may be stored or transmitted in any electronic form without the prior consent of Fujitsu PC Corpora-
tion B5FH-TBD-02EN-00 DECLARATION OF CONFORMITY according to FCC Part 15 Responsible Party Name:
Address:
Telephone:
Declares that product:
Fujitsu PC Corporation 5200 Patrick Henry Drive Santa Clara, CA 95054 408-982-9500 Model Series: Stylistic ST5000 Tablet PC Complies with Part 15 of the FCC Rules This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and, (2) This device must accept any interference received, including interference that may cause undesired operation. Note:
For more detailed information about the FCC rules and their applicability to the Stylistic ST5000 Series Tablet PC, refer to Chapter 5 of this document. Ocampa_UG_Active B.book Page ii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C - U s e r s G u i d e Ocampa_UG_Active B.book Page i Monday, September 29, 2003 5:04 PM T a b l e o f C o n t e n t s Table of Contents PREFACE About This Guide . v Fujitsu Contact Information . v Warranty Information . v 1 GETTING STARTED WITH YOUR TABLET PC In-box Items for the Stylistic ST5000 Series Tablet PC . 1 Optional Accessories . 2 Stylistic Tablet PC Features. 3 Status Display. 8 Application Buttons . 10 Navigation Buttons. 12 Tertiary Functions of Application and Navigation Buttons. 13 Security Functions of Application Buttons. 14 Setting up the Security Panel . 14 Passwords . 14 Using Your Security Panel . 15 Precautions . 15 Uninstalling the Security Panel Application . 15 Connectors and Peripheral Interfaces . 17 2 USING YOUR TABLET PC System States. 21 Powering Up the Tablet PC . 22 Shutting Down the System. 22 Suspending System Operation . 22 Resuming System Operation . 24 Adjusting the Display Brightness. 24 Using the Pen. 24 Calibrating the Pen. 25 Installing a Pen Tether . 25 Replacing the Pen Tip . 25 Charging the Battery . 26 Removing and Installing the Battery. 26 Tips for Conserving Battery Power . 27 Modem Connection . 27 PC Card Slot . 27 Removing and Installing Memory Modules . 28 3 CARE AND MAINTENANCE Protecting the Display Screen. 31 Storing the Tablet PC. 32 Avoiding Overheating . 32 Cleaning the Display Screen. 32 Troubleshooting. 32 Restoring Your Pre-Installed Software . 33 Drive Image Special Edition (DISE) . 33 4 SPECIFICATIONS Physical Specifications . 39 Processing Specifications . 39 Memory/Storage Specifications . 39 Display Specifications. 39 Interface Specifications . 39 Power Specifications . 40 Environmental Specifications . 40 Agency Approval Specifications . 40 Additional Specifications . 40 5 AGENCY NOTICES Notices . 43 Ocampa_UG_Active B.book Page ii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e APPENDIX:
WIRELESS LAN USERS GUIDE Before Using the Wireless LAN For better communications. 51 Stopping transmission . 52 Starting Transmission . 52 Connecting the WLAN Flow of operations . 53 Preparation for wireless LAN connection . 53 Connection to the network . 55 Other settings Setting of power-saving function . 59 Troubleshooting the WLAN Troubleshooting. 60 Wireless LAN Glossary Glossary . 62 IP address information Additional information . 64 WLAN Specifications Specification. 65 INDEX Index . 67 Ocampa_UG_Active B.book Page iii Monday, September 29, 2003 5:04 PM Preface Ocampa_UG_Active B.book Page iv Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e Ocampa_UG_Active B.book Page v Monday, September 29, 2003 5:04 PM Preface ABOUT THIS GUIDE The Stylistic ST5000 Series Tablet PC is a high-
performance, pen-based computer that has been designed to support Microsoft Edition. Windows XP Tablet PC This manual explains how to operate your Fujitsu Stylistic ST5000 Series Tablet PCs hardware and built-in system software. The Stylistic ST5000 Series Tablet PC is a completely self-
contained unit with an active-matrix (TFT) color LCD display and an active digitizer. It has a powerful interface that enables it to support a variety of optional features. Conventions Used in the Guide Keyboard keys appear in brackets. Example: [Fn], [F1], [ESC], [ENTER] and [CTRL]. Pages with additional information about a specific topic are cross-referenced within the text. Example: (See page xx.) On screen buttons or menu items appear in bold Example: Click OK to restart your Tablet PC. DOS commands you enter appear in Courier type. Example: Shut down the computer?
The information icon highlights information that will enhance your understanding of the subject material. The caution icon highlights information that is important to the safe operation of your computer, or to the integrity of your files. Please read all caution information carefully. The warning icon highlights information that can be hazardous to either you, your computer, or your files. Please read all warning information carefully. P r e f a c e FUJITSU CONTACT INFORMATION Service and Support You can contact Fujitsu Service and Support in the following ways:
Toll free: 1-800-8Fujitsu (1-800-838-5487) Fax: 408-764-2724 E-mail: 8fujitsu@fujitsupc.com Web site: http://www.fujitsupc.com Before you place the call, you should have the following information ready so the customer support representative can provide you with the fastest possible solution:
Product name Product configuration number Product serial number Purchase date Conditions under which the problem occurred Any error messages that have occurred Hardware configuration Type of device connected, if any Fujitsu Online You can go directly to the online Fujitsu product catalog for your Tablet PC by going to the Fujitsu Web site at:
http://www.fujitsupc.com You must have an active internet connec-
tion to use the online URL links. WARRANTY INFORMATION Your Stylistic ST5000 Series Tablet PC is backed an Inter-
national Limited Warranty. Check the service kit that came with your system for warranty terms and condi-
tions. Ocampa_UG_Active B.book Page vi Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e P r e f a c e Ocampa_UG_Active B.book Page vii Monday, September 29, 2003 5:04 PM 1 Getting Started with Your Tablet PC Ocampa_UG_Active B.book Page viii Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Ocampa_UG_Active B.book Page 1 Monday, September 29, 2003 5:04 PM Getting Started with Your Stylistic Tablet PC G e t t i n g S t a r t e d Figure 1-1. Stylistic ST5000 Series Tablet PC The Stylistic ST5000 Series Tablet PC is a high-
performance, pen-based computer that has been designed to support Microsoft XP Tablet PC Edition. This chapter provides an overview of the Stylistic ST5000 Series Tablet PC and its features. Windows IN-BOX ITEMS FOR THE STYLISTIC ST5000 SERIES TABLET PC Verify that the following items are included in the box with your Tablet PC:
Stylistic ST5000 Series active pen
Pen tips (quantity: 5)
Pen tether
Main battery
Power cord
AC adapter
Screen protectors (quantity: 2) 1 Ocampa_UG_Active B.book Page 2 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e OPTIONAL ACCESSORIES The following optional accessories can be used with the Stylistic ST5000 Series Tablet PC. Refer to the instructions provided with these accessories for details on their use. Peripheral/Accessory Fujitsu Part Number Docking Options Stylistic ST5000 Series Tablet Dock, with CD-ROM drive FPCPRTBD Stylistic ST5000 Series Tablet Dock, with Combo DVD/CD-RW drive FPCPRTBD Carrying Cases Stylistic ST5000 Series Executive Leather Portfolio Case Stylistic ST5000 Series Ballistic Nylon Road Warrior Case Stylistic ST5000 Series Bump Case Harsh Environment Case Storage Options External USB Floppy Disk Drive Memory 256MB SO DIMM, DDR333 512MB SO DIMM, DDR333 128MB Compact Flash Card 256MB Compact Flash Card Compact Flash Card Adapter Power Options AC Adapter with US Cord Main Battery Auto/Airline Adapter Battery Charger Additional Accessories Wireless Keyboard USB Keyboard Wireless Mouse Stylistic ST5000 Series Pen (2-pack) Screen Protectors (12-pack) FPCCCTBD FPCCCTBD FPCCCTBD FPCCCTBD FPCFDD12 FPCEMTBD FPCEMTBD FPCEMC02 FPCEMC03 FPCCFA01 FPCAC23 FPCBP63TBD FPCAA02 FPCBC06 FPCKBTBD FMWKB5A FPCMO07 FPCPN07AP FPCSPTBD
* For the latest list of accessories available for your Stylistic ST5000 Series Tablet PC, be sure to frequently check the Fujitsu Web site at: www.fujitsupc.com. Table 1-1. Stylistic ST5000 Series Optional Accessories 2 Ocampa_UG_Active B.book Page 3 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d STYLISTIC TABLET PC FEATURES Features and controls that you use to operate the Stylistic ST5000 Series Tablet PC are outlined below and illustrated in Figures 1-1 through 1-5. Details on using these features and controls are provided later in this manual. Power On/Suspend/
Resume Button System Status LEDs Speaker IrDA/FIR Port User-Programmable Application Buttons Application Buttons Built-in Microphone Infrared Keyboard/
Mouse Port Navigation Buttons Figure 1-2. Stylistic ST5000 Series Tablet PC Features (Front View) Front Features:
1
System status LEDs: Indicate the operational status of the Tablet PC and hard disk drive and the charge level of the battery.
Power On/Suspend/Resume button: Allows you to turn on, off, suspend, resume, hibernate or wake the Tablet PC in order to optimize battery life.
Infrared keyboard/mouse port: The infrared port wraps around the front and bottom of the display, and is used for communicating with a proprietary infrared keyboard or mouse.
Application buttons: Allow you to quickly launch pre-defined applications and utilities by pressing a button.
Navigation buttons: The navigation buttons allow you to move: Page Up/Page Down, Tab Right/Tab Left, Cursor Up/Cursor Down, and Cursor Right/
Cursor Left.
IrDA/FIR port: Provides an infrared interface for communication with devices compliant with IrDA Standard Revision 1.1.
Speaker: Allows you to listen to mono audio files.
Built-in Microphone: The built-in microphone allows you to input mono audio. These peripherals and accessories are sold separately. 3 Ocampa_UG_Active B.book Page 4 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Tablet Dock Latch Point System Interface Connector Latch Point Memory Module Cover Tablet Dock Latch Point Wireless LAN On/Off Switch Battery Release Latch Thermal Suede Wireless LAN On/Off Switch*
Wireless LAN Antenna*
(inside case) Wireless LAN and/or Modem Module Cover*
Hard Disk Drive Cover Battery Figure 1-3. Stylistic ST5000 Series Tablet PC Features (Back View)
* The system is configured with one of two modules: a standard modem module or an optional wireless LAN/LAN/modem combo module. Back Features:
System interface connector: Allows you to connect the optional Stylistic Tablet Dock.
Removable battery: Can be removed and replaced with a charged battery.
Battery release latch: Used to release the removable battery.
Tablet Dock latch point: Allows you to attach the system to an optional Tablet Dock. 1 not be removed. It is designed to minimize the temperature of the system for the user when a running system is carried for a period of time.
Wireless LAN module cover: Provides protection for the optional wireless LAN radio solution.
Wireless LAN On/Off switch: For systems with a wireless device installed, this switch turns the device on and off. You should switch the device off when it is not in use in order to maximize battery life.
Hard disk drive cover: Covers the hard disk drive
Memory module cover: Removable cover over the module. memory modules. These peripherals and accessories are sold separately.
Thermal Suede: Several areas of the system back are covered with thermal suede. This material should 4 Ocampa_UG_Active B.book Page 5 Monday, September 29, 2003 5:04 PM Pen Holder Smart Card Slot SD Card Slot Air flow vents G e t t i n g S t a r t e d PC Card Slot PC Card Eject Button Figure 1-4. Stylistic ST5000 Series Tablet PC Features (Top View) Top Features:
Pen: The main input device that you use to execute programs and enter data. A pen holder is built into the Tablet PC to store the pen when not in use. 1 This architecture allows you to transfer data between a variety of different digital devices.
PC Card slot: Allows you to install a Type I or Type II PCMCIA Card in the system.
Smart Card Slot: The dedicated Smart Card slot
Air flow vents: Provides secondary cooling for allows you to install a Smart Card on which you can store such data as medical information or electronic cash.
SD Card Slot: The Secure Digital (SD) card slot allows you to install a flash memory card for data storage. processor. (Do not obstruct the vents.) These peripherals and accessories are sold separately. 5 Ocampa_UG_Active B.book Page 6 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e USB 2.0 Ports Headphone Jack External Monitor Connector
(behind door) Modem Jack*
DC Input Jack Microphone Jack IEEE 1394 Jack Latch Point LAN Jack* Kensington Lock Slot Figure 1-5. Stylistic ST5000 Series Tablet PC Features (Left Side View)
* The system is configured with one of two modules: a standard modem module or an optional wireless LAN/LAN/modem combo module. The mini-PCI expansion slot into which these modules are plugged (located under the cover) can be used to accommodate other mini-PCI devices. Left-Side Features:
1 States due to FCC restrictions.
USB 2.0 ports: Allow you to connect Universal Serial Bus-compliant devices (compliant with USB Standard Revision 2.0) to the Tablet PC. Additional USB ports are located on the optional Tablet Dock.
Headphone Jack: Allows you to connect a set of stereo headphones.
External Monitor Connector: The External Monitor connector allows you to connect an external VGA, XGA, or SVGA CRT monitor.
Modem jack: Allows you to connect a standard RJ-11 connector to the Tablet PCs internal 56 Kbps modem. Note that the internal 56 Kbps LAN/modem module installed in the Stylistic ST5000 Series Tablet PC has actual maximum transfer rates of 53 Kbps
(receive), 33.6 Kbps (send), and 14.4 Kbps (fax). Download rates are limited to 53 Kbps in the United
DC input connector: Allows you to connect the AC adapter or auto adapter.
Microphone Jack: Allows you to connect an external microphone.
IEEE 1394 Jack: Allows you to connect between your Tablet PC and peripherals such as a digital video camera.
LAN jack: Allows you to connect a standard RJ-45 connector to the Tablet PCs internal local area network (LAN).
Kensington lock slot: Allows you to attach a Kensington MicroSaverTM-compatible security cable. These peripherals and accessories are sold separately. 6 Ocampa_UG_Active B.book Page 7 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d Infrared Keyboard/Mouse Port Optional Wireless LAN location Latch Point Pen / Pen Holder Figure 1-6. Stylistic ST5000 Series Tablet PC Features (Right Side View) Right-Side Features:
1
Pen: The main pointing device that you use to execute programs and enter data. A pen holder is built into the Tablet PC to store the pen when not in use.
Infrared keyboard/mouse port: The infrared port wraps around the front and bottom of the display, and is used for communicating with an optional proprietary infrared keyboard or mouse.
Wireless LAN location: The optional wireless LAN device is located inside of the system housing. These peripherals and accessories are sold separately. 7 Ocampa_UG_Active B.book Page 8 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e STATUS DISPLAY Icons appear in the status display indicating the status of system functions such as system power and battery charge level. The location of icons in the Status display is shown in Figure 1-7.. Table 1-2. explains how individual icons are displayed, and describes what the variations of that display indi-
cate. (If an icon is not displayed, it indicates that the related system function is off or inactive. Power Battery Security Charge/DC In HDD Access Figure 1-7. Status Display Icons In the following table, a blinking LED flashes at the rate of once per second; an LED that is blinking, slow flashes at the rate of one second on, five seconds off. Icon Mode/State LED State Remarks Power
On State Green, continuous The system is powered on and ready for use.
Idle Mode
Suspend-to-RAM Green, blinking
Off State Off
Hibernate
(Save-to-Disk) Charge/DC
On State In
Idle Mode
Suspend-to-RAM
Hibernate
(Save-to-Disk)
Off State Amber Green The system has suspended and saved active settings to RAM. The system has suspended and saved settings and data to the hard disk drive. AC adapter and battery are available and system is charging.
AC adapter and battery are available and system is not charging (battery fully charged).
AC adapter is available but battery is not present. Amber, blinking AC adapter and battery are available and waiting to charge (battery is out of thermal range). Off AC adapter is not available. 8 Ocampa_UG_Active B.book Page 9 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d In the following table, a blinking LED flashes at the rate of once per second; an LED that is blinking, slow flashes at the rate of one second on, five seconds off. Icon Mode/State LED State Remarks Battery
On State Green, continuous Battery charge is between 50%-100%
Idle Mode Amber, continuous Battery charge is between 13%-49%
Red, continuous Battery charge is between 0%-12%
Red, blinking There is a battery error. Green, blinking slow Battery charge is between 50%-100%. Amber, blinking slow Battery charge is between 13%-49%. Red, blinking slow Battery charge is between 0%-12%. Off Battery is not installed, or system is off or in Hibernate mode. If battery is inserted during power off, LED blinks amber for 4 seconds to detect battery. Battery status is displayed for 5 seconds after that. Green Displayed when hard disk drive is accessed.
Suspend-to-RAM, without AC adapter
Suspend-to-RAM with AC adapter
Hibernate
(Save-to-Disk), with AC adapter
Off State
Hibernate
(Save-to-Disk), without AC adapter HDD Access
On State (or flashing)
Idle Mode
Suspend-to-RAM Off Hard disk drive is not being accessed.
Hibernate
(Save-to-Disk)
Off State Security
On State Green, blinking (until password is entered) TBD The Security Indicator flashes (if a password was set) when the system resumes from Off or Standby modes. You must enter the password that was set in the Security Panel before your system will resume operation. Table 1-2. System Status Indicators 9 Ocampa_UG_Active B.book Page 10 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e APPLICATION BUTTONS The six application buttons are located on the upper right-hand side of a vertically-oriented system. (See figure 1-2 on page 3 for location). Three of the buttons have secondary functions. The secondary functions are activated by pressing the Function (Fn) button while pressing the application button. The buttons also have separate tertiary functions that can be used while the system is booting up. For more information about the tertiary functions, refer to Table 1-5 on page 13. Ctl-Alt-Del is the only Application button that can be used while the system is logging on or when the system is locked
(i.e., when you have the Logon or Computer Locked window showing on your desktop). Button Icon and Name
(Primary) Tablet Icon
(Fn +
Button)
(Secondary) Description The Ctl-Alt-Del button performs two functions:
Pressing the Ctl-Alt-Del button for approximately one second allows you to log on after boot, after locking the workstation, or after resuming from power management
After log-on, pressing the Ctl-Alt-Del button for two seconds launches the Windows Security screen. Security Button: All five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. See Security Functions of Application Buttons on page 14 When you press the EMail button, you automatically launch Microsoft Outlook where you can read, create, and send emails. When you press the Fn + EMail buttons at the same time, you automatically launch the Web browser. The default page to which you go is the Fujitsu home page. If you would like to change your home page, go to the Control Panel->
Internet Options. Select the General tab and enter the starting address you would like to use. When you press the Orientation button, the system screen orientation changes from portrait (vertical) to landscape (horizontal) or from landscape to portrait. When you would like to use the Tablet PC as an eBook, for example, you would use the portrait orientation, when accessing spreadsheets, you would more typically use a landscape orientation. When you press the Fn + Orientation buttons at the same time*, the Graphics Options Output menu is launched. From that menu you can choose the display mode you would like to use. Ctl-Alt-Del Button Security Button EMail Button Internet Button Orientation Button Display Mode Button 10 Ocampa_UG_Active B.book Page 11 Monday, September 29, 2003 5:04 PM Button Icon and Name
(Primary) Tablet Icon
(Fn +
Button)
(Secondary) Escape Button Application A Button Enter Button Application B Button G e t t i n g S t a r t e d Description The Escape application button acts the same way as an Escape key on a keyboard. When you press the Fn + Esc buttons at the same time*, they act to invoke a pre-
determined application or generate a combination keystroke, as assigned in the Tablet Button Settings utility. (You can change the settings in Control Panel ->
Tablet Button Settings). By default, pressing the Fn + Esc combination acts the same as if you had pressed Ctl + Esc on a keyboard: the Start menu is launched. The Enter application button acts the same way as an Enter key on a keyboard. Pressing the Fn + Ent buttons at the same time*, acts to invoke a pre-determined application or keystroke combination, as assigned in the Tablet Button Settings utility. (You can change the settings in Control Panel -> Tablet Button Settings). By default, pressing the Fn + Ent combination acts the same as if you had pressed Alt on a keyboard: it selects a main menu in the typical Windows application. The Function button works in conjunction with the other application buttons to provide additional functionality for the buttons. Refer to specific details above.*
Function Button Pressing the Fn button twice in succession (within the sticky time*), causes the Fujitsu menu to appear on your screen, allowing you to modify certain system settings. Table 1-3. Application Buttons - Primary and Secondary Functions
* The Fn button has a handy sticky feature that allows you to press two buttons in immediate succession, rather than at exactly the same time. After pressing the Fn button, you have a short time (2 to 3 seconds) to press the second button. 11 Ocampa_UG_Active B.book Page 12 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e NAVIGATION BUTTONS The two navigation buttons are located on the lower right-hand side of a vertically-oriented system. (See figure 1-2 on page 3 for location). Each of the buttons can be toggled by pressing either end of the button. The buttons have dual functions. The secondary func-
tions are activated by pressing the Function (Fn) button while pressing the application button*. The buttons also have separate tertiary functions that can be used while the system is booting up. For more information about the tertiary functions, refer to Table 1-5 on page 13. Ctl-Alt-Del is the only Application button that can be used while the system is logging on or when the system is locked
(i.e., when you have the Logon or Computer Locked window showing on your desktop). Buttons/icons Purpose (when pressed alone) Purpose (when pressed with Fn button)
(Primary function)
(Secondary function) This button consists of Page Up and Page Down segments. When the Page Up portion is pressed, you will scroll up one page. When the Page Down portion is pressed, you will scroll down one page. When pressed with the Function (Fn) button*, the Up portion of this button allows you to tab right. When pressed with the Function (Fn) button*, the Down portion of this button allows you to tab left. This button consists of Up and Down segments. When the Up portion is pressed, the cursor will move up. When pressed with the Function (Fn) button*, the Up portion of this button will move the cursor to the right. When the Down portion is pressed, the cursor will move down. When pressed with the Function (Fn) button*, the Down portion of this button will move the cursor to the left.
* The Fn button has a handy sticky feature that allows you to press two buttons in immediate succession, rather than at exactly the same time. After pressing the Fn button, you have a short time (2 to 3 seconds) to press the second button. Table 1-4. Navigation Buttons 12 Ocampa_UG_Active B.book Page 13 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d TERTIARY FUNCTIONS OF APPLICATION AND NAVIGATION BUTTONS While you are booting up your system, the Application Buttons and Navigation buttons can be used for entering and navigating through the Basic Input-Output System
(BIOS), and for invoking the Advanced Options Menu, where you can enter different modes (such as Safe Mode). The BIOS is a program and a set of parameters that are stored in ROM, which tests and operates your Tablet PC from when you turn it on until it loads your installed operating system from disk. Information from the BIOS is transferred to the operating system to provide it with information on the configuration and status of the hard-
ware. The system is booting up while the Fujitsu logo is displayed immediately after turning on the system. The table below indicates how the buttons act while the system is booting up and while you are in the BIOS. Buttons/icons Purpose (when pressed while the system is booting up) Pressing the Ctl-Alt-Del button while the system is booting up takes you into BIOS setup. This is the same as if you had tapped [F2] on a keyboard. Ctl-Alt-Del Button EMail Button Orientation Button Escape Button Enter Button Pressing the EMail button while the system is booting up opens the Boot Options menu. This is the same as if you had tapped [F12] on a keyboard. Pressing the Orientation button while the BIOS setup screen is open causes the selected item (if applicable) to change to the next item. Pressing this is the same as tapping the spacebar on a keyboard. Pressing the Esc button while the BIOS is open acts to escape from the BIOS. This is the same as if you had tapped [Esc] on a keyboard. Pressing the Ent button while the BIOS is open acts the same as the [Ent] button on a keyboard. Pressing the Fn button while the system is displaying the operating system boot menu, opens the Advanced Operating System Options menu. This menu allows you to enter different operating system modes (such as Safe Mode). Pressing this button is the same as if you had tapped [F8] on a keyboard. Function Button Pressing the top half of the upper navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move up. This is the same as if you had tapped Arrow Up on a keyboard. This feature is also functional in the operating system boot menu. Pressing the bottom half of the upper navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move down. This is the same as if you had tapped Arrow Down on a keyboard. This feature is also functional in the operating system boot menu. Pressing the top half of the lower navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move right. This is the same as if you had tapped Arrow Right on a keyboard. Pressing the bottom half of the lower navigation button while the BIOS setup screen is open causes the cursor in the BIOS setup screen to move left. This is the same as if you had tapped Arrow Left on a keyboard. Table 1-5. Tertiary Functions of Application and Navigation Buttons 13 Ocampa_UG_Active B.book Page 14 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e SECURITY FUNCTIONS OF APPLICATION BUTTONS Five buttons are used when implementing security functions. Four of the buttons are used to enter the password, and the fifth is used as an Enter button. Instructions for using the security feature follow the table. Button Icons Security Icons Security Purpose Ctl-Alt-Del Button EMail Button Orientation Button Escape Button Enter Button 1 2 3 4 Security Enter Button Security Button 1 Security Button 2 Security Button 3 Security Button 4 Table 1-6. Security Functions of Application Buttons SETTING UP THE SECURITY PANEL When you receive your Tablet PC, the security panel application is pre-installed without any passwords. The following sections provide detailed information on your security panel, how to set, change or remove passwords. The following are valid button strokes:
Pushing [4] by itself Pushing [2] and [3] at the same time Pushing [1], [2], and [4] at the same time Pushing [1], [2], [3], and [4] at the same time Numbered Buttons Use these buttons to enter your password.(Figure 1-6) The following are valid passwords. The numbers within braces ({ }) are button strokes using more than one button. Enter Button After entering the button strokes, push this button to enter the password into the Tablet PC. (Figure 1-6)
{[2]+[3]}, [1], [Enter]
[4], [enter]
{[1]+[3]}, {[2]+[3]+[4]}, [1], [4], [2], [Enter]
PASSWORDS The user and supervisor password may be set on this Tablet PC. A supervisor password is typically the same for all Tablet PCs and notebooks in a work group, office, or company to allow for system management. Individual computers in a group environment should not use a common password. A password consists of one to five button strokes plus the enter button. A valid stroke consists of pushing one or up to four buttons simulta-
neously. Setting Passwords When shipped from the factory, no passwords are set. You have a choice of having no password or setting a supervisor and user password. You must set the super-
visor password before the user password. The purpose of supervisor password is to be able to bypass the user password in case the user password is forgotten. The supervisor password alone will not lock the system. You must set the supervisor and user passwords for the security panel to work. 14 Ocampa_UG_Active B.book Page 15 Monday, September 29, 2003 5:04 PM Setting Supervisor Password You must have set a supervisor password before setting any user passwords. The supervisor password can bypass the user password. 1. Go to the Start menu. 2. Click on Run. 3. Type in:
C:\Program Files\Fujitsu\Security Panel Application\Supervisor\
FJSECS.EXE, then press [Enter]
4. Follow the on-screen instructions to set the Supervisor password. Setting User Password 1 Go to the Start menu. 2. Click on All Programs. 3. Click on Security Panel Application -> Security Panel Application. 4. Follow the on-screen instructions to set the user password. You may change or remove the supervisor or user password by repeating the steps defined above. USING YOUR SECURITY PANEL The security lock feature is in effect both when the system resumes from Off, Standby, or Hibernation state. You always need to push the Security Panel buttons to input the user password. Your system will not begin the boot sequence until you enter your supervisor/user password. From Off State 1. Turn on your system. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. For example, if the password is 22222, first press Button 2 five times and press the Enter button. The Tablet PC will boot to normal operation. From Standby/Hibernation State 1. Press your Suspend/Resume button. 2. When the Security Indicator flashes, enter the pass-
word and press Enter button. The Tablet PC should resume normal operation. Incorrect Password Entry If an invalid supervisor or user password is entered three times in succession, the system will beep for about one minute. If a valid password is entered within a minute
(while system beeps), the beeping will stop and the Tablet G e t t i n g S t a r t e d PC will resume normal operation. If no password is entered or an invalid password is entered while the system beeps, the system will return to its previous locked state (standby or off) and the Security Indicator will go off. To reactivate the Tablet PC after a password failure, you must press the Suspend/Resume button, then enter a correct password. Remember the user password you specified on the Security Panel Application. If you forget the password you will not be able to use your computer. The supervisor pass-
word can override the user password. PRECAUTIONS Opening and Closing the Cover By default, closing the cover automatically places your system into Standby mode. (You can change the action the system takes when the cover is closed by opening the Power Options Properties icon in the Control Panel, and selecting the Advanced tab. Make a choice from the drop down menu for When I close the lid of my portable computer: and click the [OK] button.) Opening the cover does not automatically place the Tablet PC into normal operation. Instead, you must enter the proper security password after pushing the Suspend/Resume button. Low Battery Operations If your Tablet PC has a low battery, pushing the suspend/
resume button only turns on the Security Indicator. Your Tablet PC does not unlock, the Security Indicator turns off after one minute. To resume normal operation, first attach a power supply to the Tablet PC. Then you may unlock the Tablet PC. UNINSTALLING THE SECURITY PANEL APPLICATION You have two options when uninstalling the security panel application:
Remove passwords and uninstall the security panel application software. This will disable all security features. Uninstall the security panel application with password still active. This will not allow any changes to the password. Uninstalling the Security Panel Application Software Remove passwords when User wants no password protec-
tion whatsoever and doesnt want to give anybody the utility to set a password on their computer. In this case, if passwords (supervisor, user, or both) are set, the pass-
words must first be cleared BEFORE removing the appli-
15 Ocampa_UG_Active B.book Page 16 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e respectively. FJSECU.exe for the user password cannot run without first setting a supervisor password. You need to run FJSECS.exe first to set the supervisor pass-
word. Follow instructions under Setting Passwords on page 14. If you forget both passwords, please contact Fujitsu PC Corporation Service and Support at 1-800-8FUJITSU
(1-800-838-5487). Fujitsu PC Corporation charges a service fee for unlocking a password-restricted Tablet PC. When calling please have a valid credit card and provide proof of ownership. You will then be given instructions on where to ship your Tablet PC. cation. To clear passwords, follow same procedure in SETTING PASSWORD CODES except this time, select REMOVE, enter current password then click Next. When asked to confirm select Yes. Removing Security Panel Application with Passwords Still Active Using this feature will not allow any changes to the password. Removing the applications does not remove the password. It simply removes the utility to change/add/remove passwords. To change your password you must reinstall the application. User:
1. Go to Start -> Control Panel. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Supervisor:
1. Go to Start -> Control Panel. 2. Open Add or Remove Programs Properties in the Control Panel. 3. Select the Security Panel Application for Supervisor in the list, and click Change/Remove. 4. When the Confirm File Deletion box appears, click Yes. Reinstalling the Security Panel Application To reinstall supervisor or user security application, you will need your Drivers and Applications CD. The Utilities\Security Panel Application folder contains two separate folders: Supervisor and User. The setup files for supervisor and user security applications are contained in those folders. 1. Go to the Utilities\Security Panel Applica-
tion\Supervisor folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instruc-
tions on the screen. 2. Go to the Utilities\Security Panel Application\User folder on the CD and double-click the setup.exe file. The Installing Security Panel Application window will appear. Follow the instructions on the screen. Supervisor and user passwords can be set via Windows software using the FJSECS.exe and FJSECU.exe files, 16 Ocampa_UG_Active B.book Page 17 Monday, September 29, 2003 5:04 PM G e t t i n g S t a r t e d CONNECTORS AND PERIPHERAL INTERFACES Connectors and peripheral interfaces on the Stylistic ST5000 Series Tablet PC allow the connection of a variety of devices. Specific locations are illustrated in Figures 1-2 through 1-5. Table 1-7 provides a description of each peripheral connector on the Stylistic ST5000 Series Tablet PC. Each of the illustrated icons is either molded into or printed on the Tablet PC chassis. Connector/
Peripheral Tablet PC Icon Purpose DC input connector USB Port PCMCIA Card slot SD Card slot Smart Card slot Microphone jack Headphone jack IrDA/FIR port Modem Tablet Dock port Infrared keyboard/
mouse port Connect an external power source such as the AC adapter or auto/
airline adapter. Connect Universal Serial Bus 1.1 compliant devices to the Tablet PC. Install a Type I or Type II PC Card. TBD TBD Install a Secure Digital (SD) Card Install a Smart Card. Connect an external microphone. The internal microphone is disabled when you plug in an external microphone. Connect stereo headphones or powered external speakers. The internal speaker is disabled when you plug in external headphones or powered speakers. An infrared transceiver built into the Tablet PC allows you to communicate with other devices that are compliant with the IrDA Standard Rev. 1.1. Effective range for infrared communication is about 3 feet, and within 15 degrees off center. A clear line-of-sight path must exist between the IrDA port on the Tablet PC and the IrDA transceiver on the other device. Connect a telephone line to the optional internal modem using a standard RJ-11 telephone plug. Connect the Stylistic ST5000 Series Tablet Dock or other approved docking device. Refer to documentation accompanying the docking device for more information. An infrared receiver built into the Tablet PC allows you to communicate with a wireless infrared keyboard or mouse. The keyboard infrared port works optimally when it is placed between 10 to 30 cm (approximately 4 in. to 12 in.) from the keyboard infrared port (which is located on the bottom edge of the Tablet PC). Ensure there is a clear line-of-sight path between the infrared receiver on the Tablet PC and the infrared transmitter on the keyboard or mouse. 17 Ocampa_UG_Active B.book Page 18 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n O n e Connector/
Peripheral Tablet PC Icon Purpose The Kensington MicrosaverTM security slot allows you to secure the Tablet PC using Kensington-compatible locking devices. The IEEE 1394 jack allows you to connect between your Tablet PC and peripherals such as a digital video camera. The Suspend/Resume/Power On button allows you to suspend Tablet PC activity without powering off, resume your Tablet PC from suspend mode, and power on the system when it has been shut down from Windows. The Page Up/Page Down button allows you to navigate quickly from page to page without scrolling. The LAN (RJ-45) jack is used to connect the internal Fast Ethernet (10/
100/1000* Base-T/Tx) to a Local Area Network (LAN) in your office or home, or broadband devices such as a cable modem, DSL, or satellite internet.
*1000 Mbps, commonly referred to as GigaLAN. The battery release latch allows you to remove the battery from your system for storage or replacement. The wireless LAN switch allows you to turn power to the optional wireless LAN device on and off. Table 1-7. Peripheral Connectors/Interfaces KensingtonTM Lock slot IEEE 1394 jack Suspend/
Resume button Page Up/
Page Down Local Area Network (LAN) Battery Release Latch Wireless LAN On-Off Switch 18 Ocampa_UG_Active B.book Page 19 Monday, September 29, 2003 5:04 PM 2 Using Your Stylistic ST5000 Series Tablet PC 19 Ocampa_UG_Active B.book Page 20 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o 20 Ocampa_UG_Active B.book Page 21 Monday, September 29, 2003 5:04 PM U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 Using the Stylistic ST5000 Series Tablet PC This chapter covers the fundamental concepts, basic system operation and use, and system functions of the Stylistic ST5000 Series Tablet PC. You should familiarize yourself with this information before you attempt to operate the system. Prior to using your system, be sure to fully charge the battery if you plan to run on battery power. Failure to do so may result in erratic performance. SYSTEM STATES Before you begin using the Stylistic ST5000 Series Tablet PC, review the different system states (or modes) that the system can use. Being familiar with these states will help you determine whether it is appropriate to turn on, resume, suspend, hibernate or shut down the system when you begin or end a session. System behavior for each system state is described briefly in the following, with each system state listed in decreasing order of power usage:
On state: The system is running and the display screen is on.
Idle state: Some system functions are regulated or turned off to conserve power. The display screen may be turned off. The system returns to the On state when pen activity or other input is detected.
Suspend-to-RAM mode (S3): System operation is suspended. Most system functions are turned off to conserve power. Power to memory is on, maintaining data in programs that were running before system operation was suspended. The system does not respond to the pen or other input when in Suspend-
to-RAM mode. Refer to the Resuming System Operation section later in this chapter for information on returning the system to the On state.
Hibernate mode (Save-to-Disk) (S4): System operation is suspended. All system functions are turned off to conserve power. Active data in programs that were running before suspending system operation is stored on the hard disk drive. The system does not respond to the pen or other input. Refer to the Resuming System Operation section later in this chapter for information on returning the system to the On state.
Off state: All system functions are turned off to conserve power. The system does not respond to the pen or other input. The system boots at the next system power-on. The system consumes the same amount of power whether it is in Hibernate (Save-to-
Disk) mode or the Off state. Your system may be configured to enter some of these states automatically after a period of inactivity to conserve battery power. When you use the Stylistic ST5000 Series Tablet PC, you can change the current system state in a number of ways, depending on the systems current state. To determine the current system state, observe the Power icon in the Status display. Table 2-1 on page 22 gives the different system states represented by the Power icon and describes how you can change the system state from the current state. 21 Ocampa_UG_Active B.book Page 22 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o Icon Appearance Current State To Change State*
On State or Idle State Power icon displayed continuously To enter the Off state, shut down the system using the Start menu on your system. To enter Suspend-to-RAM or Hibernate (Save-to-Disk) state, suspend system operation using either a hardware or software suspend. Power icon blinking Suspend-to-
RAM To enter the On state, resume system operation by pressing the Suspend/
Resume button. Power icon not displayed Off State, or, Hibernate
(Save-to-Disk) To enter the Off state, resume system by pressing the Suspend/Resume button, then shut down your system. To enter the On state, start your system, or resume system operation by pressing the Suspend/Resume button. Table 2-1 Changing System States
* Information in Table 2-1 on page 22 is supplied to help you understand which system states your system can enter from the current system state. Refer to the procedures on starting the system, shutting down the system, suspending system operation, and resuming system operation given later in this chapter. Your system may be configured to use either Suspend-to-RAM mode or Hibernate mode. POWERING UP THE TABLET PC Follow the procedure below to start the Stylistic ST5000 Series Tablet PC. Before you begin, confirm that the system is in the Off state. To do so, observe the Status display. If the Power icon is not visible in the Status display, the system is in Off state or in Hibernate (Save-
to-Disk) mode and it is safe to perform this procedure. If the Power icon is visible (either blinking or on continu-
ously), do not perform this procedure. See System States earlier in this chapter for details on modes repre-
sented by the Power icon. 1. Ensure that the battery in your Tablet PC is sufficiently charged, or connect an external power source such as the AC adapter or auto adapter to your Tablet PC. 2. Press the Power On/Suspend/Resume button to start the system. After performing initialization, the system starts the operating system installed on the hard disk drive. Once the operating system is running, you can use the system. SHUTTING DOWN THE SYSTEM Follow these steps to shut down and turn off your system:
1. If system operation has been suspended, resume system operation. See Resuming System Opera-
tion later in this chapter for details. 2. Save your work and close all running programs. 3. Choose Shut Down from the Windows Start menu. 4. Carry out the Shut Down command. The system is now in the Off state. SUSPENDING SYSTEM OPERATION The Tablet PC allows you to suspend the system opera-
tion without closing programs or exiting the operating system. Use this feature to conserve battery power when a system shutdown is not practical or when the battery needs to be changed. If you have set your system to turn power off from the Power Options utility in the Control Panel, the following procedure will not be possible, since pressing the button shuts the system down rather than suspending it. To change your power options, go to Start -> Settings -> Control Panel -> Power Options. 22 Ocampa_UG_Active B.book Page 23 Monday, September 29, 2003 5:04 PM To suspend system operation:
1. Press the Suspend/Resume button, or carry out the Standby command from your operating system or power management program. (If your system is configured to suspend operation using Hibernate
(Save-to-Disk) mode, which is explained later in this procedure, a message is displayed while data is saved to your hard disk.) If you are replacing the battery, wait until system operation is suspended and the power icon is flashing before you remove the battery. Failure to do so could result in loss of your unsaved data. (Note that if the Resume On LAN function is enabled in the BIOS setup, you should not remove the battery unless the system is shut down. When Resume ON LAN is enabled, the bridge battery is disabled in order to optimize battery life.) 2. The Power icon either flashes (Suspend-to-RAM) or is not displayed (Hibernate) when system operation is suspended, depending on how your system is configured. At this point, programs that were running are stopped, active data is saved, and the system enters one of two different low-power states, or suspend modes, as explained in the following paragraphs. 3. Observe the Power icon in the Status display to deter-
mine which suspend mode your system is using.
Power icon is blinking: Suspend-to-RAM mode. In this mode, active data is saved by maintaining power to RAM while most other system components are powered off. The Battery Gauge icon in the Status display indicates the battery charge level.
Power icon is not displayed: Hibernate (Save-to-Disk) mode. In this mode, active data is stored on the hard disk drive and power usage is reduced to the same level used in the Off state. When the system is in Hibernate mode, the Battery Gauge icon is not visible in the Status display. In this mode, there is no danger of losing data if battery power is lost. If you have successfully performed this procedure, system operation is now suspended. Refer to Resuming System Operation later in this chapter to resume system operation. Also, note the following with regard to suspending system operation:
U s i n g Y o u r S t y l i s t i c S T 5 0 0 0
You can remove the battery while the system is in Suspend-to-RAM or Hibernate modes in order to install a charged battery. To prevent losing unsaved data, wait until system operation has suspended before you remove the battery. Note that after you remove the battery, you have approximately five minutes to replace it with a new battery or to plug in a power supply before the bridge battery is depleted.
Your system may be configured to suspend operation automatically after a period of inactivity.
Your system may be configured to enter Hibernate mode automatically after a period of time in Suspend-
to-RAM mode.
The system uses a small amount of battery power when in Suspend-to-RAM mode. Eventually, the battery will become fully discharged. If you will not be using the system for an extended period of time, shut down the system rather than using Suspend-to-RAM mode.
If the battery charge drops to a Low-Battery Warning level while the system is running, the system will beep periodically. If this occurs, suspend system operation, shut down the system, or attach an external power source, such as the AC adapter, to the Tablet PC. If the battery charge drops to a Critically Low level while the system is running, the system is forced into a pre-selected mode (Suspend-to-RAM or Hibernate). If this occurs, you must either install a charged battery, or connect an appropriate external power source such as the AC adapter before you can resume system operation. (If the battery charge drops to a Critically Low level while the system is in Suspend-to-RAM mode, the system stays in Suspend-
to-RAM mode until power is restored or totally dissipated.)
Suspending system operation interrupts data communications; therefore, some programs may block the system from suspending to prevent an interruption.
The suspend action of the Suspend/Resume button may be disabled to prevent accidental interruption. If this is the case, pressing the Suspend/Resume button will not suspend system operation as described here.
(In this case, suspend mode can only be achieved using the system software). Contact your local help desk or reseller if your system configuration is not suitable. 23 Ocampa_UG_Active B.book Page 24 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o
If your system is equipped with a PC Card that allows you to connect to a wired or wireless network, you may be logged off the network after a period of inactivity while system operation is suspended. Contact your network administrator or help desk, or call Fujitsu Service and Support at 1-800-8Fujitsu
(1-800-838-5487) for details on log-off parameters for your network. RESUMING SYSTEM OPERATION To resume operation from either Suspend-to-RAM or Hibernate modes, press the Suspend/Resume button.
From Suspend-to-RAM mode Status lights indicate that the system state is changing. It may take up to a minute before the system returns to the On state and system operation resumes. Note that the display turns on shortly before the pen becomes active due to the power-up sequences observed by the system.
From Hibernate (Save-to-Disk) mode Active data is read from the hard disk drive, and the system returns to the On state after a short time. Note that power to several system components must be restored before system operation resumes. Allow sufficient time for system operation to resume before attempting to use the system. If your system uses Hibernate mode, it will take longer to resume operation as compared to using Suspend-to-RAM mode. Time is needed to read data from the hard disk drive. Use the system as you normally would once system oper-
ation resumes. All programs resume at the point where execution stopped when system operation was suspended. ADJUSTING THE DISPLAY BRIGHTNESS There are three ways to adjust the brightness of your display:
Depending upon whether you are running your system on battery or AC power, the default screen brightness settings will be different. The screen brightness default for running on battery is lower than that on AC power in order to optimize battery life. Click the Tablet icon in the system tray at the bottom right of the screen. (When the cursor is on top of the icon, a message stating Change tablet and pen set-
tings is displayed.) When the Tablet and Pen Settings 24 window appears, select the Display tab, and move the Screen Brightness slider to change the brightness. Click Start -> Control Panel -> Tablet and Pen Set-
tings. Select the Display tab, and move the Screen Brightness slider to change the brightness. Click the Fujitsu Menu icon in the system tray at the bottom right of the screen. (When the cursor is on top of the icon, a message stating Fujitsu Menu... is dis-
played.) Select Tablet and Pen Settings and select the Display tab. Move the Screen Brightness slider to change the brightness. USING THE PEN You can use the Stylistic ST5000 Series pen to generate and create electronic ink, to select items, and to navi-
gate through programs on the Tablet PC. Programs that support handwriting recognition also allow you to write characters directly on the screen with the pen. You can also use the pen as a drawing tool. Pen Tether Attachment Point Tip Switch Barrel Switch Figure 2-1. Stylistic ST5000 Series Pen The Stylistic ST5000 pen is a sophisticated, high-quality electronic instrument that can be damaged if used improperly. Treat the pen as you would any precision device. The following list contains guidelines for proper pen handling:
Do not gesture with the pen, use it as a pointer, or tap it on surfaces other than the Tablet PC screen.
Do not try to turn the thumb grip on the pen; it is designed for inserting and removing the pen from the pen holder and for attaching a pen tether.
Never store the pen with the tip bearing the weight of the pen (e.g., sitting tip down in a pencil cup). Storing the pen tip down could distort the internal mechanism over a period of time
(especially in higher temperatures), causing the tip to act as if it is always depressed. To avoid damage, the pen should be stored in the pen holder when not in use. Ocampa_UG_Active B.book Page 25 Monday, September 29, 2003 5:04 PM The screen reacts when the pen tip is approximately 1/8 inch (3-5mm) from the screen. The pen has three switches: a tip switch and a barrel button toggle switch with switches at both ends. When activated, the tip switch corresponds to the left mouse button, and the front toggle (closest to the pen tip) barrel button switch, when used in combination with the tip switch, corre-
sponds to the right mouse button. The rear toggle of the barrel button switch acts as an electronic ink eraser.
Ensure that a screen protector is installed on the Tablet PC screen before you use the pen. The warranty does not cover a scratched screen.
Use only the pen provided with your Tablet PC. Do not use substitutes that were not designed for the Stylistic ST5000 Series Tablet PC. Here are some hints that may help you use the pen more effectively:
To activate the tip switch, tap or hold the pen tip against the screen.
To activate the barrel button switch, press and hold the end of the button you wish to use (front toggle is the right mouse button switch; the rear toggle acts as an electronic eraser.
To move the cursor, hold the pen tip within 1/8 inch
(3 - 5mm) from the screen and move the pen.
To start a program, double-tap the pen tip (tap the pen tip twice rapidly) on the program icon as you would double-click a mouse.
To select an object, tap the pen tip on the object once.
To double-click an object, tap twice on the object quickly.
To move, or drag, an object on the screen, place the pen tip directly over the object, then as you hold the pen tip against the screen, move the pen. CALIBRATING THE PEN For information about calibrating your pen, refer to the literature that came with the operating system. INSTALLING A PEN TETHER To prevent dropping or losing your pen, you should attach it to your system using the pen tether that is included with the system. To attach the pen tether to your Tablet PC, perform the following steps:
U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 1. Attach the end of the pen tether with the smaller loop to your pen. Do do so, push the end of the tether through the hole in the pen, then thread the opposite end of the tether through the loop. (See Figure 2-2.) Pen tether attachment point Larger loop Smaller loop Figure 2-2. Installing a Pen Tether 2. Attach the end of the pen tether with the larger loop to the attachment point on your pen tablet. To do so, insert the end of the pen tether through the attach-
ment point, then feed the pen through the large loop in the tether. REPLACING THE PEN TIP With use, the pen tip may become worn or may pick up foreign particles that can scratch the screen. A damaged or worn tip may not move freely, causing unpredictable results when using the pen. If your pen exhibits these problems, you should replace the pen tip. To do so, use the pen tip removal tool included with your pen. Gap Figure 2-3. Tip Removal Tool To remove the tip, position the tip in the gap between the two ends of the tool. Pinch the tool together so the tip is firmly clasped, then pull it from the barrel. If the tip is worn or damaged, discard it. To replace the tip, retrieve one of the new tips that accompanied your pen. Insert the flat end of the tip into the barrel and push it in firmly until it is seated. If you need more tips, they can be ordered from the Fujitsu Web site at: www.fujitsupc.com. 25 Ocampa_UG_Active B.book Page 26 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o CHARGING THE BATTERY REMOVING AND INSTALLING THE BATTERY The Stylistic ST5000 Series battery can be charged while it is installed in the Tablet PC. To do so:
1. Connect a DC power source, such as the AC adapter, to the DC input connector on the Tablet PC. The DC Input icon appears in the Status display. If the battery charge is below 90%, the battery begins charging and the Charging icon appears in the Status display. If the battery charge is 90% or higher when you connect DC power, the battery will not charge, preventing battery overcharging. 2. Look at the Battery Gauge icon in the Status display to determine the percent of charge in the battery. See Status Display in Chapter 1 of this manual for a description of the Battery Gauge icon. As long as DC power remains connected to the Tablet PC, the charging process continues until the battery charge reaches 100%. Charge times shown in Table 2-2, Battery Charging Time" are for a fully discharged battery charging both while the Tablet PC is and is not in use. Battery Charge Level Reached Approximate Charge Time
(not in use) Approximate Charge Time
(in use) 90%
100%
3.5 hours TBD -7 hours*
4.5 hours 8 hours*
Table 2-2. Battery Charging Time
* Depends upon the applications in use. Also note the following with respect to charging the battery:
You can use the system, suspend system operation, or shut down and turn off the system without interrupting the charging process; however, using the system while the battery is charging will cause the battery to charge at a slower rate, as noted in Table 2-
2, Battery Charging Time".
As noted in the procedure above, the system will not begin charging the battery if the battery charge level is 90% or higher when the system is initially connected to external DC power. (This prevents the battery from being overcharged.)
The battery uses Lithium ion battery cells which have no memory effect. You do not need to discharge the battery before you begin charging. 26 The battery can be removed from the Tablet PC and swapped with a charged battery. The battery can then be charged in an external charger if one is available. To remove the battery from the Tablet PC:
1. Choose one of the following:
If a charged battery is available, you can suspend system operation. A built-in bridge battery will maintain the system in Suspend-to-RAM mode for about 5 minutes while the battery is removed; this allows time for replacement with a charged battery.
If a charged battery is not available, save your work and close all running programs, then shut down the system or Hibernate (Save-to-Disk).
Plug in an external DC power source. 2. Slide the battery release latch in the direction indicated. (See Figure 2-4 on page 26 for location). 3. Pull the battery away from the system, as shown in the illustration and remove the battery from the Tablet PC. If you are using an external battery charger, refer to the instructions provided with the battery charger. Under Federal, state, or local law, it may be illegal to dispose of batteries by putting them in the trash. Be sure to dispose of batteries in accordance with local government regulations. To install the battery:
1. Orient the battery with the slides in the empty battery tray. Slide the battery into the tray and press it firmly until it is seated. When it is properly seated, the battery release latch should return to position and lock the battery. Figure 2-4. Removing the Battery Once the battery is installed, you can resume system operation or start and use your system normally. Ocampa_UG_Active B.book Page 27 Monday, September 29, 2003 5:04 PM TIPS FOR CONSERVING BATTERY POWER You can extend the charge life of your battery by conserving battery power. (Your results may vary depending on your application and how the system is configured.) Here are some suggestions to help you conserve battery power:
Use an external power source such as the AC adapter whenever the system is docked.
Suspend system operation if you know that you wont be using the system for a while.
Shut down the system if you wont be using the system for an extended period of time.
Use power management (available on the desktop) to help you conserve power automatically.
Battery life is dependent upon the operating system, power settings, and applications in use. Operation of the Bridge Battery When installed in the Tablet PC, the battery provides power to some system componentseven when the system is in the Off state. When the battery is removed, power is supplied to these components by a bridge battery that is built into the Tablet PC. The bridge battery is not designed for long-term opera-
tion. To maintain the bridge battery properly, observe the following measures:
The bridge battery function is disabled if Wake On LAN is enabled in the BIOS.
The system arrives with the bridge battery in a discharged state. Be sure to charge it sufficiently before relying upon it to support the system in the event of battery removal.
To prevent draining the bridge battery, always store the system with a charged battery installed.
If the bridge battery becomes drained, it takes approximately 8 hours for it to be fully recharged. The bridge battery charges when the AC Adapter is connected and the system is in On or Off states or Suspend mode. It charges from the battery only when the system is in the On state. U s i n g Y o u r S t y l i s t i c S T 5 0 0 0 MODEM CONNECTION The internal 56 Kbps LAN/modem module installed in the Stylistic ST5000 Series Tablet PC has actual maximum transfer rates of 53 Kbps (receive), 33.6 Kbps
(send), and 14.4 Kbps (fax). Download rates are limited to 53 Kbps in the United States due to FCC restrictions. The Stylistic ST5000 Series Tablet PC is designed to accept a standard RJ-11 telephone plug. Connect the plug to the modem jack located on the left-hand side of the Tablet PC (See Figure 1-4 on page 5 for location). The tele-
phone plug can be installed whether or not the Tablet PC has power applied. If you need assistance configuring the Stylistic ST5000 Series Tablet PC modem or LAN, contact your local help desk or reseller. PC CARD SLOT The Stylistic ST5000 Series Tablet PC Card slot allows you to install a Type I or Type II PCMCIA Card. Installing a PC Card To install a PC card, position the side with the arrow facing up (i.e., when looking at the tablets display side, the arrow on the card should be visible.) Slide the card into the PC Card slot, and press it firmly to ensure proper seating. (See Figure 2-5 for location) If you need assistance installing a PC Card in the Stylistic ST5000 Series Tablet PC, contact your corporate help desk or reseller. Figure 2-5. Installing a PC Card Removing a PC Card To remove a PC Card, first click the Safely Remove Hard-
ware icon in the system tray in the bottom right-hand corner of the display. Select PC Card from the list, and click [Stop]. Press the PC Card eject button so that it pops out. Once the button has popped out, press it firmly to eject the card. (See Figure 2-6 for location) 27 Ocampa_UG_Active B.book Page 28 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T w o Figure 2-6. Removing a PC Card REMOVING AND INSTALLING MEMORY MODULES There is one DIMM slot in your Tablet PC and 256 MB on the motherboard. 256 MB, 512 MB, and 1 GB modules are available, so you can install a combination of up to 2 GB in the system. DIMM replacement should be performed at a static-free workstation. Do not touch connector pins, circuit boards, or other circuit components on the drive or Tablet PC. Electrostatic discharge caused by doing so can damage sensitive components. Figure 2-8. Installing a DIMM Module 4. Reinstall the cover and screws that you removed in step 2. 5. Confirm that the DIMM module is recognized by the system. To do so, run BIOS Setup. The size of the DIMM module should be displayed in the Info menu in BIOS Setup. The DIMM module is installed in the Tablet PC and you can now use the system. Installing a Memory Module To install a DIMM module in the Tablet PC:
Removing a Memory Module To remove a DIMM module:
1. Ensure that the Tablet PC is off. To do so, carry out the Shut Down command in the Start menu. (Do not attempt to remove or install a DIMM module when the system is in Suspend mode or running.) 1. Ensure that the Tablet PC is off. To do so, carry out the Shut Down command in the Start menu. (Do not attempt to remove or install a DIMM module when the system is in Suspend mode or running.) 2. Remove the two screws from the cover plate on the back of the Tablet PC and remove the cover plate as shown in Figure 2-7. 2. Remove the screws from the cover plate on the back of the Tablet PC and remove the cover plate as shown in Figure 2-7. 3. Spread the fingers on the socket that lock the DIMM module in place until the DIMM module is loose. Figure 2-7. Accessing the Memory Slot Insert the DIMM module in the socket at an angle and push it down until it locks into place as shown in Figure 2-8. Note that the DIMM module is keyed to prevent it from being inserted backwards. Figure 2-9. Removing a DIMM Module 4. Remove the DIMM module from the socket. The DIMM module is now removed from the Tablet PC. Refer to Installing a Memory Module on page 28 to install a new DIMM module. 3. 28 Ocampa_UG_Active B.book Page 29 Monday, September 29, 2003 5:04 PM 3 Care and Maintenance 29 Ocampa_UG_Active B.book Page 30 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 30 Ocampa_UG_Active B.book Page 31 Monday, September 29, 2003 5:04 PM C a r e a n d M a i n t e n a n c e Care and Maintenance
. This chapter gives you pointers on how to care for and maintain your Stylistic ST5000 Series Tablet PC. PROTECTING THE DISPLAY SCREEN The Stylistic ST5000 Series Tablet PC is designed to provide you with years of service. Using a screen protector will help ensure the screen remains as clear as possible. When installed, the screen protector becomes a durable, replaceable writing surface that protects the display screen from abrasion. To obtain additional screen protectors, use Fujitsu part number FPCSP03AP (5-pack) when ordering. Additional information about installation is included with the screen protectors. During normal use of the Tablet PC, small particles from the environment can become embedded in the pen tip and scratch the screen. To prevent scratching the screen, ensure that a screen protector is installed before using your Tablet PC. The warranty does not cover a scratched screen. To install a new screen protector on your Tablet PC:
1. If a screen protector is already installed on the display screen, remove it before installing the new screen protector. The screen protector is held onto the display screen surface by a thin strip of adhesive around the edges. A notch in one corner of the screen protector allows you to slide your fingernail under the screen protector for easy removal. 2. Clean the display by wiping the screen gently using a soft cotton cloth dampened with isopropyl alcohol. Ensure that all residue has been removed from the screen before applying a new screen protector.Remove the protective coating from the adhesive side of the screen protector first, as shown in Figure 3-1. The Stylistic ST5000 Series Tablet PC is not waterproof. Do not pour liquids on the system or wash it with a heavily soaked cloth. Do not place items on the top of the dis-
play, or damage may occur. Figure 3-1 Removing the Protective Sheet 3. Apply the screen protector to the display screen surface. When doing so, orient the screen protector with the adhesive side of the screen protector facing the display screen and the notched corner of the screen protector oriented as shown in Figure 3-2. Figure 3-2 Installing the screen protector 4. Apply pressure to the screen protector with your finger using a continuous wiping motion along the edges. The adhesive sets completely within 48 hours. To ensure a good seal between the screen protector and the display, do not lift the screen protector from the display once it has been applied. 5. Remove the protective plastic cover from the face of the screen protector, as shown in Figure 3-3. Figure 3-3 Removing the protective cover 31 Ocampa_UG_Active B.book Page 32 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 6. Clean any residue left behind by the protective coating from the exposed surface of the screen protector by wiping gently with a soft cotton cloth dampened with isopropyl alcohol. Wipe the screen protector with a soft dry cloth to remove any low-
tack adhesive; this will help prevent the pen tip from squeaking. The screen protector is now installed. STORING THE TABLET PC Store the Stylistic ST5000 Series Tablet PC in the Off state with a fully charged battery installed. You can store the Tablet PC in the Off state for about 30 days with a fully charged battery installed. After this period, the battery should be recharged or replaced with a charged battery. If you intend to store the Tablet PC for a longer period of time, the small battery that maintains system time may need to be replaced. Replacement of the clock battery should only be performed by authorized technicians. AVOIDING OVERHEATING The Tablet PC monitors its internal temperature. As the internal temperature approaches the tolerable limits of heat-sensitive components, system functions are auto-
matically limited or turned off to prevent damage. To avoid overheating the Tablet PC, do not obstruct the air vents on the top and bottom edges of the Tablet PC. CLEANING THE DISPLAY SCREEN To clean the Tablet PC display screen, wipe the screen surface gently using a soft cotton cloth slightly damp-
ened with water or isopropyl alcohol. The Stylistic ST5000 Series Tablet PC is not waterproof. Do not pour liquids on the Tablet PC or wash the Tablet PC with a heavily soaked cloth. TROUBLESHOOTING Solutions to some common problems are described in the following sections. If you are experiencing a problem with your Tablet PC that you cannot solve by taking the actions described, contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-
8Fujitsu (1-800-838-5487) for further assistance. System Will Not Resume Operation If the system will not resume operation after system operation has been suspended, check the following possible causes:
The battery may either be defective, or discharged to 32 a critically low level. When the battery reaches a critically low level, the system is forced into Suspend-
to-RAM mode to avoid a total system power failure. To correct this problem, either connect an external power supply (such as the AC adapter), or install a charged battery in the Tablet PC.
The system may be at the critical thermal limit. To avoid damage to heat-sensitive components, the system enters Suspend-to-RAM mode when it gets too hot. System operation cannot be resumed until the Tablet PC cools off to a tolerable temperature. Move the Tablet PC to a cooler location. Display Screen Blank or Difficult to Read If the display screen on your Tablet PC appears blank or is unreadable, confirm that the system is running (the Power icon is displayed continuously on the Status display), and check the following:
The system brightness may be set too low, causing the screen to appear too dark. To change system brightness, press the Fn button twice to open the Fujitsu menu. Brightness can be adjusted from the menu.
The video timeout may have expired. Tap on the display screen to reactivate the display. Note that this is a normal, power-saving feature. Cursor Is Not Tracking Pen If the cursor on the screen appears to be misaligned with the pen or is not accurately tracking the pen, calibrate the pen. See Calibrating the Pen on page 25 for more information. Infrared Data Transfer Is Not Working If you are experiencing problems transferring data over the systems infrared interface, note the following:
Can the IrDA port on the Tablet PC see the IrDA port on the other device? A direct line-of-sight path must exist between the IrDA port on the Tablet PC and the IrDA port on the other device.
The distance between the two devices must not be more than 3 feet.
The viewing angle from the IrDA port on the Tablet PC must not be more than 15 degrees from a center line between the IrDA port on the Tablet PC and the IrDA port on the other device.
The device with which you are trying to communicate must be compliant with the IrDA Standard Revision 1.1 (or 1.0).
It may be necessary for both computers to be using the same network connection protocols. Ocampa_UG_Active B.book Page 33 Monday, September 29, 2003 5:04 PM Tablet PC is Not Responding to the Pen If the Tablet PC does not respond to the pen, connect an external keyboard to the system to see if it responds to keyboard commands. If the system doesnt respond to a keyboard, the application or system may have crashed, and it may be necessary to reboot the system. If the system responds to a keyboard but not to a pen, contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-8Fujitsu (1-800-838-5487) for further assistance. Speaker/Headphone Volume Too Low If the audio volume on your Tablet PC speaker or external headphones is too low, check the following:
Ensure the speaker (or headphone output if using headphones) is enabled. To do so, open the Control Panel and double-click on the Sounds and Audio Devices icon. Select the proper tab, and increase the volume using the slider bar. (If you arent getting any sound, uncheck the Mute box if it is checked.)
Press the Fn button twice to open the Fujitsu menu. Volume can be adjusted from the menu.
Ensure the mute box in the system volume control
(accessible from the system tray) is not set.
Ensure any volume control in your audio software is set to an audible level. Configuring Peripheral Interfaces Certain peripheral devices can be disabled during the BIOS Setup. If the peripheral interface you want to use does not appear to be working with your peripheral device, ensure that it is enabled in the BIOS. Contact your local help desk or reseller, or call Fujitsu Service and Support at 1-800-8Fujitsu (1-800-838-5487) if you need assistance using BIOS Setup. RESTORING YOUR PRE-INSTALLED SOFTWARE The Drivers and Applications Restore (DAR) CD contains:
Sets of device drivers and Fujitsu utilities (in specific directories) that are unique to your Tablet PC configu-
ration for use as documented below. A link to the Drive Image Special Edition (DISE) utility on your hard disk drive. Read-me files that provide additional use information for items on this CD-ROM. C a r e a n d M a i n t e n a n c e In order to install applications and/or drivers from the DAR CD, you will need to connect an external CD drive to your system. If the DAR CD is in the drive when you boot up the system, and the Boot Sequence is set in the BIOS to boot from the CD drive first (see Creating a backup image when booting up on page 34), a message will appear informing you that if you proceed, you will have a choice of:
creating a new backup of drive C:, restor-
ing a previous backup, or restoring the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. If you wish to install drivers or applications only from the CD, remove the disk from the drive, reboot the system, and insert the CD after Windows has started. If you have access to the internet, visit the Fujitsu Support web site at www.fujitsupc.com to check for the most current information, drivers and hints on how to perform recovery and system updates. DRIVE IMAGE SPECIAL EDITION (DISE) PowerQuest Drive Image Special Edition (DISE) provides a way to restore your computer if you experience a hard disk crash or other system failure. Fujitsu has used DISE to create an image of everything installed on the computer at the time you purchased it. The image is saved on a separate partition on the hard disk. You can use DISE to restore the factory image and return your computer to the state in which it was shipped from Fujitsu. Although it is not necessary, you can use DISE to store additional image files you create. For example, if you install several applications and save data files on your hard disk, you can create a new image that includes them and then save that image file on the hard disk. Then, in the event of a hard disk failure, you can restore the image that includes the applications and data files you use. 33 Ocampa_UG_Active B.book Page 34 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e Using the DISE feature will reduce the amount of usable disk space on your hard disk drive. Creating a Backup Image You can create a system backup image of your C:\ drive at any time. The C:\ partition must be a FAT, FAT32, or NTFS partition, and it must be directly before the backup partition on your hard disk. There are two ways to implement the DISE utility: when booting up the system, or from the desktop. Creating a backup image when booting up Before creating an image at boot-up, you must first change the boot-up priority in the BIOS so that the system will go to the media drive first, rather than trying to boot-up from the hard drive or an external floppy disk drive. To change the boot-up priority:
1. Start your system and press the [F2] key when the Fujitsu logo appears. You will enter the BIOS Setup Utility. 2. Using the arrow keys, go to the Boot menu. 3. Arrow down to the Boot Device Priority submenu and press [Enter]. 4. Arrow down to the CD-ROM drive in the list, and press the space bar (or the + key) to move the CD-
ROM drive to the top of the list. (The system attempts to boot from the devices in the order in which they are listed.) 5. Press [F10], then click on [Yes] to exit the BIOS Setup Utility and return to the boot process. After you have changed the boot priority, you can create a backup image when you are booting up:
1. Install the DAR CD in the drive prior to booting up. When bootup begins, a message appears informing you that if you proceed, you will be able to:
Create a new backup of drive C Restore a previous backup, or, Restore the original factory image. Note that creating a new backup will overwrite any previous backups, and restoring a backup or factory image will overwrite all information on the hard drive, including saved files. 2. After you click [Y]es. You will be presented with two options: [Create New Backup] and [Restore Backup]. 34 After you click [Create New Backup], follow the on-
screen instructions. By selecting [Create New Backup], a new image will be written to your backup partition. This will overwrite any previously created image. Creating a backup image from the desktop To create a backup image from the desktop, select Drive Image SE from the Program list. You will initially be prompted to create a backup diskette. It is not necessary to create the backup diskette, since the DAR CD performs the same function. 1. At the Drive Image Special Edition main screen, click Options> Create New Backup. DISE displays a warning that it must go to DOS to create the image. 2. Click Yes. DISE creates an image file in the backup partition. If you created a backup image previously, the new image overwrites the old one. Enlarging the Backup Partition If there is not enough unused space in the backup parti-
tion on your hard disk, DISE will resize the partition. DISE will display the minimum, maximum, and recom-
mended sizes for the backup partition. You choose the size you want. DISE takes the space from the FAT, FAT32, or NTFS partition that you are backing up. If there is not enough unused space in that partition to take, you will not be able to resize the backup partition and create an image file. You can delete files from the FAT, FAT32, or NTFS partition to create more unused space on the hard disk. Restoring a Backup Image You can restore either a factory image or a backup image you created. Be aware that restoring a backup image will replace the contents of the C:\ partition with the image you restore. 1. Disable virus protection software. If virus protection software is enabled, DISE will lock up. 2. From the DISE main window, click Options >
Restore Backup to restore an image you created, or click Options > Restore Factory Backup to restore the factory image. DISE shuts down to DOS and restores the image file. Re-Installing Individual Drivers and Applications The Drivers and Application CD can be used to selec-
tively re-install drivers and/or applications that may have been un-installed or corrupted. To re-install drivers and/or applications:
1. Boot up the system and insert the DAR CD after Windows has started. A Fujitsu Welcome screen is displayed after the CD is inserted. C a r e a n d M a i n t e n a n c e Ocampa_UG_Active B.book Page 35 Monday, September 29, 2003 5:04 PM 2. From the left frame of the Welcome screen, System Components and 3rd Party Applications can be selected. System Components are those drivers and utilities that have been developed by Fujitsu; 3rd Party Applications are applications developed by other vendors. Installing System Components 1. To install system components, click on System Components in the left frame of the Welcome screen. A list of utilities and drivers will be displayed. Select one or more items from the list, or click [Select All] to select all items in the list. (To de-select your choices, click the [Clear All] button. 2. Click [Install Selected Subsystems] to install the selected items. Installing 3rd Party Applications 1. To install 3rd party applications, click on 3rd Party Applications in the left frame of the Welcome screen. A list of applications will be displayed. 2. Select one of the items from the list, and follow the instructions that appear on the screen. Note that only one application may be installed at a time. 3. Repeat step 2 to install additional applications. 35 Ocampa_UG_Active B.book Page 36 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n T h r e e 36 Ocampa_UG_Active B.book Page 37 Monday, September 29, 2003 5:04 PM 4 Specifications 37 Ocampa_UG_Active B.book Page 38 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F o u r 38 Ocampa_UG_Active B.book Page 39 Monday, September 29, 2003 5:04 PM S y s t e m S p e c i f i c a t i o n s Stylistic ST5000 Series Hardware Specifications The following table provides general hardware specifica-
tions of the Stylistic ST5000 Series Tablet PC by category. Stylistic ST5000 Specifications (Continued) Stylistic ST5000 Specifications Physical Specifications Dimensions 8.66 w x 12.77 d x 0.82-0.88 h
(220 mm x 324.4 mm x 20.9-22.3 mm) Weight 3.2 lbs. (1.45 Kg) CPU Processing Specifications Ultra low voltage Mobile Intel Pentium III processor - M with SpeedStep technology*
Chip set Intel 855MGE - 400 MHz Processor Speed 1 GHz*
Main RAM Memory/Storage Specifications
256 MB SDRAM
144-pin SO DIMM modules
256 MB, 512 MB, and 1 GB module configurations available, with a system maximum of 2 GB. L1 cache
(CPU) 32 KB on-die L2 cache 1 MB on-die BIOS ROM 1 MB (FWH) Hard disk drive Display
2.5 HDD
Minimum 40 GB IDE HDD*
Ultra DMA 100
Shock-mounted Display Specifications
Color LCD
Active Digitizer
16-bit color
12. TFT XGA (1024 x 768), 16M colors
Brightness: 8 levels
Viewing Angle:
Horizontal: 30 degrees (min.) Vertical: 10 degrees (min.)
Contrast Ratio: Typ. 250, Min. 100 VRAM Intel 855MGE chipset with 8MB shared memory using Unified Memory Architecture (UMA) delivers low-
power, high-performance 3D/2D graphics, video, and display capabilities. Dynamic Video Memory Technology
(DVMT) dynamically responds to application requirements and efficiently allocates the proper amount of memory
(64 MB max.) for optimal graphics and system performance. Interface Specifications Card Slots
PCMCIA: One Type I or Type II, PCMCIA CardBus version 3.0 Integrated Interfaces
Secure Digital (SD) slot
Smart Card slot
Modem (RJ-11)
LAN (RJ-45)
IEEE 1394 (S400 4-pin)
USB 2.0 (Qty. 2)
DC-In
IrDA
15-pin D-SUB connector for external VGA monitor
Docking connector Infrared IrDA version 1.1 (FIR, 4Mbps) Keyboard/
Mouse support Audio User Controls
Keyboard/Mouse IR Port
System IR Port
SigmaTel STAC9767 codec
Internal mono microphone and speaker
Mono microphone and stereo headphone jacks
Application Buttons, each with primary, secondary, tertiary, and security functions
Power On/Suspend/Resume button
Emergency Shutoff Button (Power Off button)
Two Navigation buttons
* The specifications for your particular model may vary. To determine the specifications for your system, please visit our Web site at: www.fujitsupc.com. 39 Ocampa_UG_Active B.book Page 40 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F o u r Stylistic ST5000 Specifications (Continued) Stylistic ST5000 Specifications (Continued) Agency Approval Specifications
EN55022 (CISPR22) Class B
FCC 15, Class B
FCC 15C, 15.247
VCCI CLass B
ETSI EN 300-328
ICES-003
Canada RSS-210
EN55024 (1998)
ETSI EN 301-489-17 V.1.1.1
(2000-9)
UL and cUL Listed, UL 1950, 3rd edition
TuV T-Mark, EN60950
FCC Part 68
IC CS-03
Energy Star
JATE Emissions Immunity Safety Telecom Other Additional Specifications Operating systems
Microsoft Windows XP Tablet PC Edition Status Indicators
(LEDs) Main Battery Bridge Battery
Power
Charge/DC-In
Battery level
HDD
Security Power Specifications
6-cell
Removable, Lithium ion
10.8 V @ 4400 mAh
Warm-swappable
Recharge Time:
Suspend/Off: 3.5 hours (90%), 4.5 hours (100%) Operating: 8 hours (100%)
Life: Up to 5 hours. (Battery life is dependent upon the operating system, power management, and applications in use.)
Suspend Life: Minimum 5 days Off State: Approximately 30 days
6-cell NiMH, 35 mAh
Life (with Suspend-to-RAM on bridge battery only):
5 minutes from full charge AC Adapter
Autosensing 100 - 240V, supplying 16 VDC, with a current of 3.75 A Environmental Specifications Temperature Operating: 41o - 95o F (5o - 35o C) Non-operational: 5o - 140o F
(-15o - 60o C) Humidity Operating: 20 - 85% non-condensing Non-operating: 8 - 85% non-
condensing 40 Ocampa_UG_Active B.book Page 41 Monday, September 29, 2003 5:04 PM 5 Agency Notices 41 Ocampa_UG_Active B.book Page 42 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e 42 Ocampa_UG_Active B.book Page 43 Monday, September 29, 2003 5:04 PM Regulatory Information NOTICE Changes or modifications not expressly approved by Fujitsu could void this users authority to operate the equipment. FCC NOTICES Notice to Users of Radios and Television These limits are designed to provide reasonable protec-
tion against harmful interference in a residential installa-
tion. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a partic-
ular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet that is on a different circuit than the receiver. Consult the dealer or an experienced radio/TV technician for help. Shielded interconnect cables must be employed with this equipment to ensure compliance with the pertinent RF emission limits governing this device. Notice to Users of the US Telephone Network This equipment (FMD MBH7MD33 Modem) complies with Part 68 of the FCC rules, and the requirements adopted by ACTA. On the bottom of this equipment is a label that contains, among other information, the FCC registration number and ringer equivalence number
(REN) for this equipment; or a product identifier in the format US:AAAEQ##TXXXX. If requested, this informa-
tion or number must be provided to the telephone company. This equipment is designed to be connected to the tele-
phone network or premises wiring using a standard jack type USOC RJ11C. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant tele-
phone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. A g e n c y N o t i c e s The ringer equivalent number (REN) of this equipment is 0.0B as shown on the label. The REN is used to deter-
mine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. If this equipment causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isnt practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you believe it is necessary. The telephone company may make changes in its facili-
ties, equipment, operations or procedures that could effect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service. If trouble is experienced with this equipment, for repair or warranty information, please refer to the manual or contact Fujitsu PC Corporation, Customer Service. If the equipment is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. The equipment cannot be used on public coin service provided by the telephone company. Connection to party line service is subject to state tariffs. (Contact the state public utility commission, public service commission or corporation commission for information). If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this computer does not disable your alarm equipment. If you have any questions about what will disable alarm equipment, consult your telephone company or a quali-
fied installer. The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date an time it is sent and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual. 43 Ocampa_UG_Active B.book Page 44 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e Avis Aux Utilisateurs Du Rseau Tlphonique Canadien AVIS: Le prsent matriel (FMD MBH7MD33 Modem) est conforme aux spcifications techniques dIndustrie Canada applicables au matriel terminal. Cette confor-
mit est confirme par le numro denregistrement. Le sigle IC, plac devant le numro denregistrement, signifie que lenregistrement sest effectu conform-
ment une dclaration de conformit et indique que les spcifications techniques dIndustrie Canada ont t respectes. Il nimplique pas quIndustrie Canada a approuv le matriel. Avant de connecter cet quipement une ligne tlpho-
nique, lutilisateur doit vrifier sil est permis de connecter cet quipement aux installations de tlcom-
munications locales. Lutilisateur est averti que mme la conformit aux normes de certification ne peut dans certains cas empcher la dgradation du service. Les rparations de lquipement de tlcommunications doivent tre eVectues par un service de maintenance agr au Canada. Toute rparation ou modification, qui nest pas expressment approuve par Fujitsu, ou toute dfaillance de lquipement peut entraner la compagnie de tlcommunications exiger que lutilisateur dcon-
necte lquipement de la ligne tlphonique. AVIS: Lindice dquivalence de la sonnerie (IES) du prsent matriel est de 0.0. LIES assign chaque dispositif terminal indique le nombre maximal de terminaux qui peuvent tre raccords une interface tlphonique. La terminaison dune interface peut consister en une combinaison quelconque de dispositifs, la seule condition que la somme dindices dquiva-
lence de la sonnerie de tous les dispositifs nexcde pas 5. Pour assurer la scurit, les utilisateurs doivent vrifier que la prise de terre du ser-
vice dlectricit, les lignes tlphoniques et les conduites deau mtalliques sont con-
nectes ensemble. Les utilisateurs NE doivent PAS tenter dtablir ces connex-
ions eux-mmes, mais doivent contacter les services dinspection dinstallations lectriques appropris ou un lectricien. Ceci peut tre particulirement important en rgions rurales. DOC (INDUSTRY CANADA) NOTICES Notice to Users of Radios and Television This Class B digital apparatus meets all requirements of Canadian Interference-Causing Equipment Regulations. CET appareil numrique de la class B respecte toutes les exigence du Rglement sur le matrial brouilleur du Canada. Notice to Users of the Canadian Telephone Network NOTICE: This equipment (Modem FMD MBH7MD33) meets the applicable Industry Canada Terminal Equip-
ment Technical Specifications. This is confirmed by the registration number. The abbreviation, IC, before the registration number signifies that registration was performed based on a Declaration of Conformity indi-
cating that Industry Canada technical specifications were met. It does not imply that Industry Canada approved the equipment. Before connecting this equipment to a telephone line the user should ensure that it is permissible to connect this equipment to the local telecommunication facilities. The user should be aware that compliance with the certification standards does not prevent service degradation in some situations. Repairs to telecommunication equipment should be made by a Canadian authorized maintenance facility. Any repairs or alterations not expressly approved by Fujitsu or any equipment failures may give the telecom-
munication company cause to request the user to disconnect the equipment from the telephone line. NOTICE: The Ringer Equivalence Number (REN) for this terminal equipment is 0.0. The REN assigned to each terminal equipment provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equiva-
lence Numbers of all the devices does not exceed five. For safety, users should ensure that the electrical ground of the power utility, the telephone lines and the metallic water pipes are connected together. Users should NOT attempt to make such connections themselves but should contact the appro-
priate electric inspection authority or elec-
trician. This may be particularly important in rural areas. 44 Ocampa_UG_Active B.book Page 45 Monday, September 29, 2003 5:04 PM A g e n c y N o t i c e s UL Notice This unit requires an AC adapter to operate. Use only UL Listed Class 2 Adapters with an output rating of 16 VDC, with a current of 3.75A minimum. AC Adapter output polarity:
The modem-to-telephone network connection must be a line cord using a minimum #26 AWG wire. For Authorized Repair Technicians Only For continued protection against risk of fire, replace only with the same type and rating fuse. Danger of explosion if Lithium (clock) battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the manufacturer. Dis-
pose of used batteries according to the manufacturers instruction. System Disposal LAMP(S) INSIDE THIS PRODUCT Hg CONTAIN MERCURY AND MUST BE RECYCLED OR DISPOSED OF ACCORDING TO LOCAL, STATE, OR FEDERAL LAWS. 45 Ocampa_UG_Active B.book Page 46 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e S e c t i o n F i v e 46 Ocampa_UG_Active B.book Page 47 Monday, September 29, 2003 5:04 PM Appendix Wireless LAN* Users Guide
* Optional device 47 Ocampa_UG_Active B.book Page 48 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x 48 Ocampa_UG_Active B.book Page 49 Monday, September 29, 2003 5:04 PM FCC REGULATORY INFORMATION Please note the following regulatory information related to the optional wireless LAN device. Regulatory Notes and Statements Wireless LAN, Health and Authorization for use Radio frequency electromagnetic energy is emitted from Wire-
less LAN devices. The energy levels of these emissions, however, are far much less than the electromagnetic energy emissions from wireless devices such as mobile phones. Wireless LAN devices are safe for use by consumers because they operate within the guidelines found in radio frequency safety standards and recommendations. The use of Wireless LAN devices may be restricted in some situations or environments, such as:
On board an airplane, or In an explosive environment, or In situations where the interference risk to other devices or services is perceived or identified as harmful. In cases in which the policy regarding use of Wireless LAN devices in specific environments is not clear (e.g., airports, hospitals, chemical/oil/gas industrial plants, private buildings), obtain authorization to use these devices prior to operating the equipment. Regulatory Information/Disclaimers Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in the user documentation provided with the product. Any changes or modifications made to this device that are not expressly approved by the manufacturer may void the users authority to operate the equipment. The manufacturer is not responsible for any radio or television interference caused by unauthorized modification of this device, or the substitution or attachment of connecting cables and equipment other than those specified by the manufacturer. It is the responsibility of the user to correct any interference caused by such unauthorized modifica-
tion, substitution or attachment. The manufacturer and its authorized resellers or distributors will assume no liability for any damage or violation of government regulations arising from failure to comply with these guidelines. Federal Communications Commission statement This device complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause interference, and, (2) This device must accept any interference, including interference that may cause undesired operation of this device. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installa-
tion. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interfer-
ence will not occur in a particular installation. W i r e l e s s L A N U s e r s G u i d e If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
1. 2. 3. 4. Reorient or relocate the receiving antenna. Increase the distance between the equipment and the receiver. Connect the equipment to an outlet on a circuit different from the one the receiver is connected to. Consult the dealer or an experienced radio/TV technician for help. FCC Radio Frequency Exposure statement This Wireless LAN radio device has been evaluated under FCC Bulletin OET 65C and found compliant with the requirements as set forth in CFR 47 Sections 2.1091, 2.1093, and 15.247 (b)
(4) addressing RF Exposure from radio frequency devices. The radiated output power of this Wireless LAN device is far below the FCC radio frequency exposure limits.
(The maximum SAR value measured from this device was 0.36 W/kg.) Export restrictions This product or software contains encryption code which may not be exported or transferred from the US or Canada without an approved US Department of Commerce export license. This device complies with Part 15 of FCC Rules., as well as ICES 003 B / NMB 003 B. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesirable operation. Modifications not expressly authorized by Fujitsu PC Corpora-
tion may invalidate the user's right to operate this equipment. Canadian Notice To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. 49 Ocampa_UG_Active B.book Page 50 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Before Using the Wireless LAN The Integrated Wireless LAN is a standard device on Stylistic ST5000 Tablet PCs, and an option on Stylistic ST5000D Tablet PCs. This manual describes the basic operating procedures for the Wireless LAN (referred to as the device in this manual) and how to set up a wire-
less LAN network. Before using this device, read this manual carefully to ensure correct operation of the device. Keep this manual in a safe place for reference while using the device. Types of Wireless LANs Covered by this Document This document is applicable to systems containing one of the following two devices. Most of the procedures are identical. Sections that differ between the two devices have been noted in the text:
Intel PROSet Wireless LAN Atheros Wireless LAN To determine which device is present in your system, click [Start] -> Control Panel. If there is an icon named Intel PROSet, you have the Intel device; if there is an icon named Atheros Client Utility, you have the Atheros device. Characteristics of the Device This device consists of a wireless LAN card that is attached inside the computer via a mini-PCI slot. The main characteristics are as follows:
It operates in the 2.4 GHz Industrial, Scientific, and Medical (ISM) RF band. It does not require the procurement of an FCC license to operate. It uses Direct Sequence Spread Spectrum (DS-SS), an RF modulation scheme that is resistant to noise. Figure 1. Ad Hoc Mode Network This device complies with Wi-Fi, and is able to com-
municate at the maximum transfer rate of 11 Mbps. The maximum communication range is approxi-
mately 80 feet (25 meters) inside a building. The range may be shorter depending upon the installation fac-
tors, such as walls and columns. Unauthorized access can be prevented with the use of an SSID and an encryption key (also known as a WEP key). Wireless LAN Modes Using this Device Ad Hoc Mode (See Figure 1) Ad Hoc Mode refers to a type of wireless network that involves connecting multiple computers without the use of an Access Point. Network connectivity between computers can be established using only wireless LAN cards in a peer-to-peer fashion. Ad Hoc networks are an easy and inexpensive method for establishing network connectivity between multiple computers. In the Ad Hoc mode, you can use the function supported by Microsoft Network, such as File and Print Sharing to exchange files and share a printer or other peripheral devices. To use the Ad Hoc Mode, you must set the same SSID and the same encryption key for all the computers that are connected. All connected computers can communi-
cate with each other within the communication range. Access Point (Infrastructure) Mode (See Figure 2) If a number of computers are connected simultaneously in the Ad Hoc mode, the transfer rate may be reduced, communications may become unstable, or the network 50 Ocampa_UG_Active B.book Page 51 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Figure 2. Access Point (Infrastructure) Mode Network Internet ADSL modem, cable modem, or similar Wired LAN Access Point*
Wireless LAN connection could fail. This is because all wireless LAN cards are using the same radio frequency in the network. To improve this situation, you can use a wireless LAN access point, which is sold separately. The wireless LAN network is in the Access Point mode when it uses an access point, and such a connection is called the Access Point Network or Infrastructure Network. By using an access point, you can set and use a different communication channel for each network group. Each channel is given a different radio frequency, and it eliminates the collision of communications and provides a more stable communications environment. How to Handle This Device The Integrated Wireless LAN device is already installed in your mobile computer. Under normal circumstances, it should not be necessary for you to remove or re-install it. The LAN has been configured to support the operating system with which your system shipped. FOR BETTER COMMUNICATIONS This personal computer may not operate properly due to the operating environment. Strictly observe the following precautions when installing the main unit of the computer:
The recommended wireless communications distance is within a line-of-sight radius of 25 meters. For rea-
sons related to the characteristics of the wireless LAN,
* An optional hub for a wired LAN may be required depending upon the type of access point used. however, the actual communications distance depends on the structure of the building in which the wireless LAN function is to be used, the presence/absence of obstructions, the types of software to be used, installa-
tion status, radio-wave status, or other operating con-
ditions. Decreases in communications speed or a communications failure may also occur. Distance the main unit of this personal computer is from other electric appliances. If the main unit of the person computer is installed near a powered-on electric appliance, the computer may not be able to communi-
cate properly or trouble may occur in the electric appli-
ance. If the computer is unable to communicate properly, change the channel to be used or the installation loca-
tion. During the use of a microwave oven or other equipment generating strong high-frequency energy, in particular, the personal computer may be highly sus-
ceptible to the energy and unable to communicate properly. If a broadcasting station or wireless communications equipment is present nearby and this prevents the com-
puter from communicating properly, moving the main unit of the computer is suggested. Radio interference may also occur if the intensity of ambient radio waves is too high. 51 Ocampa_UG_Active B.book Page 52 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Atheros Wireless LAN 1. Click [Start] --> [Control Panel] --> [Atheros Cli-
ent Utility]. The Atheros Wireless Configuration Utility window will be displayed. 2. Click the Wireless Networks tab. 3. Click the [Enable Radio] box to clear it, then click the [OK] button. Wireless communications on/off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, check the [Enable Radio] checkbox to select it., then click the
[OK] button. STARTING TRANSMISSION To communicate using the wireless LAN function, set the computer to a status from which it can transmit, as follows:
Intel PROSet Wireless LAN:
1. Set the wireless switch to the On position. 2. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 3. Click the [General] tab if it is not already selected. 4. Select [ON] for the Switch radio: function, then click [OK]. Wireless communications on/off switching will be activated and the transmission of radio waves will be restarted. Atheros Wireless LAN:
1. Click the Wireless Network Connection icon in the system tray at the lower right of your screen. 2. Click [Enable Radio]. The radio will be turned on. Access Point Mode: Transmission is enabled. Ad Hoc Mode: Restart your computer to enable the radio. STOPPING TRANSMISSION To use this product inside hospitals, clinics, or airplanes, or in other places where the use of electronic equipment is regulated, stop the transmission of radio waves from the wireless LAN beforehand. Deactivation using the wireless switch The transmission of radio waves from the wireless LAN can be stopped by setting the wireless switch to the Off position. Note that the Wireless LAN On/Off switch has no effect on non-Wireless LAN models.
(See Figure 3 for Wireless LAN switch location.) Wireless LAN On/Off Switch Figure 3. Wireless LAN On/Off Switch Deactivation using Windows Intel PROSet Wireless LAN:
1. Click [Start] --> [(All) Programs] --> [Intel Net-
work Adapters] --> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the General tab. 3. Select [Off] for the wireless communications Switch Radio: function, and then click the [OK]
button. Wireless communications on/off switching will be deactivated and the transmission of radio waves from the wireless LAN will be stopped. To restart transmission, select [On] for the wireless communications Switch Radio:
function, and then click the [OK] button. 52 Ocampa_UG_Active B.book Page 53 Monday, September 29, 2003 5:04 PM Connecting the WLAN FLOW OF OPERATIONS The wireless LAN connection procedure contained in this section is outlined below. 1. Make sure the mobile computer is ready for the transmission of radio waves from the wireless LAN. For further details, see (See Starting Transmission on page 52 for more information.). 2. Assign the parameters required for wireless LAN connection. (See Preparation for wireless LAN con-
nection on page 53 for more information.). Enter the network name (SSID) and other data. Enter the network key (the Wired Equivalent Privacy or WEP key used to encode 802.11b communications data). 3. Perform setting operations relating to network con-
nection. (See Connection to the network on page 55 for more information.) Specify TCP/IP as the protocol, and confirm the name of the work group and other settings. Enter the data required for file/printer sharing on the network. Perform this operation as required. For access point (or infrastructure) connection, enter data for the access point. Refer to the manual of the access point for further details. Verify that you are able to connect your computer to the network. PREPARATION FOR WIRELESS LAN CONNECTION This section explains the preparations required for the use of the wireless LAN. Assigning parameters Enter the network name (SSID), the network key, and other data required for wireless LAN connection. If there is the administrator of the network, contact the network administrator for data settings. W i r e l e s s L A N U s e r s G u i d e To use access point (infrastructure) con-
nection, refer to the access point manual for the access point-setting procedure. You do not need to set the channel when using access point (infrastructure) mode. Channel selection is controlled by the access point. In ad hoc networks, channel selection defaults to channel 11;
however, channel selection can be man-
ually changed if desired. This can be accomplished only when using the client utility. If it is necessary to change the channel, change the setting of the access point. For the setting procedure, refer to the manual of the access point. 1. Make sure the Wireless LAN switch is switched on. 2. Click the [Start] button first and then [Control Panel]. 3. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed instead.) 4. Double-click the Network Connections icon. A list of currently installed networks will be displayed. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. 6. Click the [Wireless Networks] tab. 7. Click [Refresh], then choose the correct SSID from the [Available Networks] window. Click [Config-
ure] and proceed to step 7. If the SSID of your access point does not appear in the list, click [Add]. The [Wireless Network Properties] window will be displayed. 8. 9. Select the Association tab if it is not already selected. Enter the information required for connection to the wireless LAN. a. Enter the network name (SSID). (i.e., Enter the name of the desired network in less than 33 ASCII characters). For ad hoc connection: Assign the same network name to all the personal computers to be connected. 53 Ocampa_UG_Active B.book Page 54 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x connected. For access point (infrastructure) connection:
Assign the identical network key that is pro-
grammed into the access point. For this set-
ting, refer to the access point manual or contact your network administrator. d. Confirm the Network key by re-entering the same data in the [Confirm network key:] field. e. Make sure that [Key index (advanced)] is set to 1. (Any value from 1 to 4 can be assigned to [Key index (advanced)]. 1 is usually assigned, however). 11. Click the [Authentication] tab and then verify the settings of [Enable network access control using IEEE 802.11x]. For internal use at an organization such as a com-
pany, when access by wireless LAN clients is to be limited using IEEE 802.11x authentication, check the [Enable network access control using IEEE 802.11x] check box. For home use, clear the check mark from [Enable network access control using IEEE 802.11x]. For the setting method relating to IEEE 802.11x authentication, refer to the manual of the access point which you are using. 12. After completion of setting operations, click the
[OK] button. Processing will return to the [Wire-
less Network Connection Properties] window. 13. Verify that the network name entered in step 7 above is added in [Preferred Networks], and then click the [OK] button. In [Preferred Networks], register only the desired connection settings. 14. Close the [Wireless Network] window. For access point (infrastructure) connection:
Assign the appropriate SSID. The SSID must be identical to the SSID of the access point. Refer to the access point manual, or contact your network administrator. b. For ad hoc connection, check the following field. For access point (infrastructure) connection, clear the check mark for the following field:
[This is a computer-to-computer (ad hoc) net-
work; wireless access points are not used.]
10. Enter the WEP key for encoding communications data. It is strongly recommended that you enter the network key for encoding communications data. If the network key is not entered, since the network can be accessed from all personal computers containing the wireless LAN function, there is the danger of your data being stolen or damaged by other users. a. Check the [Data encryption (WEP enabled)]
check box For ad hoc connection: Clear the check mark from the [Network Authentication (Shared mode)] check box. For access point (infrastructure) connection: If the access point to be accessed has acquired shared-key authentication, check the [Network Authentication (Shared mode)] check box. For open-system authentication, clear the check mark. For access point setting, refer to the man-
ual of the access point. b. Clear the check mark from the [The key is provided for me automatically] check box. c. Enter data in [Network Key]. Depending on the number of entered characters or digits, whether the key is an ASCII character code or a hexadec-
imal code will be identified automatically. Use five or thirteen characters to enter the key in the ASCII character code format. The char-
acters that can be used as the network key are as follows: 0 - 9, A - Z, _ (underscore), or, Use 10 or 26 characters to enter the key in the hexadecimal character code format. The char-
acters that can be used as the network key in this case are as follows: 0- 9, A - Z, a - f For ad hoc connection: Assign the same net-
work key to all the personal computers to be 54 Ocampa_UG_Active B.book Page 55 Monday, September 29, 2003 5:04 PM CONNECTION TO THE NETWORK This section explains connection to the network. Following this operation, confirm the names of the computer and the workgroup as follows. W i r e l e s s L A N U s e r s G u i d e If there is an administrator of the network, contact the network administrator for data settings. Setting the network Perform the Setting TCP/IP and Confirming the computer and work group names operations required for network connection. Setting TCP/IP To change the setting of the IP address, you need to be logged in from Windows as an administrator. 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. 5. Click the [General] tab if it is not already selected. 6. Click [Internet Protocol (TCP/IP] and then click
[Properties]. The [Internet Protocol (TCP/IP) Properties] window will be displayed. 7. Set the IP address as follows:
For ad hoc connection: Select [Use the following IP address:] and then enter data for [IP address]
and [Subnet mask]. See page 64 for IP address setting. For access point (infrastructure) connection: If your network uses DHCP, select [Obtain an IP address automatically] and [Obtain DNS server address automatically]. If your network uses static IP addresses, consult with your network adminis-
trator for the correct IP address settings. 8. Click the [OK] button. Processing will return to the
[Wireless Network Connection Properties] window. 9. Click the [OK] button. 10. Close the [Network Connection] window. Confirming the computer and work group names To modify the computer name and/or the work group name, you need to be logged in from Windows as an administrator. 1. Click the [Start] button, then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click the [System] icon. The [System Prop-
erties] window will be displayed. 4. Click the [Computer Name] tab. 5. Confirm the settings of [Full computer name:] and
[Workgroup:]. a. The setting of [Full computer name:] denotes the name for identifying the computer. Any name can be assigned for each personal computer. To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen. Enter the desired name in less than 15 ASCII character code format. Identifiability can be enhanced by entering the model number, the user name, and other factors. b. [Workgroup name] is the group name of the network. Enter the desired name in less than 15 ASCII character code format. For ad hoc connection: Assign the same network name to all personal computers existing on the network. For access point (infrastructure) connection:
Assign the name of the work group to be accessed. 6. Click the [OK] button. If a message is displayed that requests you to restart the personal computer, click [Yes] to restart the computer. Setting the sharing function Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid. 55 Ocampa_UG_Active B.book Page 56 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x This operation is not required unless the sharing func-
tion is to be used. The folder and printer for which the sharing function has been set will be usable from any personal computer present on the network. 2. Double-click [Local disk (C:)]. 3. Right-click the work folder (or whichever folder you want to share), and then click [Sharing and Security...] in the menu displayed. The [Folder Name Properties] window will be displayed. To share a file and/or the connected printer, you need to be logged in as an administrator. Setting the Microsoft network-sharing service 1. Click the [Start] button first and then [Control Panel]. 2. If the Control Panel is in Category view, switch to Classic view by clicking Switch to Classic View under Control Panel the left frame. (If you are already in Classic view, Switch to Category View will be displayed.) 3. Double-click [Network Connections]. A list of cur-
rently installed networks will be displayed. 4. 5. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis-
played. The [Wireless Network Connection Proper-
ties] window will be displayed. If [File and Printer Sharing for Microsoft Net-
works] is displayed, proceed to step 6. If [File and Printer Sharing for Microsoft Networks] is not dis-
played, skip to step 7. 6. Make sure that the [File and Printer Sharing for Microsoft Networks] check box is checked, and then click the [OK] button. Skip to Setting file-
sharing function. 7. Click [Install]. The [Select Network Component Type] window will be displayed. 8. Click [Service], then click the [Add] button. The
[Select Network Service] window will be displayed. 9. Click [File and Printer Sharing for Microsoft Net-
works] and then click the [OK] button. Processing will return to the [Wireless Network Connection Properties] window, and [File and Printer Sharing for Microsoft Networks] will be added to the list. 10. Click the [Close] button. Setting the file-sharing function The procedure for setting the file-sharing function follows, with the work folder in drive C: as an example. Setting the file-sharing function for the file which has been used to execute Network Setup Wizard is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the file-
sharing function easily without using Network Setup Wizard are given below. 4. Click [Sharing] if it isnt already selected. 5. Click the link stating If you understand the secu-
rity risks, but want to share files without running the wizard, click here. 6. Click Just enable file sharing and click [OK]. 7. Check the [Share this folder on the network] check box. To specify the corresponding folder as a read-only folder, select the [Read only]
checkbox under the General tab. 8. Click the [OK] button. The folder will be set as a sharable folder, and the display of the icon for the work. folder will change. Setting the printer-sharing function 1. Click the [Start] button first and then [Printers and FAX]. A list of connected printers will be displayed. 2. Right-click the printer for which the sharing func-
tion is to be set, and then click [Sharing] in the menu displayed. The property window correspond-
ing to the selected printer will be displayed. Setting the printer-sharing function when Network Setup Wizard has been executed is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the printer-sharing function without using Network Setup Wizard are laid down below. Click the [Start] button first and then [My Com-
puter]. 3. Click the [Sharing] tab. 4. Click [Share this printer]. 1. 56 Ocampa_UG_Active B.book Page 57 Monday, September 29, 2003 5:04 PM 5. Enter the sharing printer name in [Share name]. 6. Click the [OK] button. Confirming connection After you have finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure. In the case of access point (infrastructure) connection, enter the necessary data for the access point before confirming connection. Refer to the manual of the access point for the access point setup procedure. Connecting your personal computer to another personal computer 1. Click [Start] first and then [My Computer]. The
[My Computer] window will be displayed in the left frame. 2. Click [My Network Places] in the Other Places list. The window [My Network Places] will be dis-
played. 3. Click [View workgroup computers] under Network Tasks in the left frame. 4. Double-click the personal computer to which your personal computer is to be connected. The folder that was specified in Setting the file-sharing func-
tion on page 56 will be displayed. 5. Double-click the folder to be accessed. Confirming the status of the radio Intel PROSet Wireless LAN:
1. Click [Start] -> [All Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The [Intel(R) PROSet] window will be displayed. 2. Click the [General] tab and confirm radio status in the window displayed. The current connection sta-
tus will be displayed. Signal Quality The quality of the signals is displayed on a graph. Network name (SSID) The connected network name (SSID) is displayed. Profile name
<No profile> is displayed. Mode If access point (infrastructure) connection is in use, Infrastructure (AP) will be displayed. If ad W i r e l e s s L A N U s e r s G u i d e hoc connection is in use, Ad hoc (Peer-to-peer) will be displayed. Security The setting status of WEP is displayed. Speed The communications speed is displayed. Band (Frequency) The current operating frequency band is displayed. When communication is possible, 802.11b (2.4 GHz) is displayed. Channel The channel number currently being used for the communications is displayed. If connection cannot be made to the network or if you want to check for normal connection, see Trouble-
shooting on page 60. Atheros Wireless LAN:
1. Right-click the Atheros icon in the lower right cor-
ner of the screen. 2. Click [Open Client Utility]. The Atheros Wireless Configuration Utility window opens. 3. Contained within the Current Status tab and Advanced Current Status, you will find the current operating status of the radio. (When the radio is turned off or the computer is not yet connected, some of the conditions will not be displayed.) Profile Name The current configuration profile is displayed. Network Type - Configured Network Type
[Access Point] or [AdHoc] will be displayed. Current Mode Indicates the frequency and data rate currently used by the radio. Current Channel The channel number currently used by the radio. Link Status Displays the current connected state of the WLAN module. Encryption Type Displays the encryption type currently used by the radio. IP Address Displays the current TCP/IP address assigned to the WLAN adapter. Country The country with the country code for which the radio is configured. 57 Ocampa_UG_Active B.book Page 58 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Transmit Power Level Displays the current transmit power level of the radio. Network Name (SSID) Displays the Network Name (SSID) currently used by the radio. Power Save Mode Displays the configured Power Save Mode currently used by the radio. [Off], [Normal], or
[Maximum] will be displayed. BSSID Displays the Basic Service Set Identifier. This is typically the MAC address of the Access Point or in the case of AdHoc networks, is a randomly generated MAC address. Frequency Displays the center frequency currently being used by the radio. Transmit Rate Displays the current data rate used by the radio to transmit data. Receive Rate Displays the current data rate used by the radio to receive data. 58 Ocampa_UG_Active B.book Page 59 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Other settings SETTING OF POWER-SAVING FUNCTION You can set the power-saving function of wireless LAN. Default setting is auto-setting. In case of using the power-
saving function, manually control the communication performance. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Ad hoc settings]. The [Ad hoc settings] window will be displayed. 4. Change channels during ad hoc connection by selecting a new channel from the drop down list. 3. Click the [Configure] button in [Power settings]. 5. Click [OK]. The [Power settings] window will be displayed. Atheros Wireless LAN:
4. Select [Manual], and adjust the bar to set the power-
saving function. 1. Click on the My Computer icon. Select [View sys-
tem information] from the left frame. 2. Select the Hardware tab and click [Device Manager]. 3. Double-click Atheros BCM4306 Wireless LAN Adapter under [Network Adapters]. 4. 5. In the Atheros BCM4306 Wireless LAN Adapter window, select the Advanced tab. Select IBSS Channel Number from the list, and change the value from the [Value:] dropdown list to the desired channel. 6. Click [OK]. Setting of transmission power during ad hoc connection By controlling the transmission power during ad hoc connection, you can broaden or narrow the communica-
tion range. This setting is only effective during ad hoc connection. It will be ineffective during access point connection. Intel PROSet Wireless LAN:
1. Click [Start] -> [(All) Programs] -> [Intel Network Adapters] -> [Intel(R) PROSet]. The Intel(R) PROSet window will be displayed. 2. Click the [Adapter] tab. 3. Click the [Configure] button in [Power settings]. The [Power settings] window will be displayed. 4. Adjust the Transmission Power (Ad Hoc) bar to set the transmission power. Setting of channels during ad hoc connection You can set channels during ad hoc connection. Channel 11 is set by default. When connecting to an existing ad hoc network, no channel setting will be effective. This setting is only effective during ad hoc connection; it will be ineffective during access point connection. When changing channels during ad hoc connection, change the channel settings of all connected computers with the same Network name (SSID) at the same time. After changing the channels, turn off all computers and -- after they are all turned off -- turn them back on. 59 Ocampa_UG_Active B.book Page 60 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Troubleshooting Causes and countermeasures for troubles you may encounter while using your wireless LAN are described in the following table. Problem Possible Cause Possible Solution Unavailable network connection Incorrect network name (SSID) or network key Ad hoc connection: verify that the network names (SSIDs) and network keys (WEP) of all computers to be connected have been configured correctly. SSIDs and WEP key values must be identical on each machine. Access Point (Infrastructure) connection: set the network name (SSID) and network key to the same values as those of the access point. Set the Network Authentication value identically to that of the Access Point. Please consult your network administrator for this value, if necessary. For the method of setting network authentication, refer to the following pages: Assigning parameters on page 53 Poor radio wave condition Ad hoc connection: Retry connection after shortening the distance to the destination computer or removing any obstacles for better sight. Access Point (Infrastructure) connection: Retry connection after short-
ening the distance to the access point or removing any obstacles for better sight. To check the wave condition, refer to the following pages: Confirming the status of the radio waves on page 57. Radio wave transmission has stopped Check if the wireless switch is turned ON. Also verify Disable Radio is not checked in Network setting window. Refer to Starting Transmis-
sion on page 52. The computer to be connected is turned off Active channel duplication due to multiple wireless LAN networks No right of access to the network to be connected Incorrectly-
performed network setting Unmatched
[Network authentication
(shared mode)]
settings in Windows XP Check if the computer to be connected is turned ON. If there is any other wireless LAN network nearby, change channels to avoid active channel duplication. For the method of checking active channels, refer to the following pages: Confirming the status of the radio waves on page 57 Check if you have a right of access to the network to be connected with. Check the protocol, work group name or shared setting. For the method of checking, refer to the following pages: Connection to the Network on page 55. If the setting of [Network authentication (shared mode)] is not matched with that of access point or computer to be connected with, no commu-
nication can be established. Check the parameter setting.Refer to Assigning parameters on page 53. 60 Ocampa_UG_Active B.book Page 61 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Problem Possible Cause Possible Solution Unavailable network connection
(continued) It takes too long to retrieve the network and display the connected computers. Retrieve computers as follow:
1. Click [Start] button, then click [Search]. 2. Click [Computers or people]. 3. Click [Computers on the network]. 4. Input the name of computer to be connected with in [Computer name] and click [Search]. 5. Double-click the icon of connected computer. Incorrect setting of IP address Check the network setting. Setting the network on page 55. In case of using TCP/IP protocol, you can check IP address as follows:
1. 2. Click [Start] -> [All programs] -> [Accessories] ->
[Command prompt]. In [Command prompt] or [MS-DOS prompt] window, input
[IPCONFIG] command as follows, then press [Enter] key. Example: In case of C drive being the hard disk:
C:\ipconfig [Enter]
Check that the IP address is correctly displayed:. IP Address................: 10.0.1.3 Subnet Mask.............: 255.255.255.0 Default Gateway.........: 10.0.1.1 When IP address is displayed as [169.254.XXX.YYY] or [0.0.0.0], IP address is not correctly fetched from the access point. In that case, restart the computer itself. If the display is still unchanged, check the setting of TCP/IP. If [Cable Disconnected] or [Media Disconnected] is displayed without showing IP address, check the setting of network name
(SSID) and network key. Also, set the network authentication according to the access point. Communication is disconnected soon after connection to the access point Access control may be disabled Check the setting of Enable network access control using IEEE 802.1X.Refer to Assigning parameters on page 53. When restricting the access of wireless LAN clients using IEEE802.1X authentication, put a check mark on Enable network access control using IEEE 802.1X. When using at home, remove a check mark on Enable network access control using IEEE802.1X. For the method of setting related with IEEE802.1X authentication, refer to the access point manual. 61 Ocampa_UG_Active B.book Page 62 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x Wireless LAN Glossary Ad hoc A designation for wireless LAN network configuration. It indicates a form of communication limited to those personal computers which have wireless LAN function. For details, refer to Ad hoc connection on page 50. Channel The frequency band of wireless LAN to be used in communications over wireless LAN or at the access point. DHCP (Dynamic Host Configuration Protocol) A protocol used for automatically fetching communica-
tion parameters such as IP addresses. The side which assigns IP address is called DHCP server and the side that is assigned it is called DHCP client. DNS (Domain Name System) A function that controls the correspondence of IP addresses assigned to a computer with the name. Even for those computers whose IP addresses are unknown, if their names are known, it is possible to communicate with them. IEEE802.11a One of the wireless LAN standards prescribed by the 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Electronic Engineers). It allows communications at the maximum speed of 54 Mbps by using a 5GHz band which can freely be used without radio communication license. IEEE802.11b One of the wireless LAN standards prescribed by 802 committee in charge of establishing standards of LAN technology in IEEE (Institute of Electrical and Electronic Engineers). It allows communications at the maximum speed of 11Mbps by a band of 2.4 GHz (ISM band) which can freely be used without radio communication license. Access point A designation of Wireless LAN network configurations. It indicates a form of communication using an Access Point. For details, refer to access point connection on page 50. IP address An address used by computers for communicating in TCP/IP environment. IP addresses have global and private addresses. A global address is a unique address in 62 the world. A private address is a unique address within a closed network. LAN (Local Area Network) An environment connecting computers within a rela-
tively small range, such as the same floor and building. MAC address (Media Access Control Address) A physical address inherent to a network card. For Ethernet, the top three bytes are controlled/assigned as a vendor code. The remaining three bytes comprise the code uniquely (to avoid duplication) controlled by each vendor. As a result, there is no Ethernet card with the same physical address in the world. In Ethernet, the frame transmission/reception is performed based on this address. MTU (Maximum Transmission Unit) The maximum size of data which can be transmitted at one time in networks including the Internet. In an envi-
ronment whose maximum size of data is too large to correctly receive data, normal communications can be restored by setting the size of MTU to a smaller value. Network authentication The method of authentication performed by wireless LAN clients to connect with the access point. There are two types: open system authentication and shared key authentication. The type of authentication must be set to each client and also coincide with the setting of access point with which to communicate. Network authentica-
tion is sometimes called authentication mode. Network key Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication. Network name (SSID: Security Set Identifier) When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with Network name (SSID). In order to improve security, the network key is set allowing no communication unless Network name
(SSID) coincides with the network key. Open system authentication One of network authentication types for wireless LAN. Since there is no check of network key upon authentica-
tion, clients can connect to the access point without Ocampa_UG_Active B.book Page 63 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e submitting correct network keys. However, in case of actual communications, the same network key must be set. Open system authentication is sometimes called Open key authentication. PPPoE (Point to Point Protocol over Ethernet) A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet. Protocol A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into procedures. Shared key authentication One of the network authentication types for wireless LAN. Upon authentication, the access point checks whether the same network key is set to the client. If the client uses a wrong network key or the network key itself is not set, authentication is unsuccessful, allowing no communications with the access point. SSID (Security Set Identifier) See Network name Subnet mask TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other. TCP/IP (Transmission Control Protocol/Internet Protocol) A standard protocol of the Internet. Wi-Fi Indicates that the interconnectivity test of the organiza-
tion which guarantees the compatible connection of wireless LAN (Wi-Fi Alliance) has been passed. 63 Ocampa_UG_Active B.book Page 64 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x IP address information IP addressing is much more complicated than can be briefly explained in this document. You are advised to consult with your network administrator for additional information. If IP address is unknown, set IP address as follows:
If you have an access point (DHCP server) on the network, set the IP address as follows:
[Obtain an IP address automatically]
A DHCP server is a server that automatically assigns IP addresses to computers or other devices in the network. There is no DHCP server for the AdHoc network. If the IP address is already assigned to the computer in the network, ask the network administrator to check the IP address to be set for the computer. If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255. Set the each computer as follows: The value in paren-
theses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0) Computer B: 192.168.100.3 (255.255.255.0) Computer C: 192.168.100.4 (255.255.255.0)
Computer X: 192.168.100.254 (255.255.255.0) 64 Ocampa_UG_Active B.book Page 65 Monday, September 29, 2003 5:04 PM W i r e l e s s L A N U s e r s G u i d e Specifications Type of network Transfer rate Active frequency Number of channels Security Item Specification Conforms to IEEE 802.11a/802.11g (Wi-Fi based)*
(Automatic switching) 54 Mbps maximum data rate 802.11b/g: 2400~2473 MHz 802.11a: 4900 ~ 5850 MHz 802.11a: 8 independent channels 802.11b/g: 11 channels, 3 non-overlapping channels Network name (SSID) Network key (64 bits/128 bits)**
WPA 1.0 compliant Supports AES, TKIP, and WEP encryption algorithms Maximum recommended number of computers to be connected over wireless LAN (during ad hoc connection) 10 units or less ***
* Wi-Fi based indicates that the interconnectivity test of the organization which guarantees the interconnectivity of wireless LAN (Wi-Fi Alliance) has been passed.
** Encryption with network key (WEP) is performed using the above number of bits, however, users can set 40 bits/104 bits after subtracting the fixed length of 24 bits.
*** The maximum number of computers that can be supported by an Access Point is highly variable, and can be affected by such factors as application bandwidth utilization, broadcast packet traffic, type of applications used, etc. The number of 10 provided by this document is meant only as a guideline and not a limitation of the technology. 65 Ocampa_UG_Active B.book Page 66 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r s G u i d e A p p e n d i x 66 Ocampa_UG_Active B.book Page 67 Monday, September 29, 2003 5:04 PM I n d e x Index A adjusting the display brightness . 24 air flow vents . 5 application buttons . 3 application A . 11 application B . 11 Ctl-Alt-Del button . 10 display mode button . 10 EMail . 10 Enter button . 11 Escape button . 11 Function button . 11 Internet . 10 orientation button . 10 tertiary functions . 13, 14 B battery gauge . 26 battery gauge icon . 23 cleaning the display screen . 32 configuring peripherals interface . 33 connectors and peripheral interfaces . 17 conserving battery power . 27 conventions used in the guide . v critically low battery level . 23 cursor not tracking pen . 32 D DC input connector . 17 DC power connector . 6 DIMM card, removing . 28 DISE . 33 display screen is blank . 32 screen, cleaning . 32 battery icon . 9 Drive Image Special Edition (DISE) . 33 battery pack charging . 26 charging times . 26 critically low level . 23 low-battery warning . 23 no memory effect . 26 overcharge protection . 26 removing and installing . 26 will not begin charging . 26 battery power conserving . 27 used in suspend-to-RAM mode . 23 battery release latch . 4, 18 BIOS . 13 application buttons, for . 13, 14 Drivers and Application Restore CD . 34 E Enlarging the Backup Partition . 34 external monitor connector . 6 F Fujitsu contact information . v Fujitsu online . v H hard disk drive access icon . 9 HDD cover . 4 bridge battery . 27 headphone . 6 built-in microphone . 3 headphone jack . 17 C calibrating the pen . 25 care and maintenance . 31 charge/DC input icon . 8 charging the battery pack . 26 Hibernate (Save-to-Disk) mode . 23, 24 Hibernate mode . 21 I idle state . 21 67 Ocampa_UG_Active B.book Page 68 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C IEEE 1394 jack . 6, 18 infrared data transfer not working . 32 infrared keyboard port . 3, 7 infrared keyboard/mouse port . 17 interfaces connectors and peripherals . 17 IrDA port . 3 IrDA/FIR port . 17 K Kensington lock . 6, 18 L LAN jack . 6 LifeBook Security Application Panel operating . 15 passwords . 14 uninstalling . 15 P page up/page down . 18 PC card slot . 5, 17, 27 pen . 5, 7 installing a pen tether . 25 not responding . 33 replacing the tip . 25 using . 24 pen tether . 25 peripheral connectors . 17 power icon . 8, 22 blinking . 22, 23 not displayed . 22 power on/suspend/resume button . 3 power usage . 21 powering up the pen tablet . 22 Preparation for wireless LAN connection (XP) . 53 Local Area Network (LAN) . 18 problems, solving . 32 low-battery warning . 23 protecting the display screen . 31 M memory cover . 4 R Re-Installing Individual Drivers and Applications . 34 memory module . 28 removable battery pack . 4 microphone . 6 removing a DIMM card . 28 microphone jack . 17 Restoring a Backup Image . 34 modem . 17 connection . 27 port . 6 N navigation buttons . 3, 12 O Off state . 21, 22 optional accessories . 2 additional accessories . 2 carrying cases . 2 docking options . 2 memory . 2 power options . 2 storage options . 2 overheating, avoiding . 32 68 resuming system operation . 24, 32 RJ-45 . 18 S Save-to-Disk mode . 21 Setting up LifeBook Security Panel . 14 shutting down the system . 22 solving problems . 32 speaker . 3 speaker/headphone volume too low . 33 status display . 8 battery icon . 9 charge/DC input icon . 8 hard disk drive access icon . 9 power icon, blinking . 22 power icon, system states indicated by . 8, 22 storing the system unit . 32 Ocampa_UG_Active B.book Page 69 Monday, September 29, 2003 5:04 PM Stylistic ST4000 care and maintenance . 31 features . 3, 4, 5, 6, 7 items included with . 1 storing . 32 Stylistic ST4000 specifications additional . 40 agency approval . 40 display specifications . 39 environmental . 40 physical specifications . 39, 40 power . 40 suspend mode, determining . 23 Suspend/Resume disabled . 23 Suspend/Resume button . 18 suspending system operation . 22 Suspend-to-RAM . 21 mode . 23, 24 system interface connector . 4 system states . 21, 22 Hibernate (Save-to-Disk) . 21 Idle state . 21 Off state . 21 On state . 21 Suspend-to-RAM . 21 system status LEDs . 3 system will not resume operation . 32 T Tablet Dock latch point . 4 Tablet Dock port . 17 I n d e x thermal suede . 4 troubleshooting . 32 turning off the system . 22 U Universal Serial Bus . 6 USB port . 17 USB ports . 6 Using . 21 using the pen . 24 W warranty information . v Windows XP Tablet PC Edition . v, 1 Wireless LAN Ad Hoc Mode . 50 Broadcom Wireless LAN . 50 Connection using Windows XP . 53 For better communications . 51 Infrastructure Mode . 50 Intel PROSet Wireless LAN . 50 IP address information . 64 Other settings . 59 Setting of power-saving function . 59 Specifications . 65 Starting Transmission . 52 Stopping transmission . 52 Troubleshooting . 60 Wireless LAN Glossary . 62 wireless LAN . 4 before using . 50 characteristics . 50 tertiary functions of application buttons . 13, 14 wireless LAN on/off switch . 4, 18 69 Ocampa_UG_Active B.book Page 70 Monday, September 29, 2003 5:04 PM S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C 70
1 | User Manual Part2 | Users Manual | 11.89 KiB |
Appendix B Regulatory Compliance FCC Part 15 Declaration of Conformity (DoC) The following equipment:
Product Name: Wireless LAN Card is herewith confirmed to comply with the requirements of FCC Part 15 rules. The operation is subject to the following two conditions:
1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause undesired operation. FCC Rules and Regulations - Part 15 Warning: This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the Federal Communications Commissions Rules and Regulation. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
Relocate your WLAN equipped laptop computer. Increase the separation between the WLAN equipped laptop computer and other electronics. Connect the WLAN equipped laptop computer into an outlet on a circuit different from that of other electronics. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The RF ransmission power from the antenna conforms to the general public FCC limit of SAR(Specific Absorption Rate), 1.6W/kg. The maximum SAR value measured from this device was 0.36 W/kg. This device must not be co-located or operating in conjunction with any other antenna or transmitter. Canadian Notice To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing."
WARRANTY Users are not authorised to modify this product. Any modifications invalidate the Warranty. This equipment may not be modified, altered or changed in any way without signed written permission From Fujitsu. Unauthorised modification will void the equipment authorisation from the FCC and Industry Canada and the warranty.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2003-10-24 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2003-10-24
|
||||
1 | Applicant's complete, legal business name |
Fujitsu Client Computing Limited (FCCL)
|
||||
1 | FCC Registration Number (FRN) |
0009379173
|
||||
1 | Physical Address |
1-1, Kamikodanaka 4-chome
|
||||
1 |
Nakahara-ku, Kawasaki, N/A 211-8588
|
|||||
1 |
Japan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@curtis-straus.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
EJE
|
||||
1 | Equipment Product Code |
WL0003
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
M****** U****
|
||||
1 | Title |
Engineer
|
||||
1 | Telephone Number |
+81-4********
|
||||
1 | Fax Number |
+81-4********
|
||||
1 |
u******@jp.fujitsu.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Pentablet PC ST5010 | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Grant conditions: Power listed is conducted. The transmitter in the Tablet PC is to be installed only by the Grantee. Only the antenna documented in this filing, installed in the manner specified, can be used with this device. The antenna must not be co-located or operating in conjunction with any other antenna or transmitter during customer usage. End-users must be provided with operating instructions for satisfying RF exposure compliance requirements. The highest reported SAR value is 0.363 W/kg. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Lexmark International, Inc.
|
||||
1 | Name |
J******** F****
|
||||
1 | Telephone Number |
859-2********
|
||||
1 | Fax Number |
859-2********
|
||||
1 |
f******@lexmark.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.0210000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC