all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Users Manual CA27 | Users Manual | 1.15 MiB | ||||
1 |
|
Users Manual LAN Card | Users Manual | 279.70 KiB | ||||
1 | Cover Letter(s) | |||||||
1 | Cover Letter(s) | |||||||
1 | External Photos | |||||||
1 | Internal Photos | |||||||
1 | Internal Photos | |||||||
1 | ID Label/Location Info | |||||||
1 | RF Exposure Info | |||||||
1 | RF Exposure Info | |||||||
1 | Test Report | |||||||
1 | Test Report | |||||||
1 | Test Setup Photos |
1 | Users Manual CA27 | Users Manual | 1.15 MiB |
CA-27 Operation Manual MITAC Technology Corporation
(April 2004) TRADEMARKS All brand and product names are trademarks or registered trademarks of their respective companies. NOTE Information in this manual is subject to change without notice. Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, (example - use only shielded interface cables when connecting to computer or peripheral devices) any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This transmitter must not be co -located or operating in conjunction with any other antenna or transmitter. Regulations Information Class B Regulations USA Federal Communications Commission Radio Frequency Interference Statement NOTE:
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
? Reorient or relocate the receiving antenna.
? Increase the separation between the equipment and receiver.
? Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
? Consult the dealer or an experienced radio/TV technician for help. Any changes or modifications not expressly approved by the manufacturer could void the users authority to operate the equipment. Please note:
The use of a non-shielded interface cable with this equipment is prohibited. Canada Canadian Department of Communications Radio Interference Regulations Class B Compliance Notice This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Le prsent appareil numrique nmet pas de bruits radiolectriques dpassant les limites applicables aux appareils numriques de la classe B prescrites dans le Rglement sur le brouillage radiolectrique dict par le ministre des Communications du Canada. About the Battery Caution Texts Concerning Lithium Batteries DANISH ADVARSEL!
Lithiumbatteri Eksplosionsfare ved fejlagtig hndtering. Udskiftning m kun ske med batteri af samme fabrikat og type. Levr det brugte batteri tilbage til leverandren. NORWEGIAN ADVARSEL:
Eksplosjonsfare ved feilaktig skifte av batteri. Benytt samme batteritype eller en tilsvarende type anbefalt av apparatfabrikanten. Brukte batterier kasseres i henhold til fabrikantens instruksjoner. SWEDISH VARNING:
Explosionsfara vid felaktigt batteribyte. Anvnd samma batterityp eller en ekvivalent typ som rekommenderas av apparattillverkaren. Kassera anvnt batteri enligt fabrikantens instruktion. FINNISH VAROITUS:
Paristo voi rjht, jos se on virheellisesti asennettu. Vaihda paristo ainoastaan valmistajan suosittelemaan tyyppiin. Hvit kytetty paristo valmistajan ohjeiden mukaisesti. ENGLISH CAUTION:
Danger of explosion if battery is incorrectly replaced. Replace only with the same or equivalent type recommended by the equipment manufacturer. Discard used batteries according to manufacturer's instructions. VORSICHT:
Explosionsgefahr bei unsachgemem Austausch der Batterie. Ersatz nur durch denselben DEUTSCH oder einen vom Hersteller empfohlenen gleich-wertigen Typ. Entsorgung gebrauchter Batterien nach Angaben des Herstellers. FRENCH ATTENTION:
II y a danger dexplosion sil y a remplacement incorrect de la batterie. Remplacer uniquement avec une batterie du mme type ou dun type quivalent recommand par le constructeur. Mettre au rebut les batteries usages conformment aux instructions du fabricant. Attention (for USA Users) The product that you have purchased contains a rechargeable battery. The battery is recyclable. At the end of its useful life, under various state and local laws, it may be illegal to dispose of this battery into the municipal waste stream. Check with your local solid waste officials for details in your area for recycling options or proper disposal. About the Modem Caution 1. Never install telephone wiring during a lightning storm. 2. Never install telephone jacks in wet locations unless the jack is specifically designed for wet locations. 3. Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface. 4. Use caution when installing or modifying telephone lines. 5. Avoid using the telephone function during an electrical storm. There may be a remote risk of electric shock from lightning. 6. Do not use the telephone function to report a gas leak in the vicinity of the leak. Caution (for USA Users) To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Table of Contents Preface .................................................................................................. v Chapter 1 Getting Started............................................................1-1 Getting the Computer Running.............................................1-2 Unpacking.....................................................................1-2 Before You Begin .........................................................1-3 Connecting to AC Power ...............................................1-4 Positioning the Tablet PC...............................................1-5 Using the Wireless Keyboard (option).............................1-6 Turning On and Off the Computer..................................1-7 Taking a Look at the Computer............................................1-9 Right-side Components ..................................................1-9 Left-side Components.................................................. 1-10 Rear Components........................................................ 1-11 Front Components ....................................................... 1-12 Bottom-side Components ............................................. 1-14 Where to Go from Here .................................................... 1-15 Chapter 2 Operating Your Tablet PC ........................................2-1 Starting and Stopping the Computer......................................2-2 Starting the Computer....................................................2-2 i Stopping the Computer................................................... 2-2 Using the Wireless Keyboard (option).................................. 2-4 Mouse-control Buttons................................................... 2-4 Typewriter Keys ........................................................... 2-5 Cursor-control Keys ...................................................... 2-5 Numeric Keypad........................................................... 2-6 Euro Symbol................................................................. 2-6 Windows Keys.............................................................. 2-7 Function Keys............................................................... 2-7 Using the Touchscreen ....................................................... 2-8 Configuring the Touchscreen.......................................... 2-9 Using the Floppy Disk Drive (option) ................................. 2-10 Connecting the Floppy Disk Drive ................................ 2-10 Inserting and Ejecting Floppy Disks .............................. 2-12 Using the Hard Disk Drive................................................ 2-13 Using the CD/DVD Drive (option) .................................... 2-14 Connecting the CD/DVD Drive ................................... 2-14 Inserting and Removing a CD ...................................... 2-15 Using the Video Features.................................................. 2-17 Configuring the Display Modes..................................... 2-17 Using the Audio Features.................................................. 2-20 Connecting Audio Devices........................................... 2-21 Using the Communication Features.................................... 2-22 Using the Modem........................................................ 2-22 Chapter 3 Managing Power ........................................................3-1 AC and Car Adapter .......................................................... 3-2 Battery Pack...................................................................... 3-3 Charging the Battery Pack............................................. 3-3 Initializing the Battery Pack............................................ 3-4 Checking the Battery Level............................................ 3-4 Replacing the Secondary Battery Pack........................... 3-5 ii Battery Low Signals and Actions....................................3-6 Power Management............................................................3-8 Suspend-to-Disk (Suspend mode) ...................................3-8 Power-Saving Tips............................................................ 3-10 Chapter 4 Expanding Your Computer......................................4-1 Connecting a Serial Device..................................................4-2 Connecting a USB Device...................................................4-3 Connecting an IR Device ....................................................4-5 Using PC Cards..................................................................4-7 ZV and CardBus Support...............................................4-7 Inserting and Removing a PC Card.................................4-7 System Memory Upgrade....................................................4-9 Chapter 5 SCU (Setup Configuration Utility) ..........................5-1 When and How to Use the SCU Program............................5-2 When to Use.................................................................5-2 Starting SCU.................................................................5-2 Moving Around and Making Selections ...........................5-4 Main Menu.........................................................................5-5 Advanced Menu .................................................................5-8 Security Menu.................................................................. 5-15 Power Menu .................................................................... 5-18 Exit Menu ........................................................................ 5-22 Chapter 6 Installing Software Drivers.......................................6-1 How to Use the CD............................................................6-2 Installing Drivers for Windows 98........................................6-4 Touchscreen Driver.......................................................6-5 Installing Drivers for Windows 2000.....................................6-6 Touchscreen Driver.......................................................6-7 Installing Drivers/Utility for Windows NT 4.0.......................6-9 Touchscreen Driver..................................................... 6-10 iii Modem Driver ............................................................ 6-10 Other Drivers and Utilities................................................. 6-12 OVMAKFIL Utility..................................................... 6-12 Chapter 7 Caring for the Tablet PC...........................................7-1 Protecting the Computer ..................................................... 7-2 Using the Password....................................................... 7-2 Using an Anti-Virus Strategy ......................................... 7-2 Taking Care of the Tablet PC.............................................. 7-3 Location Guidelines ....................................................... 7-3 General Guidelines......................................................... 7-3 Cleaning Guidelines ....................................................... 7-4 Battery Pack Guidelines................................................. 7-4 When Traveling.................................................................. 7-5 Chapter 8 Troubleshooting.........................................................8-1 Preliminary Checklist.......................................................... 8-2 Solving Common Problems.................................................. 8-3 Battery Problems .......................................................... 8-4 CD/DVD Drive Problems.............................................. 8-4 Display Problems .......................................................... 8-5 Floppy Disk Drive Problems........................................... 8-7 Hardware Device Problems ........................................... 8-8 Hard Disk Drive Problems............................................. 8-8 Infrared Problems ......................................................... 8-9 Keyboard and Mouse Problems...................................... 8-9 LAN Problems............................................................ 8-10 Modem Problems ........................................................ 8-10 PC Card Problems ...................................................... 8-11 Power Management Problems (for Windows)............... 8-11 Printer Problems ......................................................... 8-12 Software Problems...................................................... 8-12 Sound Problems .......................................................... 8-13 iv Startup Problems ......................................................... 8-13 Other Problems ........................................................... 8-14 Resetting the Computer..................................................... 8-15 Appendix A Specifications.......................................................... A-1 v Preface This manual contains information that will help you operate the computer. It is divided into 8 chapters and an appendix.
?? Chapter 1, Getting Started, takes you through the process of setting up the computer and identifying its external components.
?? Chapter 2, Operating Your Computer, tells you how to use the computers components and features.
?? Chapter 3, Managing Power, provides information on power.
?? Chapter 4, Expanding Your Computer, provides information on installing and using peripheral devices.
?? Chapter 5, SCU (Setup Configuration Utility), describes the SCU program that configures the computers BIOS settings.
?? Chapter 6, Installing Software Drivers , describes how to install the drivers and utilities supplied with the computer.
?? Chapter 7, Caring for the Computer, gives you tips in care and maintenance.
?? Chapter 8, Troubleshooting, gives solutions to common problems you may encounter when using the computer.
?? Appendix A, Specifications , gives a brief specification of the computer. vi Notational Conventions Throughout this manual, the following conventions are used to distinguish elements of text. NOTE: identifies additional information that requires special attention. CAUTION: identifies important information which, if not followed, may result in loss of data or damage to the computer. Keyboard keys are shown in a bold typeset. For example:
Press Enter to complete. When keys are joined by a plus sign (+), press the first key, and, while keeping the first key down, press the remaining keys, finally release all the keys. When necessary, keys are also shown in graphics. A title, command, setup item, or button that you can see on the screen is shown in boldface. A value or an option that you can select for a setup item is shown in italic. For example:
Select Power Management, set it to Enabled, and then click the OK button. vii CHAPTER 1 Getting Started Congratulations on purchasing this Tablet PC. This hand-held computer, having no fan and being almost noiseless, is especially designed for the practical applications of warehouses, automobiles, vehicles, public security, repairing, assisting the handicapped, and other demanding situations where conventional notebook computers just cannot measure up. This chapter first tells you step by step how to get the computer up and running. You will find instructions for these procedures:
?? Unpacking
?? Connecting to AC power
?? Turning on the computer
?? Turning off the computer Then, you will find a section briefly introducing the external components of the computer. And the last section navigates you to the information you may need after the computer is ready for use. Getting the Computer Running This section guides you through the procedures for getting the computer ready for operation. Unpacking After unpacking the shipping carton, you should find these standard items:
?? Tablet PC
?? Accessories:
Module-1: two serial I/O / RJ-45 / IEEE 1394 Module-2: wireless LAN (802.11B) Module-3: wireless modem (CDPD)
? AC adapter (100~240 VAC, 50~60 Hz)
? AC power cord (US, CE, UK, SA)
? Primary battery switch pin
? Driver CD
? X-Bay (optional):
? Expansion box (optional)
? Wireless keyboard (optional)
? Car adapter/charger (10.7~32 VDC) ? (optional)
? Secondary battery (optional)
? Battery charger for secondary battery (optional)
? Carrying bag (optional)
? CCD camera module (optional)
? This Operation Manual Port Replicator module: includes COM1/4, PIO1, CRT, two USB ports (connects behind USB hub, FDD bootable), PS/2 keyboard and mouse, MIC input, earphone out, CD-ROM and AC adapter input CD-ROM module: 24X TEAC CD-224E or better DVD-ROM module: 8X Pioneer K-11T or better USB FDD module: 1.44 MB double-sided high density 1-2 Inspect all the items. If any item is damaged or missing, notify your dealer immediately. Keep the shipping carton and packing materials in case you need to ship or store the computer in the future. Before You Begin To prevent depletion of the primary batterys power during transit, a switch is provided at the bottom-side of the Tablet PC. Be sure to turn the switch to the ON position when using the Tablet PC for the first time by using the included primary battery switch pin to slide the switch. NOTE: In case the Tablet PC will not be used for a long period of time and to prevent primary battery discharge, turn the switch to the OFF position. 1-3 Connecting to AC Power The computer operates either on the external AC power or internal battery power. It is suggested that you use AC power when you start up the computer for the first time. CAUTION: Use only the AC adapter included with your computer. Using other AC adapters may damage the computer. NOTE:
Power Supply Cord: (optional) Detachable, minimum 1.5 m long. Listed, rated minimum 125 V, 7 A, having a 2/18 AWG, type SVT flexible cord. One end terminates with a parallel blade, molded-on, attachments plug with a 7 A, 125 V (NEMA 1-15P) configuration; other end terminates with a molded-on appliance coupler. Alternate: (optional) Detachable, maximum 4.5 m (14.76 ft) long. Listed, rated minimum 250 V, 6 A, having a 3/18 AWG, type SVT flexible cord. One end terminates with a Tandem blade, grounding, listed molded-on, attachments plug with a 6 A, 250 V
(NEMA 6-15P) configuration; other end terminates with a molded-on appliance coupler. 1. Make sure the computer is turned off. 2. Plug the DC cord of the AC adapter to the power connector on the right-side of the computer (?). 3. Plug the female end of the AC power cord to the AC adapter and the male end to an electrical outlet (?). 1-4 4. When the AC adapter is connected, the indicator on the AC adapter lights up, indicating that power is being supplied from the electrical outlet to the AC adapter and onto your computer. Now, you are ready to turn on the computer. CAUTION:
?? When you disconnect the AC adapter, disconnect from the electrical outlet first and then from the computer. A reverse procedure may damage the AC adapter or the computer.
?? When unplugging the connector, always hold the plug head. Never pull on the cord. NOTE: When the AC adapter is connected, it also charges the battery pack. For information on using battery power, see Chapter 3. Positioning the Tablet PC The computer can be placed upright using its stand found at the back. To place the computer in an upright position, pull open the stand located at the back as shown on the next figure. NOTE: It is recommended that you operate the Tablet PC in an upright position as opposed to letting it lie flat on its back in order to provide adequate air ventilation. The wireless keyboard operates on four size-AA (1.5-volt) batteries on the battery compartment located at the back. Be sure to observe the correct polarity when inserting the batteries. NOTE: The condition of the batteries also affects the effectiveness of transmission. If a weakness in transmission is detected, try changing a set of new batteries. 1-5 Using the Wireless Keyboard (option) The wireless keyboard can either be placed flat on the table or inclined using its stand found at the back. To place the wireless keyboard in an upright position, pull open the stand located at the back as shown on the next figure. 1-6 Place the wireless keyboard in front of the Tablet PC with no obstructions between them to allow unhampered communication between the computer and keyboards IR port. NOTE: It is recommended that the transmission distance must not exceed 3 meters and that vertical transmission angle is within ? 150 while horizontal transmission angle is within ? 300. Turning On and Off the Computer Turning On 1. Make sure the computer is connected to AC power. 2. Press the power button
. 3. Each time the computer is turned on, it performs a Power-On Self Test (POST), and the operating system such as Windows should start. 1-7 Turning Off To turn off the computer power, use the Shut Down command of your operating system. NOTE: There are other ways you can stop the computer so that you will be back to where you left off when you next turn on the computer. (See Stopping the Computer in Chapter 2 for information.) CAUTION: If you have to turn the computer on again immediately after turning it off, wait for at least five seconds. Turning the computer off and on rapidly can damage it. 1-8 Taking a Look at the Computer This section identifies the external components of the computer and briefly describes the function of each component. Right-Side Components Ref Component
? Reset Button
? USB Port
? Microphone Connector Description See Also Allows you to reset the system. Connects a USB device, such as a USB floppy drive, printer, digital camera, joystick, and more. Connects an external microphone. P. 8-16 P. 4-7 P. 2-20 1-9 Description Ref Component
? Audio Output Connects a set of headphones, external speakers with amplifier, or an audio recording device. Connects a serial device, such as a mouse. Connector
? Serial Port
? Expansion Port For connecting to: Port Replicator, CD/DVD-ROM module , or USB FDD module. Connects the AC adapter. See Also P. 2-20 P. 4-6 P. 2-14, 4-2, 4-4 P. 1-3 Accepts a PC Card for additional functions. P. 4-10
? Power Connector
? PC Card Slot Left-Side Components 1-10 Description Component Ref
? X-Bay Interface Connects additional wireless LAN, wireless modem (CDPD), external monitor, or 4 ports
(COM1/4, IEEE 1394, and LAN). Connects an IrDA-compliant device for wireless data transfer. Connects the telephone line.
? IR Port
? RJ-11 Connector See Also P. 4-2 P. 1-5, 4-8 P. 2-21 Rear Components Description See Also Systems vertical angle of inclination after the stand is released 18 3o. Supplies power to your computer when external power is not connected. NOTE: A BIOS keyboard switch is located inside the secondary battery compartment, use this to reset the system if the reset button on the right-side of the Tablet PC is not effective (see Right-Side Components). Provides a convenient way to use the touchscreen. Can be stretched for better grip and handling. P. 1-4 P. 3-3 P. 2-9 1-11 Component Ref
? Stand
? Secondary Battery Pack
(option)
? Touchscreen Pen Front Components Description See Also Displays the output of the computer. Also serves as your touchscreen. Turns the computer power ON and OFF. Also serves as the SUSPEND/RESUME switch. Allows you to toggle between adjusting the sound volume of the computer or brightness of the LCD screen, or battery capacity. P. 2-9 P. 1-6 P. 2-19 Ref Component
? LCD Panel and Touchscreen Power Button
Volume Control/
Brightness Control/
Battery Capacity Shows the current status of the computers devices. Power ON indicator Num Lock Indicator Caps Lock Indicator Scroll Lock Indicator
? Device Indicators 1-12 P. 2-5 P. 2-5 P. 2-5 Ref
Component Description Shows the speaker volume, or the LCD brightness level, or the primary/secondary battery capacity Suspend mode indicator (in reverse video) Hard disk drive in-use indicator Primary battery status indicator Secondary battery status indicator Volume adjust indicator LCD brightness adjust indicator See Also Speaker Volume/LCD Brightness Adjust Button
? IR Port
? Function Keys
, 1 3
, 2 The upper button provides you a quick way to increase while the lower button decreases the sound volume of the computer or brightness of the LCD screen. Connects with a wireless keyboard (option) for wireless data transfer. Each of the three buttons can be defined from F1 to F12 through the Setup utility. P. 2-16, 2-19 P. 1-5, 4-8 P. 2-7, 5-15
? Speaker Sends out sound and voice from the computer. P. 2-19 1-13 Bottom-Side Components Component Ref
? CCD USB Port Connects a standard USB CCD PC camera.
? Primary Description Battery Switch Allows you to turn on/off power coming from the internal primary battery. NOTE: Be sure to turn the switch to the ON position when using the Tablet PC for the first time by using the included Primary Battery Switch Pin to slide the switch. 1-14 See Also P. 4-7 P. 1-3 Where to Go from Here As your computer is ready for operation, you may want to do any of the following now:
For this purpose Do this See the operating system manual. To know more about the computer Go on to the next chapter. To install the operating system if your dealer has not already done so To know more about the operating system To install the drivers if your dealer has not already done so To set a power-on password To charge the battery pack for the first time See Chapter 6. See Security Menu in Chapter 5. See Charging the Battery Pack in Chapter 3. Read the operating system manual. 1-15 2 CHAPTER 2 Operating Your Tablet PC This chapter provides information about the use of the computer. If you are new to computers, reading this chapter will help you learn the operating basics. If you are already a computer user but are new to Tablet PCs, you may choose to read only the parts containing information unique to your computer. Described in this chapter are the operating basics of these components:
?? Wireless Keyboard
?? Touchscreen
?? Floppy disk drive
?? Hard disk drive
?? CD/DVD drive And these features:
?? Starting and stopping the computer
?? Function keys
?? Video features
?? Audio features
?? Communication features Starting and Stopping the Computer There are a number of ways to start and stop the computer. Starting the Computer You always start the computer using the power button A computer starts up with an operating system (OS) existing on the storage device such as the hard disk; or from a floppy disk or CD if you have the respective modules installed. The computer will automatically load the OS after you turn it on. This process is called booting. NOTE: An operating system is the platform for all your software application programs to run on. The most widely used operating system today is Microsoft Windows. Stopping the Computer When you finish a working session, you can stop the computer by turning off the power or leaving the computer in Standby or Suspend mode:
To stop in this mode Off Standby Suspend 2-2 Do this Follow the shutdown procedure of your operating system. This can prevent loss of unsaved data or damage to your software programs. If the system is locked up because of hardware or software problems, press the power button to turn off the computer. Depending on your settings in Windows, you can put the computer in Standby mode by pressing the power button Depending on your settings in Windows, you can put the computer in Suspend mode by pressing the power button To start up or resume again Press the power button
. Press any key. Press the power button
. mode by pressing the power button If you choose to stop in Standby or Suspend mode, you can return to where you left off the next time you start up the computer. (See Power Management in Chapter 3 for more information.) Using the Wireless Keyboard (option) Before using the wireless keyboard, see section on Positioning the Tablet PC and Wireless Keyboard on chapter 1. Your wireless keyboard has all the standard functions of a full-sized computer keyboard. The standard functions of the keyboard can be further divided into five major categories:
?? Mouse-control buttons
?? Typewriter keys
?? Cursor-control keys
?? Numeric keys
?? Function keys Mouse-control Buttons Mouse-control buttons found on both sides of the wireless keyboard are similar to the buttons on a mouse. The left button (?) is similar to the left- and right-click mouse function. The right button (?) allows you to slide the on-screen pointer horizontally, vertically, or diagonally. 2-3
Typewriter Keys
Typewriter keys are similar to the keys on a typewriter. Several keys are added such as the Ctrl, Alt, Esc, and lock keys for special purposes. The Control key is normally used in combination with other keys for program-specific functions. The Alternate key is normally used in combination with other keys for program-specific functions. The Escape key is usually used for stopping a process. Examples are exiting a program and canceling a command. The function depends on the program you are using. When the lock keys (Caps Lock, Num Lock, and Scroll Lock) are pressed, their corresponding indicators light up on the Tablet PC front panels device indicators. Cursor-Control Keys 2-4 NOTE: The word cursor refers to the indicator on the screen that lets you know exactly where on your screen anything you type will appear. It can take the form of a vertical or horizontal line, a block, or one of many other shapes. Numeric Keypad A 15-key numeric keypad is embedded in the typewriter keys as shown next:
Numeric keys facilitate entering of numbers and calculations. When Num Lock is on, the numeric keys are activated; meaning you can use these keys to enter numerals. NOTE:
?? When the numeric keypad is activated and you need to type the English letter in the keypad area, you can turn Num Lock off.
?? Some software may not be able to use the numeric keypad on the external wireless keyboard. Euro Symbol If your Windows supports the Euro dollar sign sign on the keyboard.
, you can press the 2-5
?? To press the Euro sign on the keyboard, hold down either of the Alt keys and type 0128 on the numeric keypad of your keyboard.
?? To press the Euro sign on an UK keyboard, hold down the Alt Gr key and press 4 (which has an Euro sign on it). Windows Keys Application key. The keyboard has two keys that perform Windows-specific functions:
? Windows Logo key and The ? Windows Logo key opens the Start menu and performs software-specific functions when used in combination with other keys. The click. (See your Windows manual for more information.) Application key usually has the same effect as a right mouse Function Keys On the top row of the keys are the function keys: F1 to F12. Function keys are multi-purpose keys that perform functions defined by individual programs. 2-6 Using the Touchscreen CAUTION: Do not use a sharp object such as a ballpoint pen or pencil on the touchscreen. Doing so may damage the touchscreen surface. Use the included touchscreen pen instead, which can be stretched for better grip and handling. The touchscreen is a touch-sensitive device that allows you to communicate with the computer by controlling the location of the pointer on the screen and making selection with the buttons. The touchscreen needs a special device driver support called a PenMount Utility, which allows you to easily use the Tablet PC without any external pointing device. The touchscreen pen is located at the rear of the Tablet PC (refer to Rear Components on chapter 1). You might need to tilt the Tablet PC after opening the touchscreen pen holder to get it. To use the touchscreen, place the touchscreen pen or your forefinger on the touchscreen. As you slide your pen or fingertip across the screen, the pointer, or cursor, on the screen moves in the same direction across the screen as your fingertip or pen moves across the screen. Touchscreen Pen Holder Here are some common terms that you should know when using the touchscreen:
2-7 Term Point Click Double-click Drag and drop Scroll Action Move your finger or pen on the touchscreen until the cursor points to the selection on the screen. Tap gently anywhere on the touchscreen. Tap twice on the touchscreen rapidly. Press lightly on the touchscreen and move your finger or pen until you reach your destination (drag). Finally, release your finger or pen (drop) when you finish dragging your selection to the destination. The object will drop into the new location. To scroll is to move up and down or left and right in the working area on the screen. To move vertically, place your finger or pen on the right edge of the touchscreen and slide your finger or pen up and down along the edge. To move horizontally, place your finger or pen on the bottom edge of the touchscreen and slide your finger or pen left and right. This function works only after you install the touchscreen driver supplied with the computer and it may not work for all applications. TABLE NOTE: If you swap the left and right buttons, tapping on the touchscreen as an alternative method of pressing the left mouse button will no longer be valid. Configuring the Touchscreen You may want to configure the touchscreen to suit your needs. For example, if you are a left-handed user, you can swap the two buttons function of the left mouse-control button on the wireless keyboard so that you can use the right mouse button as the left mouse button and vise versa. You can also change the size of the on-screen pointer, the speed of the pointer, and so on. To configure the touchscreen, you can use the standard Microsoft or IBM PS/2 driver if you are using Windows. However, you can install 2-8 the touchscreen driver supplied with your computer to take advantage of more powerful features. (For information on installing the driver, see Chapter 6.) Using the Floppy Disk Drive (option) Your Tablet PC comes with an USB floppy disk drive as drive A through the USB port on the right side, or port replicator on an optional expansion box, or through the USB port located on the plug of an optional CD-ROM drive module. A floppy disk drive allows you to install new programs into your computer, or to store information on a removable floppy disk so you can transfer information from one computer to another. The floppy disk drive is a high-density 3.5-inch one, which can read and write to either double-density (2DD) 720-KB floppy disks or high-density (2HD) 1.44-MB floppy disks. Notice that both types of floppy disk have an arrow imprinted on the front upper left corner, and a sliding write-protect tab on the bottom left corner, as illustrated above. When opened, the write-protect tab prevents data from being written to, or erased from the floppy disk. 2-9 Connecting the Floppy Disk Drive Connect the floppy disk drive through any of the following methods:
?? Through the Tablet PCs USB Port Insert the USB plug of floppy disk drive into the USB port located on the right side of the Tablet PC.
?? Through the Expansion Port Plug of the CD-ROM Drive Module Insert the USB plug of floppy disk drive into the USB port located on the expansion port plug of the CD-ROM drive module. Inserting and Ejecting Floppy Disks To insert a floppy disk, hold it with the arrow facing up and towards the drive. Slide the disk into the drive until it clicks into place. To eject a floppy disk, first ensure that the floppy disk drive in-use indicator is off, and then press the eject button on the drive. When the floppy disk pops out of the drive, remove the floppy disk and store it properly. 2-11 on. CAUTION:
?? Never turn off or reset the computer while the floppy disk drive in-use indicator is
?? Always store your floppy disks in a safe, clean container, to protect them from the environment and magnetic fields.
?? A floppy disk must be formatted before you can use it. (To know how to format a floppy disk, see your operating system manual.) 2-12 Using the Hard Disk Drive Your computer comes with a hard disk drive as drive C. A hard disk drive is a storage device with non-removable, rotating, magnetic storage platters inside it. It is where your operating system and application software programs are stored. Your hard disk drive is a 2.5-inch IDE (Integrated Drive Electronics) hard disk drive. This type of drive embodies the latest in fast, reliable mass storage by integrating all the control circuitry necessary for operation directly onto the drive itself. This allows the drive manufacturer to carefully optimize drive performance. CAUTION:
?? Make regular backups of your data files from your hard disk drive to floppy disks or other storage media.
?? Never try to remove or install the hard disk drive while the computer is powered on. Doing so can result in loss of data, and can damage the computer and the hard disk drives sensitive circuitry.
?? Never turn off or reset the computer while the hard disk drive in-use indicator is on. 2-13 Using the CD/DVD Drive (option) Depending on the model, your computer comes with a CD-ROM drive or DVD-ROM drive module. This drive is usually configured as drive D and is connected to the expansion port located on the right side of the Tablet PC. The drive uses removable 5.25-inch silver CD-ROM discs, which look like standard music CDs. It is an ideal medium to use for distributing multimedia because of the huge amount of data that a disc can store. A CD-ROM drive can read CD-ROMs, audio CDs, and CD-R disk. A DVD-ROM drive can read DVD (Digital Versatile Disc) discs in addition to the above discs. NOTE: If the DVD-ROM drive would be operating for more than half an hour (such as showing a DVD title), use the AC or car power source instead of the battery. If not, the battery may run out of power before the operation is complete. CAUTION:
1. When inserting a CD, do not use force. 2. Make sure the CD is correctly inserted into the tray, and then close the tray. 3. Do not leave the CD tray open. Also, avoid touching the lens in the tray with your 4. Do not wipe the lens using materials with rough surface (such as paper towel). hand. If the lens becomes dirty, the CD-ROM may malfunction. Instead, use a cotton swab to gently wipe the lens. FDA regulations require the following statement for all laser-based devices:
Caution, Use of controls or adjustments or performance of procedures other than those specified herein may result in hazardous radiation exposure. 2-14 Connecting the CD/DVD Drive Insert the expansion plug of CD/DVD drive into the expansion port located on the right side of the Tablet PC. Inserting and Removing a CD Follow this procedure to insert or remove a CD. 1. Turn on the computer. 2. Press the eject button and the CD tray will slide out partially. Gently pull on it until it is fully extended. 3. To insert a CD, place down the CD in the tray with its label facing up. Slightly press the center of the CD until it clicks into place. 2-15 To remove a CD, hold the CD by its outer edge and lift it up from the tray. 4. Gently push the tray back into the drive. NOTE: In the unlikely event that you are unable to release the CD tray by pressing the eject button, you can manually release the CD. (See CD/DVD Drive Problems in Chapter 8.) 2-16 Using the Video Features The video subsystem of your computer features:
?? 10.4-inch TFT (Thin-Film Transistor) 18-bit color LCD display with 1024x768 XVGA (Extended Video Graphics Array) resolution.
?? Simultaneous display on LCD and external monitor, which is useful when you have a presentation as you can control the screen from your computer and face the audience at the same time.
?? Multi-display capability, which allows you to expand your desktop on the screen to another display device so that you have more desktop space to work on.
?? Power Management. Configuring the Display Modes NOTE: To take advantage of the enhanced video capabilities, the video driver supplied with your computer must be installed. Your computer has been set to a default resolution and number of colors before shipment. You can view and change display settings through your operating system. See your operating system documentation or online help for specific information. For displaying in higher resolutions, you can connect an external CRT monitor that supports higher resolutions through an optional Port Replicator Module. The following table lists the display modes supported by your computer. 2-17 Display Mode LCD Only CRT Only Simultaneous Display Resolution Colors 640x480 8-bit 720x480 800x600 848x480 1024x768 1152x864 16-bit 24-bit 32-bit 8-bit 16-bit 24-bit 32-bit 8-bit 16-bit 24-bit 32-bit 8-bit 16-bit 24-bit 32-bit 8-bit 16-bit 24-bit 32-bit 8-bit 16-bit 24-bit 32-bit
2-18 Display Mode 8-bit 1280x1024 16-bit 24-bit 1600x1200 8-bit 16-bit LCD Only CRT Only Simultaneous Display
TABLE NOTE: 8-bit = 256 colors; 16-bit = High Color or 65,536 (64 K) colors; 24 and 32-bit = True Color 16,770,000 (16 M) colors. 2-19 Using the Audio Features NOTE:
?? To take advantage of the enhanced audio capabilities, the audio driver supplied with your computer must be installed.
?? If you experience interference while recording, try lowering the microphone recording volume. The audio subsystem of your computer features:
?? Digital audio and analog mixing functions required for recording and playing sound on your computer
?? SoundBlaster Pro, Adlib, and Microsoft Windows Sound System support
?? Volume control select (?)
?? Volume adjust (increase or decrease) (?)
?? Speaker (?)
?? External audio connectors (?) 2-20 Ways of playing and recording sound vary with the operating system used. See your operating system documentation or online help for specific information. Connecting Audio Devices For higher audio quality, you can send or receive sound through external audio devices.
?? Microphone Connector (
) can be connected to an external microphone for recording voice or sound.
?? Audio Output Connector (
) can be connected to the line-in connector of powered speakers with built-in amplifiers, headphones, or earphone set. This connector is compliant with S/PDIF (Sony/Philips Digital Interface). You can connect audio equipment with S/PDIF to the computer. 2-21 Using the Communication Features Using the Modem NOTE: To take advantage of the modem feature, the modem driver supplied with your computer mu st be installed. The internal 56 K fax/data modem allows you to use the telephone line to communicate with others by fax, email, or connect to an online service or bulletin board. To connect the telephone line to the modem, connect the end nearest the core on the modem cable to the computers RJ-11 connector and the other end to the telephone line. NOTE:
?? When using communication software, you may have to disable power
?? Set the COM port of the modem to COM2.
?? Set parameters such as modem speed (baud rate) and line type (pulse dialing or management. tone dialing).
?? Do not enter Standby mode when using communication software. 2-22 Using the Wireless LAN (WLAN) An internal Mini PCI wireless LAN (Intel Centrino platform) module have been pre-installed by your computer manufacturer at the factory. This allows you to access corporate networks or the Internet in a wireless environment. To take advantage of the WLAN feature, make sure that the WLAN driver is installed correctly. If your WLAN module was provided by your dealer instead of the computer manufacturer, contact your dealer for the correct driver to use. Configuring the WLAN After driver installation, you can use the WLAN utility to configure and monitor your WLAN connection. If you are using Windows XP, you can also use its built-in WLAN utility. Follow this procedure to launch the WLAN utility in Windows XP:
1. Select Control Panel from the Start menu. 2. Click Network and Internet Connections. 3. Click Network Connections , then double-click the Wireless Network Connection icon
. 4. Click Properties in the Wireless Network Connection Status dialog box. 5. You can configure your WLAN settings in the Wireless Network Connection Properties dialog box. 2-23 Turning Off/On the WLAN Radio NOTE: The FAA (Federal Aviation Agency) has deemed it unsafe to operate wireless devices in aircraft as this may interfere with flight safety. Remember to select turn off wireless LAN when using your computer in the airplane. Your computer has a built-in Fn+F11 hot key to switch the WLAN radio on/off (see Hot Keys in chapter 2). Both Windows XP WLAN utility and the Fn+F11 hot key must be on for the WLAN function to work. The WLAN indicator (
) glows to indicate that the computer is ready for WLAN connection. To turn off the WLAN function, either press Fn+F11 or turn off the WLAN utility. It takes approximately 30 seconds for your computer to make a successful WLAN connection and approximately 10 seconds to disconnect. 2-24 CHAPTER 3 Managing Power Your computer operates either on external AC power, car adapter, or internal battery power. This chapter tells you how you can effectively manage power. To maintain optimal battery performance, it is important that you use the battery in the proper way. The topics in this chapter include:
?? What is an AC or car adapter
?? How to charge the battery pack
?? When and how to initialize the battery pack
?? How to check the battery level
?? How to replace the battery pack
?? What happens when the battery is low and what actions to take
?? What is Power Management
?? How to save power AC and Car Adapter CAUTION:
?? The AC and car adapter is designed for use with your computer only. Connecting the AC adapter to another device can damage the adapter.
?? The AC power cord supplied with your computer is for use in the country where you purchased your computer. If you plan to go overseas with the computer, consult your dealer for the appropriate power cord.
?? When you disconnect the AC adapter, disconnect from the electrical outlet first and then from the computer. A reverse procedure may damage the AC adapter or computer.
?? When unplugging the connector, always hold the plug head. Never pull on the cord. The AC adapter serves as a converter from AC (Alternating Current) to DC (Direct Current) power because your computer runs on DC power, but an electrical outlet usually provides AC power. It also charges the battery pack when connected to AC power. The AC adapter operates on any voltage in the range of 100 ~ 240 V AC. The car adapter serves as a converter from car battery to DC power. The cigarette lighter port of the car usually provides DC power. It also charges the battery pack when connected. The car adapter operates on any voltage in the range of 10.7 ~ 32 V DC. NOTE: The battery pack cannot be charged when the input power of car adapter falls below 11.5 V DC. 3-2 Battery Pack The battery pack is the internal power source for the computer. It is rechargeable using the AC or car adapter. The operating time of a fully charged battery pack depends on how you are using the computer. When your applications often access peripherals, you will experience a shorter operating time. NOTE: Located on the bottom-side of the Tablet PC is the CCD USB port that contains a switch for turning off power coming from the internal primary battery. (Refer to Bottom-side Components on chapter 1 for the actual location.) CAUTION: Care and maintenance information for the battery is provided in Chapter 8. In addition to this chapter, be sure to read the Battery Pack Guidelines section in Chapter 8 as well. Charging the Battery Pack NOTE:
?? Charging will not start if the batterys temperature is below 0?C (32?F) or above 40?C (104?F).
?? The charging process will stop when the batterys temperature gets above 60?C
(140?F). If this happens, the battery pack may be damaged, please contact your dealer.
?? During charging, do not disconnect the AC adapter before the battery has been fully charged; otherwise you will get a prematurely charged battery. To charge the battery pack, connect the AC adapter to the computer and an electrical outlet. The Battery Charge Indicator (
) on the Tablet PCs Device Indicators appears to indicate that charging is in progress. You are advised to keep the computer power off while the battery is being charged. When the battery is fully charged, the Battery Charge Indicator disappears. It takes approximately 90 minutes to charge the battery pack to 80%
capacity and two or three more hours to fully charge the battery pack. or CAUTION: After the computer has been fully recharged, do not immediately disconnect and reconnect the AC adapter to charge it again. Doing so may damage the battery. 3-3 Initializing the Battery Pack You need to initialize a new battery pack before using it for the first time or when the actual operating time of a battery pack is much less than expected. Initializing is the process of fully charging, discharging, and then charging. It can take several hours. 1. Make sure the computer power is turned off. Connect the AC adapter to fully charge the battery pack. 2. After the battery pack is fully charged, turn on the computer. 3. Disconnect the AC adapter and leave the computer on until the battery is fully discharged. The computer will shut down automatically. 4. Connect the AC adapter to fully charge the battery pack. Checking the Battery Level When two batteries exist on the system, the batterys discharge sequence is from the secondary battery to the primary battery. When the battery charge on the secondary battery falls below 5%, then power usage will switch to the primary battery. When the battery charge on the primary battery falls below 5%, then system will shutdown. NOTE: Any battery level indication is an estimated result. The actual operating time can be different from the estimated time, depending on how you are using the computer. By Operating System You can check the approximate battery level using the battery meter function of the operating system. To read the battery level in Windows, click the icon icon if the computer is using AC power.) on the taskbar. (Click the 3-4 By Gas Gauge The internal primary battery pack does not support the gas gauge display on the battery itself, but on the exterior side of the secondary battery pack
(option) is a gas gauge for displaying the estimated battery charge. When the secondary battery pack is not installed in the Tablet PC and you want to know the battery charge, you can press the on/off switch with a pointed device to see the corresponding value of indicator segment that light green. The value of the corresponding green segment indicates the relative percentage of the battery charge. The battery pack is fully discharged when you see no segment glowing green. On/Off Switch Device Indicator Segment Replacing the Secondary Battery Pack CAUTION:
?? There is danger of explosion if the battery is incorrectly replaced. Replace the battery only with the computer manufacturers optional battery packs. Discard used batteries according to the dealers instructions.
?? Do not attempt to disassemble the battery pack. If you often rely on battery power for a long period of time while traveling, you may consider the purchase of an additional secondary battery pack from your dealer and keep it with you in a fully charged state as a backup. To replace the battery pack, follow these steps:
1. Make sure the computer is not turned on or connected to AC power. However, the Tablet PC supports the battery hot-swap function, providing you the ability to replace the battery even during system on. 2. Carefully place the computer upside down. 3. Open the stand fully (?). 3-5 4. Slide the release lever (?) to the right and pull the battery pack out of its compartment (?) by using your thumb and index finger. 5. Insert the new battery pack into the compartment and slide the release lever first to the right to accommodate it, then releasing it to the lock position. Battery Low Signals and Actions Battery Low occurs when the battery has approximately 10% of its charge remaining. The computer gives warning beeps and the Battery Charge Indicator (
) blinks to alert you to take actions. or NOTE: You can set up your threshold and signals of Battery Low under Windows. Immediately save your data upon Battery Low. The remaining operating time depends on how you are using the computer. If you are using the audio subsystem, PC Card, hard or floppy disk drives, the battery might run out of charge very quickly. Always respond to Battery Low by placing your computer on suspend-to-disk, turning off the computer, or connecting the AC or car adapter. 3-6 If you do not take any action and after two minutes of warning beeps, the computer will automatically suspend-to-disk and turn off. CAUTION:
?? If the Battery Low Warning Beep item is disabled in the Setup Configuration Utility
(SCU) program, the computer will not beep.
?? If you are using a flash PC Card, do not access the card during battery low periods. This is because the access may take longer than the time it takes the battery to run out of charge, thus making your access to the card unsuccessful.
?? If you fail to save your data when the battery completely runs out of charge, then you lose your data. 3-7 Power Management Your computer supports APM (Advanced Power Management) and ACPI (Advanced Configuration and Power Interface) for power management. The power management feature allows you to reduce the power consumption for energy saving. With an ACPI-compliant operating system such as Windows 98 and Windows 2000, power supply to different computer components is controlled on an as-needed basis. This allows maximum power conservation and performance at the same time. In general, Windows power management works in this way:
What When Power to the hard disk is turned off When the hard disk has been idle for a Power to the display is turned off The computer enters Standby mode. The hard disk and display are turned off and the entire system consumes less power. The computer enters Suspend mode.
(See the next subsection for more information.)
* depends on your settings in Windows. set period. When the display has been idle for a set period. When the entire system has been idle for a set period. When you press the power button
. For detailed information on power management, see Windows Help. Suspend-to-Disk (Suspend mode) NOTE: If your operating system does not support ACPI, you can use the computers Suspend-to-Disk function, which is equivalent to Windows Hibernation function. (See Power Menu in Chapter 5 for more information.) 3-8 Manual Power Management You can manually initiate Suspend-to-disk mode at any time in one of two ways:
?? Use the O/S that supports the Suspend function.
?? Press down the power button and release it in less than 4 seconds with the system on. Repeat the action to wake up the system under Suspend mode. NOTE:
1. The suspend-to-disk partition may not exist on your hard disk. Check with your 2. The OVMAKFIL utility allows you to create the suspend-to-disk partition. (Refer to dealer to know if it exists. If there is no suspend-to-disk partition, you cannot use the Suspend-to-disk feature. section on OVMAKFIL Utility for information.) Suspend-to-disk is a very useful feature. People frequently open many applications when they use computers. It takes some time to get all these applications open and running, and normally they all have to be closed before the system can be turned off. When you use the Suspend-to-disk feature, you do not have to close the applications. The computer stores the state of your computer to a file on the hard disk and then shut down. The next time you turn on your computer, you return to exactly where you left off. 3-9 Power-Saving Tips In addition to your computers automatic power management, you can do your part to maximize the batterys operating time by following these suggestions.
?? Do not disable Power Management.
?? Decrease the LCD brightness to the lowest comfortable level.
?? Disable the parallel and serial ports if no devices are connected to these ports. (See Advanced Menu in Chapter 5.)
?? If you work with an application that uses the serial port or a PC Card, exit the application when you finish using it.
?? If you have a PC Card installed, remove it when not in use. Some PC Cards drain power even while they are inactive.
?? Turn off the computer when you are not using it. 3-10 CHAPTER 4 Expanding Your Computer You can expand the capabilities of your computer by connecting other peripheral devices. When using a device, be sure to read the instructions accompanying the device together with the relevant section in this chapter. This chapter gives guidelines on installing and using these devices:
?? Serial device
?? IR device
?? USB device
?? PC Card Connecting a Serial Device Your computer has a serial port for connecting a serial device such as a serial mouse or modem. Follow this procedure to connect a serial device:
1. Make sure the COM1 Port item is set properly in the SCU program.
(See Advanced Menu in Chapter 5 for information.) 2. Make sure the computer is not turned on. 3. Plug the device cable to the serial port on the right side of the Tablet PC. 4. Turn on the computer. NOTE: Portable modems that derive power through the serial port cannot be used with the Tablet PC. Instead, use a modem that is powered by its own internal battery or external AC power. 4-2 Connecting a USB Device Your computer has one USB port on the right side for connecting USB devices such as digital camera, scanner, printer, modem, or mouse; and one CCD USB port at the bottom-side for connecting an optional CCD camera. NOTE: You can also use the USB port located on the Expansion Port plug of the optional CD-ROM drive module. USB is specified to be an industry standard extension to the PC architecture. It supports Plug and Play technology so you can install and remove USB devices without turning off the computer. With its multiple connection capability, up to 127 devices can be connected in a daisy-chain configuration. In addition, you can use a USB hub that converts a single USB connector into multiple ports where USB devices can be connected. To connect a standard USB device, simply plug the device cable to the USB port on the right side of the Tablet PC, or through the optional CD-ROM drive modules Expansion Port plug. To connect an optional CCD camera, simply place the camera on top of the Tablet PC nearest the CCD USB port. Align and plug in the golden finger connector to the CCD USB port at the bottom-side of the Tablet PC and secure it in place with the built-in screw. Adjust the angle of the CCD camera according to your need. 4-3 4-4 Connecting an IR Device Your computer has an IR (infrared) port for connecting an infrared-
equipped device wirelessly such as a wireless keyboard/mouse, another computer, printer, or PDA (Personal Digital Assistant). The infrared feature supports these standards:
For the front panels IR port
?? IR keyboard/mouse that supports Forward FK34PUS002 (US language) specification For the left sides IR port
?? IrDA 1.1 (FIR Fast Infrared) with 9.6 Kbps to 4.0 Mbps transfer rate
?? HPSIR Serial Infrared mode Follow this procedure to connect an IR device:
1. Under Windows, make sure that the IrDA Fast Infrared Port is set to HP HSDL-2300/3600. (See How to Use the CD in Chapter 6 for information.) 2. Make sure that the COM2 Port and its Mode items are set properly in the SCU program. (See Advanced Menu in Chapter 5 for information.) 3. When using the front panels IR port:
Place the wireless keyboard where its IR port faces the IR port of your computer within the effective range ? within ?15-degrees vertical angle and within ?30-degrees horizontal angle at no greater than 3 meter distance. 4-5 When using the left sides IR port:
Place the transmitting device where its IR port faces the IR port of your computer within the effective range ? within ?20-degrees vertical angle and within ?20-degrees horizontal angle at no greater than 0.8~1.0 meter distance. Place the receiving device where the IR port of the Tablet PC faces its IR port within the effective range ? within ?15-degrees vertical angle and within ?15-degrees horizontal angle at no greater than 0.8~1.0 meter distance. 4. To take advantage of the IR communications, you need a third party software. NOTE: During infrared communication, take note of the following:
?? Do not move the computer and IR device.
?? Do not enter Standby mode.
?? Do not use a cell phone or another IR device near the computer.
?? Avoid strong light such as sunlight or fluorescent light.
?? Disable the screen saver. 4-6 Using PC Cards Your computer has one PC Card slot to accommodate one type II card. ZV Port and CardBus Support Your computers PC Card slot supports CardBus and ZV
(Zoomed-Video) Port specifications. CardBus is the 32-bit version of PC Card technology. It allows speeds of up to 133 Mbps at 33 MHz. Typical applications are SCSI host bus, graphic video, and high-speed network cards. Inserting and Removing a PC Card NOTE:
?? Some PC Cards require additional system resources. Before using such PC card, you may have to free other system resources for the PC Card.
?? Although some PC Cards can be inserted and removed without turning off the computer, you cannot remove or install PC Cards during Standby mode. To insert a PC Card:
1. Locate the PC Card slot on the right side of the computer. 2. Slide the PC Card, with its label facing up, into the slot until the eject button pops out. 4-7 3. When a new card is seated, the computer will detect it and try to install the appropriate driver. Follow the on-screen instruction to complete the process. To remove a PC Card:
1. Your operating system may require you to stop the PC Card before you actually remove it. (In Windows, double-click the PC Card icon in Control Panel to stop the card.) 2. Push the eject button and the card will slide out slightly. 3. Pull the card out of the slot. 4-8 System Memory Upgrade You can upgrade your computer by changing system memory to a maximum of 256 MB on the SO-DIMM slot. However, to avoid damage during the installation procedure, please ask your dealer for help. 4-9 CHAPTER 5 Setup Configuration Utility (SCU) SCU is a program for configuring the BIOS (Base Input/Output System) settings of the computer. BIOS is a layer of software, called firmware, that translates instructions from other layers of software into instructions that the computer hardware can understand. The BIOS settings are needed by your computer to identify the types of installed devices and establish special features. This chapter tells you how to use the SCU program. When and How to Use the SCU Program When to Use You need to run the SCU program when:
?? You see an error message on the screen requesting you to run Setup.
?? You want to restore the factory default settings.
?? You want to modify some specific settings according to the hardware.
?? You want to modify some specific settings to optimize system performance. Starting SCU NOTE:
?? The Setup screens shown in this chapter are for your reference only. The actual items or settings on your computer may differ.
?? The Setup program may have been updated after the publication of this manual.
?? The settings you select in your operating system might override similar settings in Setup. To run SCU, press F2 when the prompt appears in the lower left corner of the screen during system startup. The prompt shows up on the screen for only a few seconds. You must press F2 quickly. The SCU menu appears as shown next. 5-2 The menu can be divided into four areas:
?? On the top line is the menu bar containing the titles of the available menus. Each menu title brings a specific menu.
?? The center left column of the menu contains items that you can set for the selected menu title. The arrow sign in front of an item indicates there is a sub-menu for the item.
?? The right column of the menu provides help information of the selected item.
?? The bottom lines give keyboard instructions for moving around and making selections. 5-3 Moving Around and Making Selections A brief description of keyboard (if installed) usage is listed next:
Key
Enter Space bar, Esc Function Selects a menu title. Selects an item or option. 1) Brings up the sub-menu when an item with the arrow sign is selected. 2) Opens or closes the options window when an item is selected. Cycles through the pre-defined value for the selected item. Pressing the space bar brings up the next value; pressing the minus () key does the contrary. 1) Exits the SCU program. 2) Returns to the previous menu if in a sub-menu. 3) Closes the options window if one is open. NOTE: You are advised to use the mouse (if installed) as it is more straightforward than using the keyboard. 5-4 Main Menu The Main menu contains the basic configuration settings of the system. Date and Time Sets the system time (Hour, Minute, Second) and date (Month, Day, Year). 5-5 Internal Numlock USB 5-6 Advanced Menu The Advanced menu contains the input/output configuration settings of the system. Geyserville Support 5-7 COM Ports (COM3/4) Allows you to assign COM3 and COM4 to specific functions that you wish to use. In general, COM3 can be assigned to touchscreen, while COM4 can be assigned to RS-232C. Select Disabled if you need the resource 2E8/IRQ7 of COM4 for another device. 5-8 LPT Mode Sets the communication compatibility mode for the IR port. Select according to the type of device with which the Tablet PC is to communicate with. Sets the address for the LPT port (parallel port). 5-9 HDD Heater Function Key 1 Define (FN1) Function Key 2 Define (FIN2) Function Key 3 Define (Fin3) These 3 items allow user to define the corresponding function key associated with the 3 function buttons (
panel..
) found on the front 5-10 Power Button Define Enables or disables the beep sound when any hot-key is pressed. 5-11 Security Menu The Security menu contains the security setting that safeguards your system against unauthorized use. Sets the Setup password. A password is required for running the SCU program. When setting password, make sure that NumLock is off, then type the password in the entry field and press Enter. Confirm your password by typing it again and pressing Enter. For the password to take effect, enable the Enable Setup Password item. 5-12 Hard Disk Boot Sector Sets the system password. A password is required for starting up the system and running the SCU program. When setting password, make sure that NumLock is off, then type the password in the entry field and press Enter. Confirm your password by typing it again and pressing Enter. For the password to take effect, enable the Enable Password item. 5-13 Boot Set the first, second, third, and fourth booting device. The system will try to boot from the first device but if it is not available, will try the next boot device. If you set the first boot device to Floppy Disk Drive, the system will boot from the Floppy Disk Drive first. The options are Hard Disk C, CD-ROM Drive and LAN. The default setting is Diskette A, Hard Disk C, CD-ROM Drive then LAN. 5-14 Exit The Exit menu allows you to leave the SCU program. After finished with your settings, you must save and exit so that the new settings can take effect. Save Changes and Exit saves the changes you have made and exit the SCU program. Discard Changes and Exit exits the SCU program without saving the changes you have made. Get Default Values loads factory default values for all the items. Load Previous Values restores previous values for all the items. 5-15 CHAPTER 6 Installing Software Drivers To take full advantage of the unique features of your Tablet PC, some operating systems require custom software, known as drivers, to be installed. If you purchased the Tablet PC with Windows pre-installed, your dealer may have already installed the drivers. If not, you need to install the drivers using the CD supplied with your Tablet PC. This chapter describes how to install the drivers. How to Use the CD upgrade, please contact your dealer. NOTE:
? The drivers may have been updated after this manual was published. For drivers
? You can always find README or document files on the CD. These files contain the latest information from the software supplier. Please read the files together with this chapter. NOTE:
? This CD supports Windows 98, Windows 2000, and Windows NT 4.0. Other
? The available items may differ according to your computer model and operation systems are not supported. system. You can set up the following drivers from the CD:
?? Mitsumi USB Floppy driver NOTE: If you are using Windows 2000, you will not need to install this driver. Windows NT does not support USB device.
?? ATI VGA driver
?? Crystal Audio driver
?? Modem driver
?? Realtek LAN driver
?? Touchscreen driver (PenMount Utility)
?? FIR driver NOTE: If you are using Windows 2000, you will not need to install this driver. Windows NT 4.0 does not support FIR.
?? Card Wizard driver NOTE: If you are using Windows 98 or Windows 2000, you will not need to install this driver. 6-2 Installing Software Drivers A Setup program is provided on the CD. To run the program, simply insert the CD and the following screen will appear. In case the autorun function of your CD drive is not enabled, then click on Start, then Run. Specify the CD drive and choose autorun.exe. Installing Software Drivers 6-3 Installing Drivers for Windows 98 To set up the necessary drivers for Windows 98, click on Windows 98 on the initial screen. The following screen appears:
VGA Audio Touchscreen USB Floppy USB Modem The video driver allows you to select high-resolution displays with richer colors. It can drive LCD displays as well as CRT displays. The audio driver allows you to take full advantage of the audio subsystem. The touchscreen driver allows you to use your fingers as well as the touchscreen pen as a pointing device. The floppy drive driver allows you to use the floppy disk drive. The modem driver allows you to transmit information over a standard telephone line through the RJ-11 port. 6-4 Installing Software Drivers To install the necessary driver, just click on the particular option and follow the onscreen instructions to continue and complete installation. Touchscreen Driver 1. Insert the driver CD into the drive. 2. Click on Windows 98, then Touchscreen and follow the onscreen instructions to continue. 3. When finished installing, select Yes to reboot your system. The driver should now be loaded. 4. After the system has finished rebooting, click on the PenMount Monitor icon located on the taskbar to bring up the PenMount Control Panel. 5. Select the Calibrate folder and click on Calibrate. 6. Click on the four sides (points) and the plus-sign + on the screen to calibrate your touchscreen pen for use on the Tablet PC. Installing Software Drivers 6-5 Installing Drivers for Windows 2000 To set up the necessary drivers for Windows 2000, click on Windows 2000 on the initial screen. The following screen appears:
VGA Modem Touchscreen Audio The video driver allows you to select high-resolution displays with richer colors. It can drive LCD displays as well as CRT displays. The modem driver allows you to transmit information over a standard telephone line through the RJ-11 port. The touchscreen driver allows you to use your fingers as well as the touchscreen pen as a pointing device. The audio driver allows you to take full advantage of the audio subsystem. To install the necessary driver, just click on the particular option and follow the onscreen instructions to continue and complete installation. 6-6 Installing Software Drivers Touchscreen Driver System Hardware Detection 1. Click on Start, then Settings, then Control Panel, then System, and select the Device Manager tab. 2. Under the item Other devices a question mark appears in front of the sub-item Unknown Device. 3. Right-click on the item Unknown Device and click on Properties. When the Properties window appears, click on Reinstall Driver. 4. When the Update Device Driver Wizard window appears, click on Next and follow the onscreen instructions to continue. 5. When you are asked for the driver location, make sure the driver CD is in the drive and specify the \W2000\TOUCHSCREEN\DMC9000.INF file. 6. When the Digital Signature Not Found window appears, click on Yes to continue and exit. 7. Click on Start, then Settings, then Control Panel. 8. Right-click on System and select Properties. 9. On the System Properties window, click on Device Manager. 10. On the Device Manager window, DMC9000 should appear under the item Mice and other pointing devices. Right-click on DMC9000 and click on Properties. 11. Note the message on the window for Device status and make sure that Use this device (enable) should be selected on the Device usage:
window. 12. Click on Close to exit. Installing Software Drivers 6-7 Software Installation 1. Reinsert the driver CD into the drive. 2. Click on Windows 2000, then Touchscreen and follow the onscreen instructions to continue. 3. When finished installing, select Yes to reboot your system. The driver should now be loaded. 4. After the system has finished rebooting, click on the PenMount Monitor icon located on the taskbar to bring up the PenMount Control Panel. 5. Select the Calibrate folder and click on Calibrate. 6. Click on the four sides (points) and the plus-sign + on the screen to calibrate your touchscreen pen for use on the Tablet PC. 6-8 Installing Software Drivers Installing Drivers/Utility for Windows NT 4.0 To set up the necessary drivers/utility for Windows NT 4.0, click on Windows NT on the initial screen. The following screen appears:
VGA Audio Modem Touchscreen Card Wizard The video driver allows you to select high-resolution displays with richer colors. It can drive LCD displays as well as CRT displays. The audio driver allows you to take full advantage of the audio subsystem. The modem driver allows you to transmit information over a standard telephone line through the RJ-11 port. The touchscreen driver allows you to use your fingers as well as the touchscreen pen as a pointing device. The PCMCIA Card utility enhances the ability of your Tablet PC to use a wider range of PC Cards like Installing Software Drivers 6-9 flash memory, SRAM, modem, LAN, and SCSI cards. To install the necessary driver/utility, just click on the particular option and follow the onscreen instructions to continue and complete installation. Touchscreen Driver 1. Insert the driver CD into the drive. 2. Click on Windows NT, then Touchscreen and follow the onscreen instructions to complete the installation. 3. When finished installing, the driver should now be loaded and the PenMount Control Panel window appears. 4. On the Configure tab, click on Detect to allow the system to automatically detect the IRQ number and I/O address as well as select the serial port. Click on Apply, then OK. You will be asked to reboot the system to validate the required configuration. 5. After the system has finished rebooting, click on the PenMount Monitor icon located on the taskbar to bring up the PenMount Control Panel. 6. Select the Calibrate folder and click on Calibrate. 7. Click on the four sides (points) and plus-sign + on the screen to calibrate your touchscreen pen for use on the Tablet PC. Modem Driver 1. Restart your system and quickly press F2 to enter the SCU Setup. 2. Enter the Advanced menu and select COM Port (COM3/4). 3. Select the option Touchscreen/Disabled. 6-10 Installing Software Drivers 4. Select LPT Port and select the option Disabled. 5. Insert the driver CD into the drive. 6. Click on Windows NT, then Modem and follow the onscreen instructions to complete the installation. Installing Software Drivers 6-11 Other Drivers and Utilities 0VMAKFIL Utility CAUTION: Check with your dealer to find out if the Suspend-to-disk file (partition) is already created. If it is not created and you want to create the Suspend-to-disk file by yourself, make sure that your hard disk is empty. That is, your hard disk has not been partitioned by the FDISK program. If any partition exists, you have to use the FDISK program to delete all partitions before you can use the 0VMAKFIL utility. The 0VMAKFIL.EXE utility program allows you to create in your hard disk the Suspend-to-disk file (partition), which is required for the Suspend-to-disk function of your Tablet PC. Follow these steps to create the suspend-to-disk partition:
1. Boot your system by CD-ROM. 2. Now you can run the 0VMAKFIL program under the S2D Utility directory on the CD, following this command syntax:
0VMAKFIL -Pnn where nn specifies the size (in MB) of the partition. You can have the size larger than your current system memory size for future upgrade of your memory. If you do not specify the parameter, the default size will be your system RAM plus 4 MB. The extra 4 MB is for the overhead of the program and data held in video memory. You can clear the contents of the partition using the 0VMAKFIL -C command. The command is useful only when you are backing up the data in the hard disk drive. 6-12 Installing Software Drivers CHAPTER 7 Caring for the Tablet PC Taking good care of your computer will ensure a trouble-free operation and reduce the risk of damage to your computer. This chapter gives you guidelines covering these areas of maintenance:
?? How to protect the computer
?? What to note when using and storing the computer
?? How to clean the computer
?? What to note when using the battery pack
?? What to note when traveling with the computer Protecting the Computer To safeguard the integrity of your computer data as well as the computer itself, you can protect the computer in several ways as described in this section. Using the Password The power-on password protects your computer against unauthorized use. If the password is set, the prompt requesting for the password appears on the screen whenever the computer is turned on. The password is set via the SCU program. See Security Menu in Chapter 5 for instructions. Using an Anti-Virus Strategy New viruses are always being developed nowadays and they are attacking computers even more easily with emails so commonly used worldwide. The Security feature of the SCU program protects the boot sector of the hard disk. To enable the function, see Security Menu in Chapter 5 for instructions. You can also install a virus-detecting program to monitor potential viruses that could damage your files. 7-2
! |wqC Taking Care of the Tablet PC Location Guidelines
?? Use the computer where the temperature is between 10?C (50?F) and 35?C (95?F).
?? Avoid placing the computer in a location subject to high humidity, extreme temperatures, mechanical vibration, direct sunlight, or heavy dust.
?? Do not cover or block any ventilation openings on the computer. For example, do not place the computer on a bed, sofa, rug, or other similar surface. Otherwise, overheating may occur that results in damage to the computer.
?? Keep the computer at least 13 cm (5 inches) away from electrical appliances that can generate a strong magnetic field such as a TV, refrigerator, motor, or a large audio speaker.
?? Do not move the computer abruptly from a cold to a warm place. A temperature difference of more than 10?C (18?F) will cause condensation inside the unit, which may damage the storage media.
?? Do not place the computer on an unsteady surface. General Guidelines
?? Do not place heavy objects on top of the Tablet PC as this may damage the display.
?? The screen surface is easily scratched. Do not use paper towels to clean the display. Avoid touching it with a ballpoint pen or pencil.
?? To maximize the life of the backlight in the display, allow the backlight to automatically turn off as a result of power management. Avoid using a screen saver or other software that prevents the power management from working.
! |wqC 7-3 Cleaning Guidelines
?? Never clean the computer with its power on.
?? Use a soft cloth moistened with water or a non-alkaline detergent to wipe the exterior of the computer.
?? Gently wipe the display with a soft, lint-free cloth. Do not use alcohol or detergent on the display.
?? Dust on the IR port can interfere with data transfer. Wipe the port with a soft, dry cloth.
?? Dust or grease on the touchscreen can affect its sensitivity. Clean the touchscreen by using adhesive tape to remove the dust and grease on its surface. Battery Pack Guidelines
?? Recharge the battery pack when it is nearly discharged. When recharging, make sure the battery pack is fully charged. Doing so may avoid harm to the battery pack.
?? Operate the computer with the battery pack installed even when using external power. This ensures that the battery is fully charged.
?? If you will not be using the computer for a long period of time (more than two weeks), remove the battery pack from the computer.
?? If you remove the battery pack, make sure the battery terminals do not contact any conductors such as metal objects or water. Otherwise, the battery may become unusable as a result of a short circuit.
?? If you need to store the battery pack, store it in a cool, dry place. Never allow the temperature to exceed 60?C (140?F).
?? Do not leave the battery pack in storage for more than 3 months without recharging it. 7-4
! |wqC When Traveling
?? Before traveling with your computer, make a backup of your hard disk data into floppy disks or other storage devices. As an added precaution, bring along an extra copy of your important data.
?? Make sure the battery pack is fully charged.
?? Make sure the computer is turned off.
?? Do not leave objects that will press onto the display.
?? Disconnect the AC adapter from the computer and take it with you. Use the AC adapter as the power source and as a battery-charger.
?? Hand-carry the computer. Do not check it in as luggage.
?? Allow extra time for airport security. Many airports inspect electronic devices carefully.
?? If you need to leave the computer in the car, put it in the trunk of the car to avoid exposing the computer to excessive heat.
?? When going through airport security, it is recommended that you send the computer and floppy disks through the X-ray machine (the device you set your bags on). Avoid the magnetic detector (the device you walk through) or the magnetic wand (the hand-held device used by security personnel).
?? If you plan to travel abroad with your computer, consult your dealer for the appropriate AC power cord for use in your country of destination.
! |wqC 7-5 CHAPTER 8 Troubleshooting Hardware, software, or a combination of both can cause computer problems. When you encounter any problem, it might be a typical problem that can easily be solved. This chapter tells you what actions to take when solving common computer problems. It is divided into three sections:
?? Preliminary checklist
?? Solving common problems
?? Resetting the computer Preliminary Checklist Here are helpful hints to follow before you take further actions when you encounter any problem:
?? Try to isolate which part of the computer is causing the problem.
?? Make sure that you turn on all peripheral devices before turning on the computer.
?? If an external device has a problem, make sure that the cable connections are correct and secure.
?? Make sure that the configuration information is properly set in the SCU program.
?? Make sure that all the device drivers are correctly installed.
?? Make notes of your observations. Are there any messages on the screen? Do any indicators light? Do you hear any beeps? Detailed descriptions are useful to the service personnel when you need to consult one for assistance. If any problem persists after you follow the instructions in this chapter, contact an authorized dealer for help. 8-2
! |wqC Solving Common Problems For easy reference, the problems are divided into these categories. Problem Type Battery problems CD/DVD drive problems Display problems Floppy disk drive problems Hardware device problems Hard disk drive problems Infrared problems Keyboard and mouse problems LAN problems Modem problems PC Card problems Power Management problems (for Windows) Printer problems Software problems Sound problems Startup problems Other problems Go to P. 8-4 P. 8-4 P. 8-5 P. 8-7 P. 8-8 P. 8-8 P. 8-9 P. 8-9 P. 8-10 P. 8-10 P. 8-11 P. 8-11 P. 8-12 P. 8-12 P. 8-13 P. 8-14 P. 8-15
! |wqC 8-3 Battery Problems The battery does not charge (Battery Charge indicator does not appear).
?? Make sure that the AC adapter is properly connected.
?? Make sure that the battery is not too hot gets above 40oC (104oF) or too cold below 0oC (32oF). Allow time for the battery pack to return to room temperature.
?? Make sure that the battery pack is installed correctly.
?? Make sure that the battery terminals are clean. The operating time of a fully charged battery becomes shorter.
?? If you often partially recharge and discharge, the battery might not be charged to its full potential. Initialize the battery to solve the problem. (See Initializing the Battery Pack in Chapter 3 for instructions.)
?? Make sure that power to the Tablet PC is off. If you use the Tablet PC during recharging for more than 4 hours, the recharging will stop no matter whether the battery has been fully charged or not. If this happens, you can disconnect and then reconnect the AC adapter to start the recharging again. The battery operating time indicated by the battery meter does not match the actual operating time.
?? The actual operating time can be different from the estimated time, depending on how you are using the computer. If the actual operating time is much less than the estimated time, initialize the battery. (See Initializing the Battery Pack in Chapter 3 for instructions.) CD/DVD Drive Problems The CD/DVD drive cannot read a CD.
?? Make sure that the CD is correctly seated in the tray, with the label facing up. 8-4
! |wqC
?? Make sure that the CD is not dirty. Clean the CD with a CD cleaning kit, available in most computer stores.
?? Make sure that the CD/DVD drive driver is installed correctly.
?? Make sure that the computer supports the CD or the file format contained. You cannot eject a CD.
?? The CD is not properly seated in the drive. Manually release the CD following the method described next:
Turn off the system. Insert a small rod, such as a straightened paper clip, into the drives manual eject hole and push firmly to release the tray. Pull the tray out until fully extended, and then remove the CD. Display Problems Nothing appears on the screen.
?? If the power-on indicator is not on, check the electrical outlet, the plugs and power cords.
?? If the power button button firmly. does not respond to a light touch, press the
?? If you are using the battery power, make sure that it has a charge remaining and that it is installed correctly.
?? During operation, the screen may automatically turn off as a result of power management. Press any key to see if the screen comes back.
?? The brightness level might be too low. Increase brightness by pressing on the brightness/volume control button on the front panel of the Tablet PC.
?? The display output might be set to an external monitor.
?? Reset the Tablet PC by pressing the reset button on the right side of the computer or by pressing Ctrl+Alt+Del keys if you are using an external keyboard.
! |wqC 8-5
?? Try turning the computer off, wait a few seconds, then turn it back on. The characters on the screen are dim.
?? Adjust the brightness. Bad dots appear on the display at all times.
?? A small number of missing, discolored, or bright dots on the screen are an intrinsic characteristic of TFT LCD technology. It is not regarded as a LCD defect. The Inspection Standard generally agreed in the LCD industry allows a maximum of 8 pixels on a unit. Term definition:
Bright dots When the LCD screen is lighted, dots appear bright at a dark area. Red/green/blue bright dots also count. Dark dots When the LCD screen is lighted, dots appear black at bright areas. Distance between defective dots The minimum distance between two defective dots. Adjacent defective dots Defective dots within a radius of 10 mm. LCD Type Defective dots Distance between defective dots Bright Dark Bright Dark Two adjacent defective dots Bright Dark Three or more adjacent defective dots Bright Dark Total 12.1" SVGA N<5 N<5 N<5 N<7 13.3" XGA N<5 N<7 14.1" XGA N<8 N<8 15" XGA 18" XGA N<9 N<15 <5mm
<15mm <15mm <2 Pairs <2 Pairs Not allowed Not allowed N<8
<15mm <15mm <2 Pairs <2 Pairs Not allowed Not allowed N<9
<15mm <15mm <2 Pairs <2 Pairs Not allowed Not allowed N<9
<15mm <15mm <2 Pairs <2 Pairs Not allowed Not allowed N<10
<20mm <3 Pairs <5 Pairs Not allowed Not allowed N<20 Resolution cannot be adjusted to desired setting.
?? Make sure that the video driver is installed correctly. The external monitor displays nothing.
?? Make sure that the monitor is turned on.
?? Make sure that the monitors signal cable is properly connected.
?? Check if the Setup item Display Mode on the Main menu of the SCU program is configured correctly. 8-6
! |wqC Simultaneous display does not work.
?? Make sure that you turn on the external monitor before turning on the computer.
?? Check the Setup item Display Mode on the Main menu of the SCU program is configured correctly. Floppy Disk Drive Problems The Floppy Disk Drive In-use Indicator stays on.
?? Make sure that the floppy disk is not physically damaged.
?? Make sure that the floppy disk is inserted correctly. The disk drive cannot write to a floppy disk.
?? Make sure that the floppy disk is formatted.
?? Make sure that the floppy disk is not write-protected.
?? Make sure that you are writing to the correct drive.
?? Make sure that there is enough space left on the floppy disk.
?? Make sure that the floppy disk is not physically damaged. The disk drive cannot read a floppy disk.
?? Make sure that the floppy disk is formatted.
?? Make sure that you are reading the correct drive. Hardware Device Problems The computer does not recognize a newly installed device.
?? The device may not be correctly configured in the SCU program. Run the SCU program to identify the new type.
?? Make sure if any device driver needs to be installed. (Refer to the documentation that came with the device.)
! |wqC 8-7
?? Make sure if the device needs any jumper or switch settings. (Refer to the documentation that came with the device.)
?? Check the cables or power cords for correct connections.
?? For an external device that has its own power switch, make sure that the power is turned on. Hard Disk Drive Problems The hard disk drive error message appears on the screen.
?? Insert a bootable diskette and check the integrity of your hard drive.
?? The hard disk drive has defects. Ask your dealer for help. The hard disk drive operations seem slow.
?? The data files stored on the hard disk drive may be fragmented. Use a tool such as Windows Disk Defragmenter to defragment the files. The hard disk drive in-use indicator glows without blinking.
?? The data files stored on the hard disk drive may be fragmented. Use a tool such as Windows Disk Defragmenter to defragment the files. Infrared Problems The IR port does not work.
?? Make sure that the IR ports of the two device face each other within a
?15-degrees angle and 1 meter (3 feet) distance and there are no obstructions in between.
?? Make sure that the device connected is using an equivalent speed.
?? Make sure that the IrDA Fast Infrared Port is set to HP HSDL-2300/3600.
?? Make sure that the IR port is set correctly in the SCU program.
?? If you are printing to an infrared printer, make sure that the appropriate driver is installed. 8-8
! |wqC
?? If you are using any file transfer functions, make sure that both the computer and the IR device have the appropriate software running.
?? Make sure that there is no device radiating infrared rays, such as remote-controlled devices or wireless headphones, near the computer or device.
?? Make sure that no direct sunlight or fluorescent lamps are near the computer or device.
?? Make sure that the IR ports are clean. Keyboard and Mouse Problems The keyboard does not respond.
?? Try connecting another external keyboard. If it works, replace the former keyboard as it may be defective. The numeric keypad is disabled.
?? Make sure that the Num Lock is switched on. (Check if the Num Lock Indicator appears or not.) The external keyboard does not work.
?? Make sure that the keyboard cable is properly connected. The PS/2 mouse does not work.
?? Make sure that the mouse cable is properly connected.
?? Make sure that the pointing device is enabled in the SCU program. The serial mouse does not work.
?? Make sure that the mouse cable is properly connected.
?? Make sure that you connect the mouse before booting the computer.
?? Make sure that the serial port is enabled in the SCU program.
! |wqC 8-9 LAN Problems I cannot access the network.
?? Make sure that the LAN driver is correctly installed.
?? Make sure that the LAN cable is properly connected to the RJ-45 connector and the network hub.
?? Make sure that the network configuration is appropriate.
?? Make sure that the user name or password is correct. Modem Problems The modem does not work.
?? Make sure that the modem driver is correctly installed.
?? Make sure that the telephone line is properly connected.
?? Make sure that the COM port in the communication software is correctly set.
?? Turn off power management. PC Card Problems The PC Card does not work.
?? Make sure that the PC Card is correctly seated.
?? If the card requires an IRQ (interrupt request), make sure that there is one available.
?? The PC Card may be attempting to use a COM port in a manner that conflicts with the COM port being used by another device. Try running the SCU program to change the COM port setting. If your PC Card uses COM1, set COM1 as Disabled. If your PC Card uses COM2, set COM2 as Disabled. If your PC Card uses COM4, set COM4 at Disabled. 8-10
! |wqC WARNING: COM3 is reserved for use by the touchscreen, do not disable it. If COM1/2 is disabled and COM3/4 is enabled on the SCU Setup (refer to chapter 5), upon booting system would recognize the enabled COM3/4 and designate it as COM1/2. The following table is the default settings:
COM Port COM1 (available) COM2 (available) COM4 (available) COM3 (reserved for touchscreen only) I/O (Input/Output) Port 3F8 2F8 2E8 3E8 IRQ (Interrupt Request) IRQ4 IRQ3 IRQ7 IRQ5 The PC Card stops communicating properly.
?? The application may have been reset when the computer is turned off or in Standby mode. Exit and restart the application. Power Management Problems (for Windows) The computer does not enter Standby or Suspend mode automatically.
?? If you have a connection to another computer, the computer does not enter Standby or Suspend mode if the connection is actively in use.
?? Make sure that the Standby or Suspend time-out is enabled. The computer does not enter Standby or Suspend mode immediately.
?? If the computer is performing an operation, it normally waits for the operation to finish. The computer does not resume from Standby or Suspend mode.
?? The computer automatically enters Standby or Suspend mode when the battery pack is empty. Do any one of the following:
? Connect the AC or car adapter to the computer.
? Replace the empty battery pack with a fully charged one.
! |wqC 8-11 The computer does not enter Suspend mode.
?? If you are using Windows 98, make sure that the Suspend-to-disk partition or file exists.
?? You might be using a PC Card that prevents the computer from entering Suspend mode. To enter the mode, stop the communication program and then remove the card or stop the card. Printer Problems The printer does not work.
?? Make sure that the printer is turned on (if it comes with an independent power source) and is online (ready to use).
?? Make sure that the printers signal cable is properly connected.
?? Make sure that the printer driver is correctly installed.
?? Make sure that you have assigned the printer port correctly in your operating system or application program.
?? Make sure that the printer port is enabled in the SCU program. The printer prints garbled information.
?? Make sure that the printer driver is correctly installed.
?? Make sure that the printer cable is properly connected. Software Problems An application program does not work correctly.
?? Make sure that the software is correctly installed.
?? If an error message appears on the screen, consult the software programs documentation for further information.
?? If you are sure the operation has stopped, reset the computer. (See Resetting the Computer in this chapter.) 8-12
! |wqC Sound Problems No sound is produced.
?? Make sure that the volume control is not set too low.
?? Make sure that the audio driver is correctly installed.
?? Make sure that the computer is not in Standby mode.
?? If using an external speaker, make sure that the speaker is properly connected. Distorted sound is produced.
?? Make sure that the volume control is not set too high or too low. In most cases, a high setting can cause the audio electronics to distort the sound. The sound system does not record.
?? Adjust the playback or recording sound levels. The external microphone or audio device does not work.
?? Make sure that the microphone is connected to the proper connector on the computer.
?? Make sure that your computer is equipped with the driver needed.
?? Click the speaker symbol on the taskbar and check the Windows volume control.
?? Check the volume control of your computer. Startup Problems When you turn on the computer, it does not respond and the Power Indicator does not appear.
?? If you are using an external AC power, make sure that the AC adapter is correctly and securely connected. If so, make sure that the electrical outlet works properly.
! |wqC 8-13
?? If you are using the battery power, make sure that the battery is not discharged. When you turn on the computer, it stops after POST.
?? Restart your computer. The message Operating system not found appears on the screen after you turn on the computer.
?? Make sure that there is no floppy disk in the floppy disk drive. If there is, remove it and restart the system.
?? If this message appears when you are booting from the hard disk, insert a bootable disk in the floppy disk drive and check the condition of the hard disk. The message Invalid system disk or Disk error appears on the screen after you turn on the computer.
?? If you are deliberately trying to boot from a floppy disk, replace the disk with a bootable one and press any key to continue booting.
?? If you are booting from the hard disk, make sure that there is no floppy disk in the floppy disk drive. If there is, remove it and restart the system.
?? If this message appears when you are booting from the hard disk, insert a bootable disk in the floppy disk drive and check the condition of the hard disk. Other Problems The date/time is incorrect.
?? Correct the date and time via the operating system or SCU program.
?? After you have performed everything as described above and still have the incorrect date and time every time you turn on the computer, the RTC (Real-Time Clock) battery is at the end of its life. Call an authorized dealer to replace the RTC battery. 8-14
! |wqC Resetting the Computer You may have to reset (reboot) your computer on some occasions when an error occurs and the program you are using hangs up. If the system operation seems to hang up, first wait. It is possible that the system is processing data. Periodically check the hard disk drive in-use indicator, if it flashes irregularly, the program may be accessing data and preventing you from using the keyboard. If you are sure the operation has stopped and you cannot use the restart function of the operating system, reset the computer. Reset the computer by any one of these method:
?? Press Ctrl+Alt+Del if you have an external keyboard connected.
?? If the above action does not work, turn off the system. Wait for at least five seconds and turn it on again.
?? It the above does not work, insert a small rod, such as a straightened paper clip, into the reset switch on the right side of the Tablet PC and press firmly. Reset Switch CAUTION: Resetting will cause any unsaved data to be lost.
! |wqC 8-15
?? It the above two methods does not work, insert a small rod, such as a straightened paper clip, into the keyboard BIOS reset switch on the inside of the secondary battery compartment of the Tablet PC and press firmly. Reset Switch 8-16
! |wqC APPENDIX A Specifications NOTE: Specifications are subject to change without any prior notices. Parts CPU Cache Memory ROM BIOS RAM Display System Video Panel Video controller Video port Keyboard (external/wireless) optional Pointing device Storage device Floppy disk drive Hard disk drive CD/DVD drive Audio Audio controller Audio port Specifications Intel Pentium M Processor LV1.1GHz in ?-FCBGA package FSB 400MHz CPU thermal ceiling: 12W on-die 1MB L2 cache 512 KB Flash EEPROM 256 MB, Max: 1GB Share system 4 MB (built-in on VGA chip) 10.4-inch TFT XGA LCD, resolution up to 1024768 10.4-inch touch screen Sunlight Readable Panel ( Transflective LCD ) optional Integrated into ATI 3D RAGE Mobility-M or M1, hardware 2D/3D video/graphics accelerator VGA port via optional Port Replicator module Standard keys, numeric keypad, 12 function keys, and Windows keys A touch-sensitive control pad with Microsoft Win mouse function
(Optional) Rubber Keyboard 3.5-inch, 1.44 MB (via optional USB FDD module on Expansion port) 2.5-inch, IDE, Ultra DMA33 supported 24X CD-ROM or above 8X DVD-ROM or above
(both via optional CD/DVD-ROM module on Expansion port) AC 97 audio support MS-Sound compatible Built-in one speaker (Mono) Two audio ports for Mic-in / Earphone-out Parts Specifications Type I or Type II x 1, Card Bus support IR port for wireless keyboard HP-SIR port, RJ-11 fax/modem port Mic-in, Line-out, Private port (Serial port, USB 2.0 port CCD port (USB-type) IEEE 1394, serial ports, RJ-45, USB 2.0 port GPRS/GSM or CDMA GPS PCMCIA Solt USB port (supports USB FDD boot-up function), serial port, ECP/EPP parallel port, PS/2 port, Mic-in/Line-in/Line-out, CD-audio 56 Kbps internal Fax Modem Integrated WLAN (Intel Centrino platform) with built-in antenna 100?240 V AC, 50?60 Hz auto-switching 12~32 V DC Li-ion battery, 6 cells Li-ion battery, 4 cells; support hot swap 11.69.31.65 inch (29523642 mm) 5.06 lb (2.3kg) without Backup battery pack Temperature Operating: 0?C (32?F) to 50?C (122?F); -20?C (-4?F) to 50?C (122?F)
(Optional) Storage: 40?C (40?F) to 70?C (158?F) Operating: 5% to 95% RH, non-condensing PCMCIA I/O ports On front panel On left side On right side On underside X-Bay interface
(option) Expansion port
(option) Modem Wireless LAN Power AC adapter Car adapter Primary battery Backup battery
(option) Dimension (WDH) Weight Environment Humidity A-2
1 | Users Manual LAN Card | Users Manual | 279.70 KiB |
Users Guide PRO/Wireless 2200BG Network Connection Model WM3B2200BG Intel(R) PRO/Wireless 2200BG User's Guide Your Intel(R) PRO/Wireless 2200BG Network Connection adapter works with either 802.11b or 802.11g wireless standard. Operating at 2.4 GHz frequency at speeds of up to 54 Mbps you can now connect your computer to high-capacity existing 802.11b networks using multiple access points within large or small environments, and also to high-speed 802.11g networks. Your wireless adapter maintains automatic data rate control according to access point location to achieve the fastest possible connection. All your wireless client connections can be easily managed by the Intel(R) PROSet for Wireless utility. Using the PROSet Profile Wizard, you can create profiles automatically to suite your specific connection requirements. Enhanced security measures using 802.1x, WPA encryption and authentication, and 128-bit WEP encryption is standard for both 802.11b and 802.11g. Introduction to Wireless Networking Software Installation Using Intel(R) PROSet Connecting to a Network Security Overview Setting Up Security Troubleshooting Specifications Glossary Customer Support Safety and Regulatory Notices Warranty Adapter Registration Information in this document is subject to change without notice.
(c) 20002003 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA The copying or reproducing of any material in this document in any manner whatsoever without the written permission of Intel Corporation is strictly forbidden. Intel(R) is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Intel disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are registered trademarks of Microsoft Corporation.
*Other names and brands may be claimed as the property of others. Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein. September 2003 Back to Contents Page Wireless LAN Overview: Intel(R) PRO/Wireless 2200BG User's Guide About Wireless LAN Technology l Choosing a WLAN l Configuring a WLAN l Identifying a WLAN l Surveying the Site of Your WLAN l Factors Affecting Range A wireless network connects computers without using network cables. Computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point. When you set up your wireless adapter, you select the operating mode for the kind of wireless network you want. You can use your wireless adapter to connect to other similar wireless devices that comply with the 802.11 standard for wireless networking. Choosing a Wireless LAN Wireless LANs can operate with or without access points, depending on the number of users in the network. Infrastructure mode uses access points to allow wireless computers to send and receive information. Wireless computers transmit to the access point, the access point receives the information and rebroadcasts it to other computers. The access point can also connect to a wired network or to the Internet. Multiple access points can work together to provide coverage over a wide area. Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. Ad Hoc Mode is only supported in 802.11b and 802.11g networks. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless LAN There are three basic components that must be configured for an 802.11 wireless LAN to operate properly:
l Network Name: Each wireless network uses a unique Network Name to identify the network. This name is called the Service Set Identifier (SSID). When you set up your wireless adapter, you specify the SSID. If you want to connect to an existing network, you must use the name for that network. If you are setting up your own network you can make up your own name and use it on each computer. The name can be up to 32 characters long and contain letters and numbers. l Profiles: When you set up your computer to access a wireless network, the wireless client manager creates a profile for the wireless settings that you specify. If you want to connect to another network, you can scan for existing networks and make a temporary connection, or create a new profile for that network. After you create profiles, your computer will automatically connect when you change locations. l Security: The 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data. If you are connecting to an existing network, use the encryption key provided by the administrator of the wireless network. If you are setting up your own network you can make up your own key and use it on each computer. m Wi-Fi Protected Access (WPA) is a security enhancement that strongly increases the level of data protection and access control to a WLAN. WPA mode enforces 802.1x authentication and key-exchange to strengthen data encryption. WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements that include a per-packet key mixing function, a message integrity check (MIC) named "Michael", an extended initialization vector (IV) with sequencing rules, and a also re-keying mechanism. Using these improvement enhancements, TKIP protects against WEP's known weaknesses. m Cisco Client Extention (CCX) is a server and client 802.1x authentication via a user-supplied logon password. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help protect the privacy of transmitted data. Identifying a Wireless Network Depending on the size and components of a wireless LAN, there are many ways to identify a wireless LAN:
l The Network Name or Service Set Identifier (SSID): Identifies a wireless network. All wireless devices on the network must use the same SSID. l Extended Service Set Identifier (ESSID): A special case of SSID used to identify a wireless network that includes access points. l Independent Basic Service Set Identifier (IBSSID): A special case of SSID used to identify a network of wireless computers configured to communicate directly with one another without using an access point. l Basic Service Set Identifier (BSSID): A unique identifier for each wireless device. The BSSID is the Ethernet MAC address of the device. l Broadcast SSID: An access point can respond to computers sending probe packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network. It greatly reduces the amount of troubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing. To conduct a site survey, you will need the following tools:
l An access point (or laptop computer) that is set up to be the transmitter. It should be mounted near and at the same height as the designated location of your wireless LAN. l A laptop that will act as the mobile receiver. It must contain your site survey software. l An area or building map, which will be used to plot the strength of your signals. Once you have the tools you need, you are ready to survey the inside of the building. Launch the site survey software on the mobile receiver laptop and carry it around in the intended wireless LAN area to test the signal strength. Be sure to also check the signal strength of each intended access point location. If you encounter problems while surveying the site, make sure your transmitter laptop is not located on a wall containing metal, such as an air-conditioning duct, which will interfere with the range of your signal. Simply move the transmitter and test the signal strength again. For users to have seamless coverage when moving from access point to access point, the signal levels at each point must overlap. There is software available that will seamlessly hand off changing signal levels from one access point to another. Your building's infrastructure can sometimes interfere with the microwave signal, but finding the location and cause of the interference will allow you to figure out the best place to mount your access points for optimal area coverage. Microwave signals travel in all directions, which means there is one access point for a multi-floor building. However, the range is highly dependent on the material used to construct the flooring, especially metal materials. Once your signal strength is strong inside the building, you are ready to check the strength outside the building. To do so, simply carry the mobile receiver laptop as far down the street or around the building as you can go without losing significant signal strength. If possible, you should be aware of the types of networks being used by the companies on the floors above and below you, so that you can work together in harmony. With wireless networks, security is very important and if you communicate with those around you, you are better prepared to select the right channels, as well as the best location for access points. Factors Affecting Range Although access points can transmit signals up to 60 feet away in an area with many walled barriers or as much as 500 feet away in a large open area, the range is affected by the following factors:
l Building materials, such as steel and drywall, can shorten the range of the radio l Physical layout of the area can interfere with the signals and cause them to be signals. dropped. l Electronic noise from cell phones, microwave ovens, or other devices on the same frequency can interfere with the transmission of the signals. l Range is inversely proportional to data rate, so the faster that the signals are sent, the less distance they will travel. Taking these factors into consideration when you survey the site for your WLAN is key to providing all of your users with undisturbed mobile connectivity. Using multiple access points will, of course, reduce the impact of these factors if your area has dividing walls throughout. What is a Site Survey?
A site survey is an in-depth examination and analysis of a proposed wireless LAN site. The purpose of a site survey is to determine the number of access points needed, the types of antennas needed, and the best placement for those access points and antennas. Although the goal of a site survey is simple, the means of arriving at that goal are not. Some of the steps involve taking measurements, but most involve experience, trial and error, and a little guesswork rather than numbers and figures. When to Perform a Site Survey Intel recommends that you perform a site survey prior to installing a wireless LAN. Site surveys are especially important when:
l You are installing a new site: Evaluate the placement of the access points and antennas throughout the proposed site. l You are changing an existing site: When modifying or extending an existing network structure, re-evaluate the placement of the access points and antennas. If you need a different level of coverage in some areas, you may need to move, replace, or supplement access points and antennas. l You are physically changing the site: Remodeling may introduce new sources of interference, such as motors and metal structures within the coverage area of the access point, even if it does not directly effect the sites where the access points are located. Elements of an Effective Site Survey An effective site survey requires four elements. Failure to commit the appropriate time, money, and energy to accomplish a proper site survey in advance may result in greater expenditures of money and time later, when problems arise that require repeated adjustments to the wireless configuration. The three elements of an effective site survey are:
1. Examine the network usage problems solved by the wireless LAN. How many clients need a wireless LAN connection? What areas of the site require wireless LAN connectivity? How many hours each day is wireless LAN connectivity required? Which locations are likely to generate the largest amount of data traffic?
Where is future network expansion most likely?
2. Study blueprints of the proposed wireless LAN site. A site blueprint provides a map of the site as well as the location of objects, such as walls, partitions, and anything else that could affect the performance of a wireless LAN. Examining the site blueprint prior to conducting the physical walk-
through helps you identify areas in which wireless equipment is likely to perform well and areas where it is not. Many obstructions are not readily visible and, in some cases, a room originally built for a specific purpose, such as a radiology lab, might have been converted into something completely different, such as a conference room. The blueprint may also show areas proposed for future building expansion. To prepare for the next step of the site survey, mark possible wireless device locations on the blueprint and refer to the marked blueprint during the physical walk-through and inventory. 3. Conduct a physical walk-through and inventory. The primary purpose of the physical walk-through is to document any items or materials near a proposed device location that may interfere with reception or transmission and affect network performance. Document stock and inventory levels, current environmental conditions and any materials that may interfere with the wireless LAN. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Software Installation: Intel(R) PRO/Wireless 2200BG User's Guide Software Installation Installing Drivers and Intel(R) PROSet Software See the instructions for your operating system:
l Windows 2000 l Windows XP Installation under Windows* 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions:
l The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. l The computer has not been powered on since the hardware installation was completed. l No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW2200\WIN2K on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. After loading the Windows 2000 operating system, be sure to log in with administrative rights. If you log in to Windows 2000 without administrative rights, you may run into problems during the installation. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Driver Installation To install driver software in Windows* 2000, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights when prompted by Windows 2000. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD-ROM into your CD-ROM drive. If the Intel(R) PRO Network Connections menu screen appears, leave it open and click the Found New Hardware Wizard dialog to make that the active window. 5. On the Install Hardware Device Drivers screen verify that Search for a suitable driver for my device (recommended) is selected, then click Next. 6. When the Locate Driver Files dialog appears, verify that the item CD-ROM drives 7. When the Driver Files Search Results dialog appears, indicating that a driver was is checked and click Next. found, click Next. 8. On the Network Name screen, click Next to accept the default Network Name
(SSID), or enter a specific SSID for your network, then click Next. 9. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 10. On the Found New Hardware Wizard screen, click Finish. Proceed to install Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility (required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start
> Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXPT32 on the Intel CD supplied with the product. Skip Steps 11 and 12 below and continue with Step 13. 11. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters. This screen may have been launched in step 4 above. If the screen is not visible when you close the Found New Hardware Wizard dialog, display it by removing and re-inserting the Intel CD, or by running autorun.exe from the CD. 12. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 13. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 14. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 15. On the Setup Type screen, verify that Typical is selected, then click Next. This is the recommended setting for a first-time installation. 16. On the Ready to Install the Program screen click Install. 17. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 18. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Uninstalling Intel(R) PROSet After uninstalling Intel(R) PROSet using the "add/remove" feature in Windows, re-
boot the computer. Any current connection remains active (the profile is active) until the computer re-boots. Installation under Window* XP Preliminary Notes The installation instructions in this section are based on the following assumptions:
l The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. l The computer has not been powered on since the hardware installation was completed. l No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW2200\WINXP on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer restarts, the driver will be automatically installed. Before proceeding, make sure that you are operating Windows XP with administrative rights. If you log in to Windows XP without administrative rights, you may run into problems during the installation. The Intel(R) PROSet utility or the Windows XP wireless configuration feature can be used to configure wireless network settings. The instructions below include steps for installing the Intel(R) PROSet utility and for turning off the Windows XP configuration feature. If you do not turn off the Windows XP feature, you will not be able to use Intel(R) PROSet to configure wireless network settings. For information on how to use the Windows XP feature, see your Windows XP documentation. Driver Installation To install drivers under Windows* XP, follow these steps:
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights if prompted by Windows XP. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. Verify that Install the software automatically
(Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive. The New Hardware Found Wizard searches for the correct driver files and copies them to your hard drive. 5. On the Network Name screen, click Next to accept the default Network Name
(SSID), or enter a specific SSID for your network, then click Next. 6. On the Data Encryption screen, click Next to accept the default encryption setting None, or enter specific encryption settings for your network, then click Next. 7. On the Found New Hardware Wizard screen, click Finish. Proceed to disable the Windows XP wireless configuration feature. Disable Windows XP Wireless Configuration (Required) To disable the Windows XP wireless configuration feature so that you can use Intel(R) PROSet for wireless configuration, continue as follows:
Instructions are written for use with the Windows XP Start Menu and Control Panel Category View, not with "Classic" Start Menu or Control Panel views. 8. Click Start and Control Panel. 9. On the Pick a category screen, click Network and Internet Connections, then under the heading or pick a Control Panel icon click Network Connections. 10. In the Network Connections window, right-click your Wireless Network Connection and select Properties. 11. Select the Wireless Networks tab. 12. Click to clear ("deselect") the check box Use Windows to configure my wireless network settings, then click OK on the Wireless Network tab. Do not click any other tabs. Continue with the installation of Intel(R) PROSet. Intel(R) PROSet Installation (Required) Continue with the following steps to install the Intel(R) PROSet wireless configuration utility (required):
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet installer manually using Start
> Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXP32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 15. 13. Display the Intel(R) PRO Network Connections screen by removing and re-
inserting the Intel CD, or by running autorun.exe from the CD. Click Wireless LAN Adapters. 14. On the Intel PRO/Wireless LAN Adapters menu screen, click Install Software. 15. On the Welcome to the InstallShield Wizard for Intel(R) PROSet screen, click Next. 16. On the License Agreement screen, after reading the license agreement, select I accept the terms in the license agreement and click Next. 17. On the Setup Type screen, select Typical and then click Next. This is the recommended setting for a first-time installation. 18. On the Ready to Install the Program screen click Install. 19. After the software is installed on your computer, click Finish. Click Exit to close the Intel(R) PRO Network Connections screen. 20. To launch Intel(R) PROSet, double-click the Intel(R) PROSet icon in the system tray or follow the path Start > Programs > Intel Network Adapters > Intel(R) PROSet. For additional information on the program, press F1 or click Help while the program is running. Uninstalling Intel(R) PROSet After uninstalling Intel(R) PROSet using the "add/remove" feature in Windows, re-
boot the computer. Any current connection remains active (the profile is active) until the computer re-boots. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Troubleshooting: Intel(R) PRO/Wireless 2200BG User's Guide Troubleshooting l LAN Utility Conflict Message l Using a Profile with an incorrect WEP Encryption Key l Problems with installation l Before calling Customer Support l Users are dropped from the wireless network l Range decreases as data rate increases l Signal doesn't pass through a short or thin wall l Signal strength drops when a cell phone is used in area l Range is shorter than it should be l Interference from fluorescent lights l When too much range is undesirable l Help Prevent access to wireless networks from outside the building l Problems with network connectivity l Checking Adapter Statistics LAN Utility Conflict Message Message dialog "Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features" is displayed. Refer to Enabling Intel(R) PROSet to manage Your Wireless Connections for information. Using a Profile with an incorrect WEP Encryption Key When connected to an access point using a profile with an incorrect WEP key encryption, the task tray icon and the General page will both indicate good signal strength and that you are associated with the AP. However, when you attempt to send data to the AP using this profile, because of the incorrect WEP key encryption, authentication cannot be established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key:
l A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point. l No data transfer Open Authentication with no WEP encryption:
l Allows association to an access point l Data transfer is allowed Shared Authentication:
l Associated to an AP always allows data transfer. Problems with installation Windows does not detect the wireless adapter:
1. Remove and re-install the adapter. 2. Uninstall and reinstall the adapter's drivers. Before calling Customer Support Make a note of the following answers before calling customer support:
l From the General tab, view the adapter's connection details. Check that it is associated with an access point, and the quality and strength of the signal. l From the General page, click the Details button and check what revision of software and hardware or other LAN software are you running?
l How many remote units do you have talking to each access point?
l What channels are you using, and how are they dispersed?
l How much coverage overlap is there between access points?
l How high above the floor are the access points mounted?
l What other electronic equipment is operating in the same band?
l What construction materials are used in wall and floors?
Users are dropped from the wireless network Suggested causes and solutions:
l Find out if a person or workgroup moved or if the building has been rearranged. l If two or more users are seated too close to each other, performance can suffer. Instruct your users to space themselves a small distance apart to keep receivers from being overloaded. l Delivery trucks with very large metal sides can affect performance by reflecting destructive signals back into a building. If you have an installation that includes a shipping dock, check to see if the problem coincides with the arrival of large trucks. l Personal systems can also interfere with your network. Wireless speakers, cordless earphones, some Bluetooth devices, and similar systems can be the source of an infrequent but hard to find the problem. Some systems do not conform to wireless regulations. Shut off suspect devices or remove them from the area. l If possible, remove and reinstall your new software. Conflicts with other resident software packages are always a possibility, and they are not always the fault of the newest addition. Sometimes just starting over fixes the problem. l Swap units around. Does your problem follow the changed units, or is it unique to a specific location? If it follows the product, the swapped unit could be damaged, or improperly configured. If the problem stays with the location, try to find out what is different about that particular room or area. Range decreases as data rate increases This is a normal condition. Range is inversely proportional to data rate: the faster the data, the shorter the range. This has to do with the modulation technology used. Very fast data rates require extremely complex signal waveforms, where even minor distortions can result in data errors. Slower data rates are much more tolerant, and consequently will get through even in the presence of some amount of noise, interference, distortion and echo. Signal doesn't pass through a short or thin wall Range is highly dependent on the physical environment. In a line-of-sight location, with elevated and calibrated antennas, range predictions are quite accurate. This is not true in a typical office building, where the walls may be simple drywall (which is almost transparent to microwaves), or could be plaster with metal underneath. Most sites are somewhere between these two extremes, and consist of a mixture of surfaces. You cant tell what is inside a wall by just looking at it, and we cant tell you exactly what distance you will achieve. Consider published range information to be typical, average, common or usual. Do not expect it to be exact. Signal strength drops when a cell phone is used in the area Range also depends on the electronic environment. If other equipment that could cause interference is nearby, the range of your transceiver could vary widely, and could change suddenly when the other equipment activates. This is particularly true for 802.11b installations, which share their frequencies with microwave ovens, cordless phones, wireless hi-fi speakers, electronics toys and similar devices. Try to keep your system away from other transmitters, and from other sources of electrical noise, such as large motors, spot welders, and similar electronically noisy devices. Range is shorter than it should be Repeat some tests late in the evening, or on a weekend, when there may be less interference. However, some users leave their networks turned all the time so this test is not foolproof. By all means, try more than one channel. Your range problem may just be a nearby user whose system uses your present test channel. Interference from fluorescent lights If you mount an access point close to fluorescent light fixtures, the lamp glow appears constant, but inside the lamp tube, ionization appears and disappears 120 times a second. This can modulate or chop an incoming signal and interfere with reception. When too much range is undesirable Too much range is not necessarily a good thing. At first it would appear that you would want as much range as possible, but with the increase in range comes an increase in interference potential, as your unit hears not only your other units but also manages to hear the systems of other companies up and down the street. If you have a large installation, you will also wind up with more than one access point using the same channel. If a remote unit hears two or more access points, this will slow the network. Help Prevent access to wireless networks from outside the building Excess transmit range presents a special reverse problem. For example, putting an access point adjacent to a second floor bay window invites anyone with the right software on the street below to pick up and enjoy all network transmissions. We discuss some possible solutions to this problem further on. Problems with Network Connectivity If you cannot connect to the wireless network, try the following:
Check Network Settings 1. From the General page, check that the Network Name (SSID) and operating mode are correct. If the laptop is configured for ad hoc networking, make sure that the channel is correct. 2. To correct these settings, click the Networks tab. 3. Select the profile being used. 4. Click the Edit button and make the changes. Access Point Connection Problems Check the preamble length setting in the Windows Device Manager Advanced tab. If it is determined that a short preamble length is required to connect to an access point, try changing the "Auto (default) setting to "Long Only," this option always uses a long preamble. Refer to "Changing the Preamble Length Setting" for details. Check Security Settings 1. From the General page, check that the security settings are correct. 2. To correct the security settings, click the Networks tab. 3. Select the profile being used. 4. Click the Edit button. 5. Click the Security tab. Make sure that the settings for WEP encryption are correct. Checking Adapter Statistics Adapter Statistics If the adapter is communicating with an access point (infrastructure mode) or other computers in peer-to-peer mode, click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Connecting to a Network: Intel(R) PRO/Wireless 2200BG User's Guide Connecting to a Network using Intel(R) PROSet l Enabling Intel(R) PROSet to manage Your Wireless Connections l System Wide Advanced Settings l Intel(R) PROSet Configuration Service l Scanning for Available Networks l Connecting to a Network Using an Access Point l Connecting to a Peer-to-Peer (Ad Hoc) Network l Switching the Radio Off and On l Disable the Radio from Windows l Viewing Adapter Advanced Settings in Windows l Changing the Preamble Length Setting Enabling Intel(R) PROSet to manage Your Wireless Connections If you are using Windows XP as your wireless manager the following described how to enable Intel(R) PROSet as your wireless manager. 1. From the Desktop, Click the Start button > Control Panel. If you are looking at the Category View of Control panel, click switch to classic view. If you are looking at the classic view of control panel, go to the next step. 2. Right-click Network Connections, then click Open. 3. In Wireless Network Connection Properties, Click the Wireless Network tab, verify that the Use Windows to configure my wireless network settings checkbox is clear
(unchecked). 4. Double-click the Intel(R) PROSet icon in the desktop task tray. 5. If you have previously setup your profiles, click the Networks tab. The profile list should display available networks to connect to. If no profiles have been established, refer to Creating a New Profile for more information. System Wide Advanced Settings Profile Management Options The following Profile Management options can be found in Advanced Settings. Display available networks when not associated: When cleared, disables the Intel(R) PROSet wireless manager dialog listing the available networks. When checked, the Intel Configuration Service running in the background automatically displays available networks not listed in the Profile List. This method provides automatic connection to available networks in the range of your wireless adapter. The Configuration Service constantly monitors your wireless adapter's connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter. The Configuration Service can also be used if there is more than one wireless adapter installed using 802.11b bands. When the Intel Configuration Service dialog is displayed, listing the available networks, checking "Dont show this again" option, will prevent the dialog from displaying again if the adapter becomes unassociated. The Configuration Service will continue to function and attempt to connect, using a profile from the Profile List, or to an available network depending on the selection mode. This means that if Connect Using Preferred Profiles Only is selected and no matching profile is found, then the adapter will remain unassociated. You can still use the Connect button from the Networks tab to connect to an available network. Notify when disabling profile management features: When cleared, Windows XP Zero Configuration wireless manager is enabled. When checked, a message dialog
"Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features" is displayed. For instance, if Windows XP Zero Configuration is enabled, the Connect button on the Profile page cannot be used to connect to any available networks. The Scan button can be used to scan for available networks. However, the Connect button is non-functioning when used to connect to an available network. l Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is non-
functioning. l Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. Notify when Windows XP Zero Configuration is enabled: If the box is cleared (default setting is checked), it indicates that Windows XP Zero Configuration wireless manager is enabled. The XP notification dialog is displayed indicating that Windows XP is currently configured to manage the wireless adapter. Do you wish to disable Windows XP management and let Intel(R) PROSet manage your wireless network?
l Select yes, Intel(R) PROSet will manage the wireless adapter. l Select No, Windows XP will manage the wireless adapter. Enable Profile Management Features: If the box is checked, it indicates that Intel(R) PROSet is the default wireless network manager. If cleared, Windows XP is the wireless network manager. NOTE: If Windows XP Zero Configuration is enabled while using Intel(R) PROSet, a notification dialog displays, if you choose "No" on this dialog, the Intel(R) PROSet profile management features are disabled. Refer to the Advanced Settings for more information. Mixed mode protection: Use RTS/CTS enabled to avoid collisions in mixed mode environments where the 802.11g and 802.11b clients cannot hear each other. CTS-to-
self enabled improves performance in mixed mode environments where 802.11g and 802.11b clients are in close proximity and can hear each other. Intel(R) PROSet Configuration Service The Configuration Service feature operates in background to automatically display available networks not listed in the Profile List. This method provides automatic connection in a 2.4 environment to available networks in the range of your wireless adapter. The Configuration Service constantly monitors your wireless adapter's connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter. The Configuration Service can also be used if there is more than one wireless adapter installed using 802.11b band. The Configuration Service features:
l The Configuration Service is launched when you log on to your computer. l No active profile switching will be performed. Once the adapter is associated with the access point, if a higher priority profile becomes available, no switching will occur. l The Configuration Service is only available if Intel(R) PROSet is installed. l If a connection to an access point cannot be made using any of the profiles in the Profile List, a dialog will display the available networks. l If there are multiple profiles listed for an available network, a dialog box will list the profiles for you to choose from. l If an available network is detected with WEP encryption and authentication, a dialog for setting up WEP encryption displays before the connection is made. The Configuration Service can be used in two ways:
1. Connect to available network using profiles only: In this mode the Configuration Service attempts to connect to a network access point using profiles from the Profile List only. If no matching profile is found, a dialog appears that lists the available networks. You can also close this dialog without connecting by clicking the Cancel button. The adapter will remain unassociated, and the list of available networks will NOT be displayed again unless another available network is detected. This mode is set in the Advanced Setting options. 2. Connect to any available network if no matching profile found: In this mode the Configuration Service attempts to connect to a network access point first using profiles from the Profile List. If no matching profile is found, the Configuration Service automatically connects to any available network. This mode is set in the Advanced Setting options. Enabling Automatic Connection The Configuration Service also monitors for the "resume status" after a laptop computer suspend event. When this occurs, the Configuration Service will re-enable the automatic connection service. These features can be enabled again after rebooting your computer or after a suspend and resume cycle. Features affected when another profile management application is detected For AAA Client:
Select OK, and the AAA Client application will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. To avoid conflicts, the Intel(R) PROSet profile management features have been temporarily disabled. To re-enable these features, first disable the other LAN utility and then either:
1. Re-enable from Intel(R) PROSet's Advanced Settings. 2. Resume after a computer suspend. 3. Reboot the computer. NOTE: AAA Client Wireless Manager - If PROSet detects another wireless AAA client manager, a notification dialog displays, if you choose "OK" on this dialog, the Intel(R) PROSet profile management features are automatically disabled. The Advanced Setting "Notify when disabling profile management features" check box must be checked in order to display the notification dialog if Windows XP Zero Configuration in not enabled. The default setting is enabled
(checked). For Windows XP Zero Configuration:
l Select Yes, to disable Windows XP Zero Configuration. Intel(R) PROSet will continue to manage the adapter. l Select No, Windows XP will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. You can also prevent the dialog from being displayed again, in which case Windows XP Zero Configuration will automatically manage the wireless adapter. The notification dialog can be re-enabled from the Advanced Settings options. Affected Intel(R) PROSet features:
l The Connect button on the Profile page is non-functioning. l The Scan button can be used to scan for available networks, however, the Connect button is non-functioning when used to connect to an available network. l Ad hoc mode is disabled. The Connect button in the ad hoc connect dialog is non-
functioning. l Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. NOTE: If the buttons described above are used, the following message displays:
"Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features."
Scanning for Available Networks A fast way to connect to a network is to use the Scan button to search for a network access point in range of your wireless adapter. When a network is found, you can instantly connect without a profile or create a new profile. NOTE: Profiles with the Enable Auto-Import feature enabled will also be displayed in the profile list of available networks. Refer to Automatic Profile Distribution for more information. To scan for available networks:
1. From the General page, select the wireless adapter on the left side pane. 2. Select the Networks tab. 3. Click the Scan button. 4. The Available Networks dialog displays the names of the available networks. Click the Refresh button to refresh the list of available networks. 5. Select the network from the list, and click the Connect button. 6. Select the network profile name with <no profile> shown, and click the Connect button. 7. Click the No, connect me directly without creating a profile option. Note, you can click Yes, create a profile for this network now to create a profile to be used later. NOTE: If the selected network has 802.11x authentication, you must first create a profile using the Profile Wizard. However, if the network has no WEP security
(Open), WEP 64 or 128-bit encryption, or WPA-PSK, you can enter the required security settings in the dialog that displays after clicking the Connect button. Then a one time connection without a profile can be made. l The selected network has WPA-PSK security settings: If the selected network has 802.1x authentication security settings, after clicking the Connect button, the Profile Wizard Advanced Security page will display. From this dialog you can enter the 802.1x settings and connect to the network. l The selected network has no (Open) WEP security settings: If the selected network has no security (Open). Click the Connect button to connect to the network. l The selected network has WEP security settings: If the selected network has WEP encryption security settings, after clicking the Connect button, the Profile Wizard Advanced Security page will display. From this dialog you can enter the WEP security settings and connect to the network. 8. Click OK to connect to a network. Connecting to a Network Using an Access Point An infrastructure network consists of one or more access points and one or more computers with wireless adapters installed. Each access point must have a wired connection to the Local Area Network (LAN). You can connect to a network by first creating a new profile using the Profile Wizard, then selecting that profile to connect to the network access point using the Connect button. You can also connect to a network, by using the Scan button. Refer to Creating a New Profile for more information. Connecting to a Peer-to-Peer (Ad Hoc) Network In peer-to-peer (ad hoc) mode, you can send and receive information to other computers in an ad hoc network. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. NOTE: While scanning with an ad hoc profile set to a specific transmit channel, if an ad hoc network is found on another channel, you will be connected using the new channel. The new channel number is displayed in the Adapter Settings. Connect to an Ad Hoc Network NOTE: For information about connecting to an ad hoc using a profile, refer to Create an Ad Hoc Profile using the Profile Wizard. l Connect using an ad hoc profile. Refer to Creating a New Profile for details. Select an ad hoc profile from the Profile List and click the Connect button. This method uses a pre-defined ad hoc profile created by the Profile Wizard. The ad hoc profile is displayed in the Profile List. When joining an ad hoc network, the transmit channel established by the first computer is used. This channel may be different than the one selected when the ad hoc profile was created by the Profile Wizard. Ending an Ad Hoc Session To end an ad hoc session, click the Close button. After the session is ended, an attempt is made to re-connect to the last profile used from the Profile List. Creating an Ad Hoc Profile Using the Profile Wizard The following describes how to create a new ad hoc profile using the Profile Wizard and connect to an ad hoc network General Settings 1. From the General page, click the Networks tab. 2. Click the Add button. The General Settings dialog displays. 3. Enter a profile name in the Profile Name field. 4. Enter the network SSID, in the Network Name (SSID) field. 5. Click Ad hoc operating mode. 6. Click Password protect this profile to set a profile password. 7. Click Next. Security Settings 8. Select either None, WEP for the data encryption. 9. If WEP is selected, select either 64 or 128-bit for the Encryption Level. 10. Select the key index 1, 2, 3 or 4. 11. Enter the required pass phrase or hex key. 12. If the Password Protection checkbox was checked on the General settings page, then click Next to display the Password page. Password Protection Settings 13. Click the Password protect this profile checkbox. 14. Enter a password in the Password field. 15. Reenter the same password in the Confirm New Password field. 16. Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page. Connect to the Network 17. Changing the default transmit channel from the Adapter tab: Unless the other computers in the ad hoc network use a different channel from the default channel, there is no need to change the default channel. If you want to change the default channel, click the Adapter tab, and click Configure under Ad Hoc Channel Selection. Choose the operating band select a channel. Click OK to save the setting. 18. Select the Networks tab 19. After creating the new profile, click the profile in the Profile List. Profiles using ad hoc mode are indicated by a computer icon next to the profile name. 20. Click the Connect button to connect to the ad hoc network. Switching the Radio Off/On When your computer is switched on, if the radio is enabled it is constantly transmitting signals. In certain situations, such as landing or takeoff of an airplane, the radio signals may need to be turned off, if not these signals may cause interference. The following describes how to use your keyboard (if this option is available) and Intel(R) PROSet to switch the radio on or off. The radio can be enabled or disabled from your computer keyboard, the task tray wireless menu option and from Intel(R) PROSet. The current status of the radio is displayed in the task tray wireless icon and on the General page. Using the optional hardware radio on/off switch The radio can enabled or disabled from your keyboard, or from an external hardware switch if these options are available. Refer to your computer manufacturer for more information. Intel(R) PROSet displays the current state of the radio on the General page if one of these option is installed. Using Intel(R) PROSet to switch the radio on/off The radio can be switched on or off from General page in Intel(R) PROSet. The current state of the radio is displayed in the wireless adapter task tray menu option. The General page also displays the current state of the radio if the hardware option is installed. Switching the radio On/Off Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. To switch the radio OFF: From the General page; click the Off button next to Switch Radio On/Off. l The wireless adapter is not associated with the network when the radio is off. l Intel(R) PROSet can be used to edit or add profile contents when the radio is off. To switch the radio ON: From the General page; click the On button next to Switch Radio On/Off. When the radio is on, an attempt will be made to associate with the network access point using the last profile. If the adapter cannot connect to the access point, the Configuration Service will attempt to find an available network. Refer to Configuration Service for more information. Switching the radio on or off from the Task Tray menu option Right-click the wireless icon in the task tray and select the wireless adapter being used. Depending on the previous state of the radio, select Switch Radio Off (radio is already ON, select to turn OFF) or Switch Radio On (radio is already OFF, select to turn ON). Disable the Radio from Windows The radio can be disabled (made non-functional) via the Windows operating system using Device Manager. Windows XP/2000 1. From your desktop, right-click My Computer and click Properties. 2. Click the Hardware tab. 3. Click the Device Manager button. 4. Double-click Network adapters. 5. Right-click the installed wireless adapter in use. 6. Choose Disable from the pop-up menu. 7. Click OK. Viewing Adapter Advanced Settings in Windows The following advanced options are available in the Windows Device Manager Advanced tab if Intel(R) PROset is not installed. If PROSet is installed the Advanced tab displays the Open button. Selected this button to open PROSet. Some of the options are also available in Intel(R) PROSet. Advanced tab option under Windows XP and 2000:
l Ad Hoc Transmit Power - Set 802.11b ad hoc output power level of the wireless adapter. l Power Management - Set a balance between the computer's power source and the battery. l Wireless Mode - Select the wireless mode (modulation type) for date rate. Default setting: "Connect to 802.11g and 802.11b." This option uses both 11 Mbps and 54 Mbps date rate. Other options are, "Connect to 802.11g only" and "Connect to 802.11b only."
l Preamble - The preamble property allows you to select the length of the preamble used to make a connection. Only available in the Windows Advanced dialog. See
"Changing the Preamble Length Setting" for details. To access the Advanced options:
1. From your desktop, right-click My Computer and click Properties. 2. Click the Hardware tab. 3. Click the Device Manager button. 4. Double-click Network adapters. 5. Right-click the name of the installed wireless adapter in use. 6. Select the Advanced tab. Changing the Preamble Length Setting The preamble property allows you to select the length of the preamble used to make a connection. If you have a problem connecting to an access point, please contact your system administrator or check the preamble length setting. If it is determined that a long preamble length is required to connect to the access point, try changing the preamble to
"Long Only," this option always uses a long preamble to connect to the access point. The
"Auto" (Default) setting option allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option. Short preamble is used if this option is supported, if not, long preamble is used. To enable "Long Only" preamble length under Windows XP and 2000:
1. Start Windows and log on with administrative privileges. 2. Right-click on My computer on your Desktop and select Properties. 3. Click the Hardware Tab and click Device Manager. 4. Click Network Adapter, locate your installed wireless adapter, right-click on the device and select Property. 5. Click on Advanced Tab. 6. Select Preamble. 7. Click Use default value, to uncheck the box. 8. Select Long Only from the drop-down box. 9. Click OK to save and exit the dialog. Advanced Tab Preamble Description Property Preamble Value Auto (Default): This option allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option. Short preamble is used if this option is supported, if not, long preamble is used. Long Only: Always use a long preamble length to connect to an access point. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Using PROSet Profiles: Intel(R) PRO/Wireless 2200BG User's Guide Using Intel(R) PROSet Wireless Profiles l Setting up Windows Network Profiles l Profile Connection Preferences l Creating a New Profile l Importing and Exporting Profiles l Setting a Profile Password l Automatic Profile Distribution l Editing an Existing Profile l Deleting a Profile l Connecting to a Network without a Profile l Connecting to a Network if a Blank SSID displays l Loading a Profile from the Task Tray Setting up Windows Network Profiles A profile is a saved group of network settings. Profiles are displayed in the Profile List in the wireless client manager General page. Profiles can be arranged in order of network connection priority. You can connect to one network using the first profile in the Profile List, then automatically connect to another network using the next profile. This allows you to stay connected while roaming freely from one wireless network to another. Although you can assign multiple profiles to a single network, you can only use one profile per connection. To add a new profile, use the Profile Wizard sequence of dialogs to configure the profile contents. The following example uses all of the Profile Wizard dialogs. Some settings may not be required for all profiles. Refer to the following to setup profile connection preferences:
Profile Connection Preferences To access the profile connection preference option:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options:
l Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network. l Connect to any available network if no matching profile is found: Connect to any available network without using a profile from the Profile List. l Connect to any network based on profiles only (Cisco Mode): Connect to any available network access point using profiles enabled for Cisco CCX (version 1) mode. This mode allows connection to access points that support multiple and blank network names (SSIDs). 4. Click OK to save the setting and return to the previous dialog. Creating a New Profile To add a new profile, use the Profile Wizard sequence of dialogs to configure the profile contents. The following example uses all of the Profile Wizard dialogs, although some of the settings may not be required. To create a new profile and connect to a network:
1. From the General page, click the Networks tab. 2. Click the Add button. The General Settings dialog displays. NOTE: If this is the first time you have created a profile, click the profile named Default in the Profile List, click the Edit button and rename the default profile in the Profile Name field on the General page. General Settings 3. Enter a profile name in the Profile Name field. 4. Enter the network SSID, in the Network Name (SSID) field. 5. Click Infrastructure or Ad hoc for the operating mode. 6. Click Password protect this profile to set a password for the profile. 7. The Mandatory AP option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Click the Mandatory AP button, enter the Ethernet address for the access point. Click OK to save the setting and return to the General Settings page. 8. Click the Enable Cisco Client eXtentions option to enable CKIP data encryption. 9. Check Enable Auto-Import to allow this profile to be imported. Refer to Automatic Profile Distribution for more information. 10. Click Next. Security Settings 11. Select Open or Shared in the Network Authentication options. Open, does not use any authentication method. Shared uses the WEP key as the authentication method. 12. Select either None, WEP or CKIP (if Enable Cisco Client eXtentions is enabled on the General Settings page) for the data encryption. 13. If WEP is selected, select either 64 or 128-bit for the Encryption Level. 14. Select the key index 1, 2, 3 or 4. 15. Enter the required pass phrase or hex key. 16. Click the 802.1x Enabled checkbox to enable the 802.1x security option. 17. Select MD5 as the 802.1x Authentication Type. 18. Click the Configure button to open the MD5 Setting dialog. Enter the user name and password of the user you have created on the authentication server. The user name and password do not have to be the same as name and password of your current Windows user login. 19. Click Close to save the settings. 20. If the Password Protection checkbox was checked on the General settings page, then click Next to display the Password page. Password Protection Settings 21. Click the Password protect this profile checkbox. 22. Enter a password in the Password field. 23. Reenter the same password in the Confirm New Password field. 24. Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page. Connect to the Network 25. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list. 26. Click the Advanced button to set the network connection preferences. 27. Click the Connect button to connect to the network. 28. Click OK to close the Intel(R) PROSet dialog. Importing and Exporting Profiles NOTE: A password protected profile can be imported and exported, however, before editing the profile, the password must be entered. Refer to Setting a Profile Password for more information. To import profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the Import/Export button. 4. Click the Import button. 5. Locate the profile to import on your hard disk or enter the profile name in the File name field. The profile extension is .profile. 6. Click the Import to import the profile into the Profile List. 7. Click OK three times to return to the Networks page. To export profiles:
1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Click the profiles to export from the export profile list. 4. Click the Browse button and select a directory to save the profiles in. Click OK to return to the previous dialog. 5. Click the Export button to start exporting the profiles. 6. Click OK three times to return to the Networks page. Setting a Profile Password To set a password for an existing profile:
1. Select the profile from the Profile List in the Networks page, and click the Edit 2. Click the Password tab. 3. Click the check box next to "Password protect this profile" to enable profile button. password. 4. Enter a ten character password in the Password field. 5. Enter the new password again in the Confirm New Password field. 6. Click OK to exit and return to the Networks page. To password protect a new profile:
1. From the Networks page, and click the Add button. 2. Enter the required Profile name and network SSID information. 3. Click the Password protect this profile check box on the General Settings dialog. 4. Click Next and enter the security settings. 5. Click Next. 6. Click the Password protect this profile check box. 7. Enter the password and confirm password information. 8. Click Finish to save the profile settings and return to the Networks page. Automatic Profile Distribution The Enable Auto-Import feature allows a network administrator to distribute a profile automatically to computers connected to a network. The Enable Auto-Import box is located on the Profile Wizard dialogs. When the checkbox is checked the profile must be copied to a specific directory on the host computer, from there it can be distributed to multiple computers. Once the profile is received by the remote computer it will automatically be available for use from the Scan profile list. If an attempt is made to edit a distributed profile that is password protected, a password prompt will appear. Automatically importing WLAN profiles is accomplished by monitoring the import folder on your hard disk for new profile files. Only profiles that have the Enable Auto-Import box checked on the Profile Wizard dialogs can be automatically imported. If a profile of the same name already exists in the Profile List, a dialog is displayed from which you can either reject the import, or accept in which case the existing profile will be replaced. All imported profiles will be placed at the bottom of the Profile List, and the profile file will be immediately deleted after the import whether the import was successful or not. To import a profile into the profile list:
1. Select a profile to be edited from the Profile List in the Networks page, and click the Edit button or click the Add button to create a new profile using the Profile Wizard. 2. Check the Enable Auto-Import checkbox on the General page. 3. Click OK (Edit a profile) or Finish (Add a profile) to save the settings. 4. Export the profile from the profile list. Refer to Importing and Exporting Profiles for details. 5. Copy the exported profile from its directory to the Programs Files\Intel\PROSet\Import directory. The profile is now ready to distribute to other computers. Editing an Existing Profile To edit an existing profile:
1. From the General page, click the Networks tab. 2. Click the Edit button. The General page displays. 3. Click on the General, Security, and Password tabs to make the necessary changes for the network profile settings:
4. Click OK on any of the pages to save all the settings and return to the Networks page. 5. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 6. Click the Advanced button to set the network connection preferences. 7. Click the Connect button to connect to the network. Deleting a Profile To delete a profile:
1. From the General page, click the Networks tab. 2. Click the profile to be deleted from the Profile List. 3. Click the Delete button. 4. Click Yes to permanently delete the profile. NOTE: You cannot delete all profiles from the profile list. There must always be one profile displayed in the list. Connecting to a Network without a Profile To connect to an available network without a profile:
1. From the General page, click the Networks tab. 2. Click the Scan button. 3. Select the network profile name with <no profile> shown, and click the Connect button. 4. Click the No, connect me directly without creating a profile option. Note, you can click Yes, create a profile for this network now to create a profile to be used later. 5. Click OK to connect. Connecting to a Network if a Blank SSID displays If the wireless adapter receives a blank network name (SSID) from a stealth access point, both the blank SSID and <no profile> display in the available networks list. To associate with a stealth access point, a new profile must first be created before connection. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. To connect to an access point that transmits a blank network name (SSID) in the Available Networks list:
1. From the General page, click the Networks tab. 2. Click the Scan button. 3. Select the network name with a blank SSID and <no profile> shown in the Available Networks list. 4. Click the Connect button. 5. Click the Yes, create a profile for this network now option. 6. The Profile Wizard dialog displays. Enter a profile name and Network Name (SSID) and security settings if required. Click Finish to save the profile settings and return to the Networks page. 7. Select the new profile from the profile list and click Connect. Loading a Profile from the Task Tray To load a profile from the Task Tray:
1. Right-click Intel(R) PROSet icon in the task tray. 2. Select the Intel PRO/Wireless 2200BG adapter. 3. Click Select Profile and select the profile to be launched. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Security Overview: Intel(R) PRO/Wireless 2200BG User's Guide WEP Encryption and Authentication Encryption Overview Protecting Your Network Authentication Types 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP WEP Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point. Supported a uthentication schemes are Open and Shared-Key authentication:
l Shared-Key authentication is supported using 64-bit and 128-bit WEP encryption l Open mode does not use an encryption authentication method to associate to a keys. specific access point. Network Keys When Data Encryption (WEP, CKIP or TKIP) is enabled, a network key is used for encryption. A network key can be provided for you automatically (for example, it might be provided on your wireless network adapter, or enter it yourself and specify the key length
(64-bits or 128-bit), key format (ASCII characters or hexadecimal digits), and key index
(the location where a specific key is stored). The longer the key length, the more secure the key. Every time the length of a key is increased by one bit, the number of possible keys double. Under 802.11, a wireless station can be configured with up to four keys (the key index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an encrypted message using a key that is stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body. Encryption Static and Dynamic Key Types 802.1x uses two types of encryption keys, static and dynamic. Static encryption keys are changed manually and are more vulnerable. MD5 authentication only uses static encryption keys. Dynamic encryption keys are renewed automatically on a periodic basis. This makes the encryption key(s) more secure. To enable dynamic encryption keys, you must use 802.1x certificate-based authentication methods, such as TLS or TTLS or PEAP. Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP
(Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically. You have the option of either using a pass phrase or entering a WEP key manually. Using 64-bit encryption, the pass phrase is 5 characters long and you can choose to enter any arbitrary and easy to remember phrase like Acme1 or enter 10 Hexadecimal numbers for the WEP key corresponding to the network the user wants to connect to. For 128-bit encryption, the pass phrase is 13 characters long or you can enter a 26 hexadecimal numbers for the WEP key to get connected to the appropriate network. Note: You must use the same encryption type, key index number, and WEP key as other devices on your wireless network. Also, if 802.1x authentication is being used, WEP encryption must be disabled. Protecting Your Network l Authentication Types l 802.1x Authentication l What is a RADIUS l Wi-Fi Protected Access (WPA) l PEAP l Cisco LEAP Authentication Types The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication protocols. A WAN client initiates an authorization request to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords) or the machine (by MAC address). 802.1x authentication is independent of the 802.11 authentication process. The 802.1x standard provides an authentication framework. There are different 802.1x authentication types, each providing a different approach to authentication employing the same protocol and framework for communication between a client and an access point. In most protocols, upon the completion of the 802.1x authentication process, the supplicant receives a key that it uses for data encryption. Refer to Setting up the Client for WEP and MD5 authentication for details about setting up an 802.1x profile. 802.1x Authentication 802.1x features l 802.1x supplicant protocol support l Support for the Extensible Authentication Protocol (EAP) - RFC 2284 l Supported Authentication Methods:
l MD5 - RFC 2284 l EAP TLS Authentication Protocol - RFC 2716 and RFC 2246 l EAP Tunneled TLS (TTLS) l Cisco LEAP l PEAP l Supports Windows XP, 2000 802.1x Authentication Notes l 802.1x authentication methods, include passwords, certificates, and smart cards
(plastic cards that hold data) l 802.1x authentication option can only be used with Infrastructure operation mode l Network Authentication modes are: EAP-TLS, EAP-TTLS, MD5 Challenge, LEAP
(for Cisco-Client eXtentions mode only), and PEAP (for WPA modes only) Overview 802.1x authentication is independent of the 802.11 authentication process. The 802.1x standard provides a framework for various authentication and key-management protocols. There are different 802.1x authentication types, each providing a different approach to authentication but all employing the same 802.1x protocol and framework for communication between a client and an access point. In most protocols, upon the completion of the 802.1x authentication process, the supplicant receives a key that it uses for data encryption. Refer to 802.1x and Data encryption for more information. With 802.1x authentication, an authentication method is used between the client and a Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol (EAP). 802.1x authentication for wireless LANs has three main components: The authenticator
(the access point), the supplicant (the client software), and the authentication server (a Remote Authentication Dial-In User Service server (RADIUS). 802.1x authentication security initiates an authorization request from the WLAN client to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords or certificates) or the system (by MAC address). In theory, the wireless client is not allowed to join the networks until the transaction is complete. There are several authentication algorithms used for 802.1x; MD5-Challenge, EAP-TLS, EAP-TTLS, Protected EAP
(PEAP), and EAP Cisco Wireless Light Extensible Authentication Protocol (LEAP). These are all methods for the WLAN client to identify itself to the RADIUS server. With RADIUS authentication, users identities are checked against databases. RADIUS constitutes a set of standards addressing Authentication, Authorization and Accounting (AAA). Radius includes a proxy process to validate clients in a multi-server environment. The IEEE 802.1x standard is for controlling and authenticating access to port-based 802.11 wireless and wired Ethernet networks. Port-based network access control is similar to a switched local area network (LAN) infrastructure that authenticates devices that are attached to a LAN port and prevent access to that port if the authentication process fails. How 802.1x authentication works A simplified description of the 802.1x authentication is:
1. A client sends a "request to access" message to an access point. The access point requests the identity of the client. 2. The client replies with its identity packet which is passed along to the 3. The authentication server sends an "accept" packet to the access point. 4. The access point places the client port in the authorized state and data traffic is authentication server. allowed to proceed. What is a RADIUS?
RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol for when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to performs AAA tasks. AAA phases are described as follows:
l Authentication phase: Verifies a user name and password against a local database. After the credentials are verified, the authorization process begins. l Authorization phase: Determines whether a request will be allowed access to a resource. An IP address is assigned for the Dial-Up client. l Accounting phase: Collects information on resource usage for the purpose of trend analysis, auditing, session time billing, or cost allocation. Wi-Fi Protected Access* (WPA) Wi-Fi Protected Access (WPA) is a security enhancement that strongly increases the level of data protection and access control to a WLAN. WPA mode enforces 802.1x authentication and key-exchange and only works with dynamic encryption keys. To strengthen data encryption, WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements that include a per-packet key mixing function, a message integrity check (MIC) named Michael an extended initialization vector (IV) with sequencing rules, and a also re-keying mechanism. Using these improvement enhancements, TKIP protects against WEP's known weaknesses. PEAP PEAP is a new Extensible Authentication Protocol (EAP) IEEE 802.1x authentication type designed to take advantage of server-side EAP-Transport Layer Security (EAP-TLS) and to support various authentication methods, including user's passwords and one-time passwords, and Generic Token Cards. Cisco LEAP Cisco LEAP (EAP Cisco Wireless) is a server and client 802.1x authentication via a user-
supplied logon password. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help protect the privacy of transmitted data. Cisco Rogue AP security feature The Cisco Rogue AP feature provides security protection from an introduction of a rogue access point that could mimic a legitimate access point on a network in order to extract information about user credentials and authentication protocols which could compromise security. This feature only works with Cisco's LEAP authentication. Standard 802.11 technology does not protect a network from the introduction of a rogue access point. CKIP Cisco Key Integrity Protocol (CKIP) is Cisco proprietary security protocol for encryption in 802.11 media. CKIP uses the following features to improve 802.11 security in infrastructure mode:
l Key Permutation l Message Integrity Check l Message Sequence Number Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Security and Encryption: Intel(R) PRO/Wireless 2200BG User's Guide Security and Encryption Setting up Data Encryption and Authentication Encryption Overview How to Enable WEP Encryption System Administrator Tasks Setting up the Client for WEP and MD5 authentication Setting up the Client for WPA-PSK using WEP or TKIP authentication Setting up the Client for WPA using TKIP encryption and TLS authentication Setting up the Client for WPA using TKIP encryption and TTLS or PEAP authentication Setting up the Client for CCX using CKIP encryption and LEAP authentication Setting up Data Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication helps provide protection for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point. The WEP encryption algorithm is vulnerable to passive and active network attacks. TKIP and CKIP algorithms include enhancements to the WEP protocol that mitigate existing network attacks and address its shortcomings Open and Shared Key authentication 802.11 support two types of network authentication methods; Open System and Shared Key. Supported authentication schemes are Open and Shared-Key authentication:
l Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station or AP will grant any request for authentication. Open authentication allows any device network access. If no encryption is enabled on the network, any device that knows the SSID of the access point can gain access to the network. l Using Shared Key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel. Shared key authentication requires that the client configure a static WEP key. The client access will be granted only if it passed a challenge based authentication. Network Keys When Data Encryption (WEP, CKIP or TKIP) is enabled, a network key is used for encryption. A network key can be provided for you automatically (for example, it might be provided on your wireless network adapter, or you can enter it yourself and specify the key the key length (64-bits or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The longer the key length, the more secure the key. Every time the length of a key is increased by one bit, the number of possible keys double. Under 802.11, a wireless station can be configured with up to four keys (the key index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an encrypted message using a key that is stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body. Encryption Static and Dynamic Key Types 802.1x uses two types of encryption keys, static and dynamic. Static encryption keys are changed manually and are more vulnerable. MD5 authentication only uses static encryption keys. Dynamic encryption keys are renewed automatically on a periodic basis. This makes the encryption key(s) more secure. To enable dynamic encryption keys, you must use 802.1x authentication methods, such as TLS, TTLS, PEAP or LEAP. Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP
(Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically. You have the option of either using a pass phrase or entering a WEP key manually. Using 64-bit encryption, the pass phrase is 5 characters long and you can choose to enter any arbitrary and easy to remember phrase like Acme1 or enter 10 Hexadecimal numbers for the WEP key corresponding to the network the user wants to connect to. For 128-bit encryption, the pass phrase is 13 characters long or you can enter a 26 hexadecimal numbers for the WEP key to get connected to the appropriate network. Note: You must use the same encryption type, key index number, and WEP key as other devices on your wireless network. Also, if 802.1x authentication is being used, WEP encryption must be disabled. How to Enable WEP Encryption The following example describes how to edit an existing profile and apply WEP encryption. To enable WEP encryption:
1. From the General page, click the Networks tab. 2. Select the profile from the Profile List and click the Edit button. 3. Click the Security tab. 4. Select any Network Authentication mode (Open is recommended). 5. Select WEP for Data Encryption. 6. Select 64-bit or 128-bit for the Encryption Level. 7. Select a key index number 1, 2, 3, or 4. 8. Select either of the following:
l Use pass phrase: Click Use Pass Phrase to enable. Enter a text phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. l Use hex Key: Click Use hex Key to enable. Enter up to ten (using 64-
bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-bit) alphanumeric characters, 0-9, A-F in the hex key field. 9. Click OK to save the profiles settings. NOTE: You must use the same encryption type, index number, and WEP key as other devices on your wireless network. System Administrator Tasks NOTE: The following information is intended for system administrators. How to Obtain a Client Certificate If you do not have any certificates for EAP-TLS, or EAP-TTLS you must get a client certificate to allow authentication. Typically you need to consult with your system network administrator for instructions on how to obtain a certificate on your network. Certificates can be managed from "Internet Settings", accessed from either Internet Explorer or the Windows Control Panel applet. Use the "Content" page of "Internet Settings". Windows XP and 2000: When obtaining a client certificate, do not enable strong private key protection. If you enable strong private key protection for a certificate, you will need to enter an access password for the certificate each time this certificate is used. You must disable strong private key protection for the certificate if you are configuring the service for TLS/TTLS authentication. Otherwise the 802.1x service will fail authentication because there is no logged in user to whom it can display the prompt dialog. Notes about Smart Cards After installing a Smart Card, the certificate is automatically installed on your computer and can be select from the person certificate store and root certificate store. Setting up the Client for TLS authentication Step 1: Getting a certificate To allow TLS authentication, you need a valid client (user) certificate in the local repository for the logged-in users account. You also need a trusted CA certificate in the root store. The following information provides two methods for getting a certificate;
l from a corporate certification authority implemented on a Windows 2000 Server l using Internet Explorers certificate import wizard to import a certificate from a file Getting a certificate from a Windows 2000 CA:
1. Start Internet Explorer and browse to the Certificate Authority HTTP Service (use a URL such as http://myCA.myDomain.com). 2. Logon to the CA with the name and password of the user account you created
(above) on the authentication server. The name and password do not have to be the same as the Windows logon name and password of your current user. 3. On the Welcome page of the CA select Request a certificate task and submit the form. 4. On the Choose Request Type page, select Advanced request, then click Next. 5. On the Advanced Certificate Requests page, select Submit a certificate request to this CA using a form, then click Submit. 6. On the Advanced Certificate Request page choose the User certificate template. Select "Mark keys as exportable", and click Next. Use the provided defaults shown. 7. On the Certificate Issued page select Install this certificate. Note: If this is the first certificate you have obtained, the CA will first ask you if it should install a trusted CA certificate in the root store. The dialog will not say this is a trusted CA certificate, but the name on the certificate shown will be that of the host of the CA. Click yes, you need this certificate for both TLS and TTLS. 8. If your certificate was successfully installed, you will see the message, "Your new certificate has been successfully installed."
9. To verify the installation, click Internet Explorer > Tools > Internet Options >
Content > Certificates. The new certificate should be installed in "Personal"
folder. Importing a certificate from a file 1. Open Internet Properties (right-click on the Internet Explorer icon on the desktop 2. Click the Certificates button on the Content page. This will open the list of installed and select Properties. certificates. 3. Click the Import button under the list of certificates. This will start the Certificate Import Wizard. (Note: Steps 1 through 3 may also be accomplished by double-
clicking the icon for the certificate. 4. Select the file and proceed to the Password page. 5. On the Password page specify your access password for the file. Clear the Enable strong private key protection option. 6. On the Certificate store page select "Automatically select certificate store based on the type of certificate" (the certificate must be in the User accounts Personal store to be accessible in the Configure dialog of the Client; this will happen if automatic is selected). 7. Proceed to "Completing the Certificate Import" and click the Finish button. The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication. Setting up the Client for TLS authentication Step 2: Specifying the certificate used by Intel(R) PROSet 1. Obtain and install a client certificate, refer to Step 1 or consult your system administrator. 2. From the General page, click the Networks tab. 3. Click the Add button. 4. Enter the profile and network (SSID) name. 5. Select Infrastructure for the operating mode. 6. Click Next. 7. Select Open for the Network Authentication. You can also select any other available authentication mode. 8. Select WEP as the Data Encryption. You can also select any other available encryption type. 9. Click the 802.1x Enabled checkbox. 10. Set the authentication type to TLS to be used with this connection. 11. Click the Configure button to open the settings dialog. 12. Enter your user name in the User Name field. 13. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default. l Click the "allow intermediate certificates" checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate. 14. Enter the Server name. l If you know the server name enter this name. l Select the appropriate option to match the server name exactly or specify the domain name. certificates. 15. Under the "Client certificate" option click the Select button to open a list of installed l Note about Certificates: The specified identity should match the field "Issued to" in the certificate and should be registered on the authentication server
(i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same username you used when the certificate was installed. 16. Select the certificate from the list and click OK. The client certificate information displays under "Client Certificate". 17. Click Close. 18. Click the Finish button to save the security settings for the profile. Setting up the Client for WEP and MD5 authentication To add WEP and MD5 authentication to a new profile:
Note: Before starting, obtain a username and password on the RADIUS server from your system administrator. 1. From the General page, click the Networks tab. 2. Click the Add button from the Profile List. 3. Enter the profile and network (SSID) name. 4. Select Infrastructure for the operating mode. 5. Click Next. 6. Select Open (recommended) for the Network Authentication. 7. Select WEP as the Data Encryption. 8. Select either 64 or 128-bit for the Encryption Level. 9. Select the key index 1, 2, 3 or 4. 10. Enter the required pass phrase or hex key. 11. Click the 802.1x Enabled checkbox. 12. Select MD5 as the 802.1x Authentication Type. 13. Click Configure to open the MD5 Setting dialog. Enter the user name and password. Note: The user name and password do not have to be the same as name and password of your current Windows user login. 14. Click Close to save the settings. 15. If the Password Protection checkbox was checked on the General settings page, then click Next display the Password page and enter a profile password. 16. Click the Finish button to save the profile settings. Setting up the Client for WPA-PSK using WEP or TKIP authentication Use Wi-Fi Protected Access - Pre Shared Key (WPA-PSK) mode if there is no authentication server being used. This mode does not use any 802.1x authentication protocol, It can be used with the data encryption types: WEP or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK). You must enter a pass phrase or 64 hex characters for a Pre-Shared Key of length 256-bits. The data encryption key is derived from the PSK. To configure a profile using WPA-PSK:
1. From the General page, click the Networks tab. 2. Click the Add button. 3. Enter the profile and network (SSID) name. 4. Select Infrastructure for the operating mode. 5. Click Next. 6. Select WPA-PSK for the Network Authentication. You can also select authentication mode. 7. Select WEP as the Data Encryption. 8. Select either of the following:
l Use pass phrase: Click Use Pass Phrase to enable. Enter a text phrase using 8-63 alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. l Use hex Key: Click Use hex Key to enable. Enter up to 64 alphanumeric characters, 0-9, A-F in the hex key field. 9. Click the 802.1x Enabled checkbox. 10. Set the authentication type to TLS to be used with this connection. 11. Click the Finish button to save the security settings for the profile. Setting up the Client for WPA using TKIP encryption and TLS authentication Wi-Fi Protected Access (WPA) mode can be used with TLS, TTLS, or PEAP. This 802.1x authentication protocol using data encryption options; WEP or TKIP. Wi-Fi Protected Access (WPA) mode binds with 802.1x authentication. The data encryption key is received from the 802.1x key exchange. To improve data encryption, Wi-Fi Protected Access utilizes its Temporal Key Integrity Protocol
(TKIP). TKIP provides important data encryption enhancements including a re-
keying method. 1. Obtain and install a client certificate, refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From the General page, click the Networks tab. 3. Click the Add button. 4. Enter the profile and network (SSID) name. 5. Select Infrastructure for the operating mode. 6. Click Next. 7. Select WPA for the Network Authentication. 8. Select TKIP as the Data Encryption. 9. Set the authentication type to TLS to be used with this connection. 10. Click the Configure button to open the settings dialog. 11. Enter your user name in the User Name field. 12. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default. l Click the "allow intermediate certificates" checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate. 13. Enter the Server name. l If you know the server name enter this name. l Select the appropriate option to match the server name exactly or specify the domain name. 14. Use Client Certificate: This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication. Click the Select button to open a list of installed certificates. l Note about Certificates: The specified identity should match the field "Issued to" in the certificate and should be registered on the authentication server
(i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same username you used when the certificate was installed. 15. Select the certificate from the list and click OK. The client certificate information displays under "Client Certificate". 16. Click Close. 17. Click the Finish button to save the security settings for the profile. Setting up the Client for WPA using TKIP encryption and TTLS or PEAP authentication Using TTLS authentication: These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the client and server. The client can use another authentication protocol, typically password-based protocols, such as MD5 Challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. Using PEAP authentication: PEAP settings are required for the authentication of the client to the authentication server. In PEAP, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between client and server. The client can use another EAP mechanism, such as Microsoft Challenge Authentication Protocol
(MSCHAP) Version 2, over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication. 1. Obtain and install a client certificate, refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From the General page, click the Networks tab. 3. Click the Add button. 4. Enter the profile and network (SSID) name. 5. Select Infrastructure for the operating mode. 6. Click Next. 7. Select WPA for the Network Authentication. 8. Select TKIP as the Data Encryption. 9. Set the authentication type to TTLS or PEAP to be used with this connection. 10. Click the Configure button to open the settings dialog. 11. Enter the roaming identity name in the Roaming Identity field. This optional feature is the 802.1X identity supplied to the authenticator. It is recommended that this field not contain a true identity, but instead the desired realm (e.g. anonymous@myrealm). 12. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default. l Click the "allow intermediate certificates" checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate. 13. Enter the Server name. l If you know the server name enter this name. l Select the appropriate option to match the server name exactly or specify the domain name. 14. Authentication Protocol:
l PEAP: Select MS-CHAP-V2. This parameter specifies the authentication protocol operating over the PEAP tunnel. The protocols are: MS-CHAP-V2
(Default), GTC, and TLS. l TTLS: Select PAP. This parameter specifies the authentication protocol operating over the TTLS tunnel. The protocols are: PAP (Default), CHAP, MD5, MS-CHAP and MS-CHAP-V2. 15. Enter the user name. This username must match the user name that is set in the authentication server by the IT administrator prior to client's authentication. The user name is case-sensitive. This name specifies the identity supplied to the authenticator by the authentication protocol operating over the TLS tunnel. This users identity is securely transmitted to the server only after an encrypted channel has been verified and established. 16. Enter the user password. Specifies the user password. This password must match the password that is set in the authentication server. 17. Re-enter the user password. If confirmed, displays the same password characters entered in the Password field. 18. Use Client Certificate: This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication. Click the Select button to open a list of installed certificates. l Note about Certificates: The specified identity should match the field "Issued to" in the certificate and should be registered on the authentication server
(i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same username you used when the certificate was installed. 19. Select the certificate from the list and click OK. The client certificate information displays under "Client Certificate". 20. Click Close. 21. Click the Finish button to save the security settings for the profile. Setting up the Client for CCX using CKIP encryption and LEAP authentication Configuring LEAP using Intel(R) PROSet An Intel(R) PROSet CCX (v1.0) profile must be configured to connect to a specific ESS or Wireless LAN network. The profiles settings include LEAP, CKIP and Rogue AP detection settings. To configure a profile for CCX security settings:
1. From the General page, click the Networks tab. 2. Click the Add button. 3. Enter the profile and network (SSID) name. 4. Select Infrastructure for the operating mode. 5. Click the Cisco Client eXtentions check box to enable CCX security. Note: The Network authentication and the Data Encryption now include the CCX security options: Open, Shared for 802.11 Authentication and none, WEP, CKIP for Data encryption. 6. Click Next. 7. Select Open in the Network Authentication options. 8. Select CKIP as the Data encryption. 9. Click the 802.1x Enabled checkbox to enable the 802.1x security option. 10. Select LEAP as the 802.1x Authentication Type. 11. Click the Configure button to open the LEAP Setting dialog. Enter the user name and password of the user account created on the authentication server. The user name and password do not have to be the same as name and password of your current Windows user login. 12. Click on the "Enable Rogue AP Detection" if the network is setup to account for rogue APs. This setting should also be made if only the "Network-EAP" checkbox is selected in the AP configuration settings (applies to all Cisco APs). 13. Click Close to save the settings. 14. Select the Networks page and click the Connect button to connect to the appropriate CCX enabled AP using the CCX Profile. CCX Access Point and Client Configurations The access point provides settings to select different authentication types depending on the WLAN environment. The client sends an Authentication algorithm field during the 802.11 authentication handshake that takes place between the client and the AP during connection establishment. The Authentication algorithm values recognized by a CCX enabled AP is different for the different authentication types. For instance "Network-EAP"
which denotes LEAP has a value of 0x80 while "Open" which is the 802.11 specified Open authentication and "Required EAP" which requires an EAP handshake exchange have values of 0x0. Network-EAP only AP: For CCX enabled networks using LEAP authentication only the authentication type is set with "Network-EAP" checkbox selected, and "Open" and "Required EAP" boxes unchecked. The AP is then configured to allow LEAP clients ONLY to authenticate and connect. In this case, the AP expects the 802.11 authentication algorithm to be set to 0x80 (LEAP), and rejects clients that attempt authentication with an Authentication algorithm value 0x0. Client: In this case the client needs to send out an authentication algorithm value of 0x80 else the 802.11 authentication handshake would fail. During boot, when the Wireless LAN driver is already loaded, but the Intel(R) PROSet supplicant is still unloaded, the client sends 802.11 authentication with an Authentication algorithm value of 0x0. Once the Intel(R) PROSet supplicant loads, and engages the LEAP profile, it sends 802.11 authentication with an Authentication algorithm value of 0x80. However, the supplicant sends out 0x80 only if the Rogue AP box is checked. Network-EAP, Open and Required EAP AP: If Network-EAP, Open and Required EAP boxes are checked then it would accept both types of 802.11 authentication algorithm values 0x0 and 0x80. However, once the client is associated and authenticated the AP expects an EAP handshake to take place. For any reason if the EAP handshake does not take place quickly, the AP would not respond to the client for about 60 seconds. Client: Here the client could send out an authentication algorithm value of 0x80 or 0x0. Both values are acceptable and the 802.11 authentication handshake would succeed. During boot, when the Wireless LAN driver is already loaded and the client sends 802.11 authentication with an Authentication algorithm value of 0x0. This is sufficient to get authenticated but the corresponding EAP or LEAP credentials need to be communicated to the AP to establish a connection. Open and Required EAP only AP: In the case where the AP is configured with Network-EAP unchecked, but Open and Required EAP checked, the AP will reject any client attempting to 802.11 authenticate using an authentication algorithm value of 0x80. The AP would accept any client using an authentication algorithm value of 0x0, and expects EAP handshake to commence soon after. In this case, the client uses MD5, TLS, LEAP or any other appropriate EAP method suitable for the specific network configuration. Client: The client in this case is required to send out an authentication algorithm value of 0x0. As mentioned before the sequence involves a repeat of the initial 802.11 authentication handshake. First, the Wireless LAN driver initiates authentication with a value of 0x0 and later the supplicant would repeat the process. However, the authentication algorithm value used by the supplicant depends status of the Rogue AP checkbox. When the Rogue AP box is unchecked, the client sends an 802.11 authentication with Authentication algorithm value of 0x0 even after the supplicant loads and engages the LEAP profile. Some non-Intel clients, for example, when set to LEAP, cannot authenticate in this case. However, the Intel Wireless LAN client can authenticate, if the Rogue AP is unchecked. Rogue AP Checkbox configuration When the checkbox is checked it ensures that the client implements the Rogue AP feature as required by CCX. The client makes note of APs that it failed to authenticate with and sends this information to the AP that allows it to authenticate and connect. Also, the supplicant sets the Authentication algorithm type to 0x80 when the Rogue AP box is checked. There may be some network configurations implementing and Open and Required EAP only as described above. For this setup to work, the client must use an Authentication Algorithm value of 0x0, as opposed to the need to use 0x80 for Network-
EAP only described above. Therefore, the Rogue AP checkbox also enables the client to support Network-EAP only and Open and Required EAP only. Cisco CCX Feature Support The Cisco mandatory Client Compliance Specifications Version1.0:
l Compliance to all mandatory items of 802.11 l De-fragmentation of MSDUs and MMPDUs l Generate CTS in response to an RTS l Open and Shared key authentication support l Support Active scanning l Wi-Fi compliance required l On Windows platforms, Microsoft 802.11 NIC compliance l 802.1X-2001 Compliance l EAP-TLS (Transport Level Security, RFC 2716) support on Windows XP l EAP-MD4 (RFC 1320) support on Windows XP l EAP packets to be sent unencrypted l Broadcast key rotation support l CKIP support l WEP/RC4 support l Support of 4 keys for WEP l Both WEP40 and WEP128 keys are supported l LEAP support is required l Rogue AP reporting support l Cisco Extension: Aironet IE support CWmin and CWmax fields l Encapsulation Transformation Rule IE support l Cisco Extension: AP IP address IE l Cisco Extension: Symbol IE l Mixed (WEP and non-WEP) cells l AP may respond to more than one SSID VLAN awareness l Stealth mode support - Clients should ignore missing SSIDs in beacons l Multiple SSID support Client should be able to roam up to 3 SSIDs l Client to use configured SSID in probe request Note: Please refer to Cisco Client extensions version 1.0 document available at www.cisco.com for more details. Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Specifications: Intel(R) PRO/Wireless 2200BG User's Guide Specifications Form Factor Dimensions Weight Antenna Interface Connector Dual Diversity Antenna Connector Interface Operating Temperature Humidity Type Frequency band Mini PCI Type 3B Width 2.34 in x Length 1.75 in x Height 0.20 in
(59.45 mm x 44.45 mm x 5 mm) 0.7 oz. (12.90 g.) Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 On-board dual diversity switching 124-pin SO-DIMM edge connector 0 to +70 degrees Celsius 50 to 85% non-condensing 2.412 - 2.462 GHz (US) 2.412 - 2.484 GHz (Japan) 2.412 - 2.472 GHz (Europe ETSI) 2.457 - 2.462 GHz (Spain) 2.457 - 2.472 GHz (France) Frequency Modulation Modulation Channels OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK, CCK Full 14 channel support 16 dBm (typical) 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48 and 54 Mbps 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps Data Rates Indoor Range Outdoor Range Power Transmit Output Power Adapter Power Consumption Transmit Receive Idle Disable Voltage General Operating Systems Wi-Fi Alliance certification Wi-Fi certification for 802.11b and 802.11g WLAN Standard Architecture Security 1.45 W 0.85 W 60 mw 50 mw 3.3 V IEEE 802.11b Infrastructure or ad hoc (peer-to-peer) WPA, Cisco CCX v1.0, LEAP, PEAP, TKIP, EAP-
TLS, EAP-TTLS, WEP 128-bit and 64-bit. UL, C-UL, CB (IEC 60590) Windows* XP, 2000 Product Safety Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 2200BG User's Guide Numerical A B D E F I K M O P R S T U W Numerical 802.11a: The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing (OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such as WEP encryption for security. 802.11b:The 802.11b standard specifies a maximum data transfer rate of 11Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to as Wi-Fi networks. 802.11g: The 802.11g standard specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to as Wi-Fi networks. 802.11x: A series of IEEE specifications for LANs: currently 802.11b, 802.11a, and 802.11g. Using any one of these extensions to the 802.11 standard permits wireless communication between a client and an access point or between two clients. 802.1x is based on the Extensible Authentication Protocol (EAP), the 802.1x standard is one of the IEEE standards for network authentication and key management. It establishes a framework that supports multiple authentication methods. This standard can be incorporated into any type of network to enhance its security. A Access Point: A device that serves as a communications hub for wireless clients and provides a connection to a wired LAN. Advanced Encryption Standard (AES): A federal information-processing standard, supporting 128-, 192-, and 256-bit keys. B Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions. Bluetooth: An incompatible, very short-range lower speed communications system
(PAN), developed first in Europe as a "cable replacement" for printers and similar peripheral connections. Its usage has expanded to include cordless earphones and similar devices. It uses the 2.4 GHz ISM band, and "co-exists" with 802.11b. Here the term, "co-exist" means that not all researchers agree on the amount of mutual interference generated when both systems operate in the same location. Broadcast SSID: Used to allow an access point to respond to clients on a wireless network by sending probes. D Data Rate (Information Rate): Not all bits carry user information. Each group (packet) of bits contains headers, trailers, echo control, destination information, and other data required by the transmission protocol. It is important to understand the difference between bit rate and data rate, since the overhead information may consume more than 40% of the total transmission. This difference is common to many such data systems, including Ethernet. Direct-Sequence Spread Spectrum (DSSS) and Frequency-Hop Spread Spectrum
(FHSS): Two incompatible technologies used in radio transmission. Dynamic IP Address: An IP address that is automatically assigned to a client station in a TCP/IP network, typically by a DHCP server. Network devices that serve multiple users, such as servers and printers, are usually assigned static IP addresses. E Extensible Authentication Protocol (EAP): An IETF standard that establishes an authentication protocol for network access. Many authentication methods, including passwords, certificates, and smart cards, work within this framework. EAP-TLS: A type of authentication method using the Extensible Authentication Protocol
(EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords. EAP-TLS authentication supports dynamic WEP key management. EAP-TTLS: A type of authentication method using the Extensible Authentication Protocol
(EAP) and Tunneled Transport Layer Security (TTLS). EAP-TTLS uses a combination of certificates and another method, such as passwords. It is more secure than MD5 authentication, which uses passwords, and less secure than EAP-TLS authentication, which exclusively uses certificates. EAP-TTLS authentication supports dynamic WEP key management. Encryption: Scrambling data so that only the authorized recipient can read it. Usually a key is needed to decrypt the data. Extended Service Set IDentifier (ESSID): A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet. This allows the AP to recognize each wireless client and its traffic. F Firewall:A firewall is a set of related programs, located at a network gateway server, that protects the resources of a network from users from other networks. Frequencies: Strike a piano key and you generate a tone. Pick up the tone with a microphone and your tone turns in to a "vibrating" or "cycling" electronic signal. The rate of vibration depends on the key struck. In electronics we refer to this rate of vibration as the number of "cycles per second." The formal term for this value is Hertz. As we move up in rate, such as in the Broadcast Band, we can use Kilohertz (KHz) to represent 1,000 Hz, or Megahertz (MHz) to represent 1,000,000 Hz. Continuing much further upward, we finally reach 1,000,000,000 Hz, which we can fortunately shorten to a Gigahertz (GHz). These frequencies are the home of both 802.11a (5 GHz) and 802.11b (2.4 GHz). I Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Network: A wireless network centered around an access point. In this environment, the access point not only provides communication with the wired network but also mediates wireless network traffic in the immediate neighborhood. Institute of Electrical and Electronics Engineers (IEEE): An organization involved in setting computing and communications standards. ISM Bands: A series of frequency bands, set aside by the FCC for Industrial, Scientific and Medical applications. Users of these bands operate equipment on a shared basis, meaning that they must expect, and accept interference from other legal users. Products manufactured for ISM Band use must be approved by the FCC, but the user does not have to be licensed. In addition to WLAN, ISM bands support cordless phones, microwave ovens, baby monitors, toys, ham radio transceivers, and other wireless services. K Kerberos: An authentication system enabling protected communication over an open network using a unique key called a ticket. M Media Access Control (MAC) Address: A hardwired address applied at the factory. It uniquely identifies network hardware, such as a wireless PC Card, on a LAN or WAN. Microcell: A bounded physical space in which a number of wireless devices can communicate. Because it is possible to have overlapping cells as well as isolated cells, the boundaries of the cell are established by some rule or convention. Microwave: Technically, the term describes any frequency above 1.0 GHz. Unfortunately the advertising industry has contorted this meaning considerably. In our discussion we will stick to the technical definition. Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. O Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. P Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point. Personal Area Network (PAN): A personal area network, or PAN, is a networking scheme that enables computing devices such as PCs, laptop computers, handheld personal computers, printers and personal digital assistants (PDAs) to communicate with each other over short distances either with or without wires. Preamble: A preliminary signal transmitted over a WLAN to control signal detection and clock synchronization. R Radio Frequency (RF) Terms (GHz, MHz, Hz): The international unit for measuring frequency is Hertz (Hz), which is equivalent to the older unit of cycles per second. One Mega-Hertz (MHz) is one million Hertz. One Giga-Hertz (GHz) is one billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz. Range: The distance over which a given system can communicate. RC4: An encryption algorithm designed at RSA Laboratories; specifically, a stream cipher of pseudo-random bytes that is used in WEP encryption. Remote Authentication Dial-In User Service (RADIUS): An authentication and accounting system that verifies users' credentials and grants access to requested resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. S Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key: An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first units transmitted signal. By moving the transmitter around, and repeating the plots, you can develop a plan as to the best locations for access points. You will also identify dead zones and other areas in need of special attention. This can be a long, slow process, but it beats ripping up an unsatisfactory installation and starting over. These tests require special software commands. Refer to your manual for specific instructions. If you have a very large, or unusually complex installation situation, you might want to consider calling in professionals to do your survey. We are not permitted to suggest installer names, but you can check your yellow pages or similar sources for likely candidates. Static IP Address: A permanent IP address that is assigned to a node in a TCP/IP network. T Transmission Control Protocol (TCP): A method (protocol) used with the IP (Internet Protocol) to send data in the form of message units between network devices over a LAN or WAN. The IP carries the delivery of the data (routing), and TCP keeps track of the individual units of data (called packets) that a message is divided into for delivery over the network. Transmission Control Protocol/Internet Protocol (TCP/IP): The basic communication language or set of protocols for communications over a network (developed specifically for the Internet). TCP/IP defines a suite or group of protocols and not only TCP and IP. Transceiver: A commonly used term that describes a combination transmitter and receiver. Both 802.11a and 802.11b devices would be properly described as data transceivers. U UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing. W WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. It is extremely important to understand that WEP is not some CIA-proof supercode! It performs as intended, giving the user a simple level of data security and protection from casual electronic eavesdropping. Use of the 128 bit option at all possible times is recommended. Remember that 802.11 devices transmit (broadcast) in all directions, and that it is possible, with very complex software, to copy and decode WEP transmissions. The task is not trivial, but it is possible. If your data is extremely sensitive, you should consider some form of secondary protection, such as strong passwords and an additional level of encryption. Suitable software packages are available from reputable suppliers. Although not intended by the original architects, WEP also helps prevents unauthorized access to your system by an outsider. Hackers have been known to access systems from outside a building, and to then to access the Web for a leisurely session, all at the system owners expense. Wide Area Network (WAN): A wide area network (WAN) is a voice, data, or video network that provides connections from one or more computers or networks within a business to one or more computers or networks that are external to such business. Wireless: A microwave transceiver system. Wireless LAN (WLAN): Wireless LAN is a type of local-area network that uses high-
frequency radio waves rather than wires to communicate between nodes. WLAN is a flexible data communication system used as an alternative to, or an extension of a wired LAN. Wireless Node: A user computer with a wireless network interface card (adapter). Back to Contents Please read all restrictions and disclaimers. Back to Contents Page Customer Support: Intel(R) PRO/Wireless 2200BG User's Guide Customer Support Intel support is available online or by telephone. Available services include the most up-
to-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.com Back to Contents Page Please read all restrictions and disclaimers. Back to Contents Page Regulatory Information: Intel(R) PRO/Wireless 2200BG User's Guide Information For the User Regulatory Information Information for the user Intel(R) PRO/Wireless 2200BG Network Connection adapter (model WM3B2200BG) Safety Notices The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment. The Intel(R) PRO/Wireless 2200BG adapter meets the Human Exposure limits found in OET Bulletin 65, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCCs recommended limits. The following safety precautions should be observed:
l Do not touch or move antenna while the unit is transmitting or receiving. l Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting. l Do not operate the radio or attempt to transmit data unless the antenna is connected; if not, the radio may be damaged. l Use in specific environments:
m The use of wireless devices in hazardous locations is limited by the constraints posed by the safety directors of such environments. m The use of wireless devices on airplanes is governed by the Federal Aviation m The use of wireless devices in hospitals is restricted to the limits set forth by Administration (FAA). each hospital. l Antenna use:
m In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimum distance of 20 cm (8 inches) or more from the body of all persons. m High-gain, wall-mount, or mast-mount antennas are designed to be professionally installed and should be located at a minimum distance of 30 cm (12 inches) or more from the body of all persons. Please contact your professional installer, VAR, or antenna manufacturer for proper installation requirements. l Explosive Device Proximity Warning (see below) l Antenna Warning (see below) l Use on Aircraft Caution (see below) l Other Wireless Devices (see below) l Power Supply (Access Point) (see below) Explosive Device Proximity Warning Warning: Do not operate a portable transmitter (such as a wireless network device) near unshielded blasting caps or in an explosive environment unless the device has been modified to be qualified for such use. Antenna Warnings Warning: It is recommended that the user limit exposure time if the antenna is positioned closer than 20 cm (8 inches). Warning: The Intel(R) PRO/Wireless 2200BG product is not designed for use with high-gain directional antennas. Use of such antennas with these products is illegal. Use On Aircraft Caution Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-
frequency wireless devices because their signals could interfere with critical aircraft instruments. Other Wireless Devices Safety Notices for Other Devices in the Wireless Network: Refer to the documentation supplied with wireless Ethernet adapters or other devices in the wireless network. Local Restrictions on Radio Usage Caution: Due to the fact that the frequencies used by Intel(R) PRO/Wireless 2200BG product device may not yet be harmonized in all countries. The Intel(R) PRO/Wireless 2200BG product is designed for use only in specific countries, and is not allowed to be operated in countries other than those of designated use. As a user of this product, you are responsible for ensuring that the product is used only in the countries for which it was intended and for verifying that it is configured with the correct selection of frequency and channel for the country of use. Any deviation from the permissible settings for the country of use is an infringement of national law and may be punished as such. For country-specific information, see the additional compliance information supplied with the product. Wireless interoperability The Intel(R) PRO/Wireless 2200BG adapter is designed to be interoperable with any wireless LAN product that is based on direct sequence spread spectrum (DSSS) radio technology and to comply with the following standards:
l IEEE Std. 802.1b-1999. Standard on Wireless LAN. l Wireless Fidelity (WiFi) certification, as defined by the WECA (Wireless Ethernet Compatibility Alliance). The Intel(R) PRO/Wireless LAN 2200BG adapter and your health The Intel(R) PRO/Wireless 2200BG adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by this device, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The Intel(R) PRO/Wireless 2200BG adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations. These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situations or environments, the use of the Intel(R) PRO/Wireless 2200BG adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization. Examples of such situations include the following:
l Using the Intel(R) PRO/Wireless 2200BG adapter equipment on board airplanes, or l Using the Intel(R) PRO/Wireless 2200BG adapter equipment in any other environment where the risk of interference with other devices or services is perceived or identified as being harmful. If you are uncertain of the policy that applies to the use of wireless devices in a specific organization or environment (an airport, for example), you are encouraged to ask for authorization to use the Intel(R) PRO/Wireless 2200BG adapter wireless device before you turn it on. Regulatory information USAFederal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions:
l This device may not cause harmful interference. l This device must accept any interference that may cause undesired operation. NOTEThe radiated output power of the Intel(R) PRO/Wireless 2200BG adapter wireless network device is far below the FCC radio frequency exposure limits. Nevertheless, the Intel(R) PRO/Wireless 2200BG wireless network device should be used in such a manner that the potential for human contact during normal operation is minimized. Interference statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If the equipment is not installed and used in accordance with the instructions, the equipment may cause harmful interference to radio communications. There is no guarantee, however, that such interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct the interference by taking one or more of the following measures:
l Reorient or relocate the receiving antenna. l Increase the distance between the equipment and the receiver. l Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. l Consult the dealer or an experienced radio/TV technician for help. NOTEThe Intel(R) PRO/Wireless 2200BG adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. U.S. Frequency Bands 2.400 - 2.4835 GHz CanadaIndustry Canada (IC) This Class B digital apparatus complies with Canadian ICES-003, Issue 2, and RSS-210, Issue 4 (Dec. 2000). Cet appariel numrique de la classe B est conforme la norme NMB-003, No. 2, et CNR-
210, No 4 (Dec 2000).
"To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its trasmit antenna) that is installed outdoors is subject to licensing."
Pour empcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit tre utilis a l'intrieur et devrait tre plac loin des fentres afinde fournir un cran de blindage maximal. Si le matriel (ou son antenne d'mission) est install l'extrieur, il doit faire l'objet d'une licence.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2005-02-17 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2005-02-17
|
||||
1 | Applicant's complete, legal business name |
Getac Technology Corp.
|
||||
1 | FCC Registration Number (FRN) |
0022123947
|
||||
1 | Physical Address |
4F, No.1, R&D 2nd Road
|
||||
1 |
Hsin-Chu Hsien,, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
h******@americantcb.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
MAU
|
||||
1 | Equipment Product Code |
015
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
V******** H********
|
||||
1 | Title |
Senior Engineer
|
||||
1 | Telephone Number |
886-2********
|
||||
1 | Fax Number |
886-2********
|
||||
1 |
V******@Getac.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
International Standards Laboratory
|
||||
1 | Name |
J******** C******
|
||||
1 | Physical Address |
No. 65 Ku Dai Keng Street
|
||||
1 |
Hsichih, 221
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
d******@isl.com.tw
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | CA27 Notebook Computer with Wireless LAN | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output is Conducted. Only the wireless card listed within this application is to be installed in the specific notebook computer shown in this filing by OEM integrators: user installation is prohibited. Only the antenna documented in this filing, installed in the manner specified, can be used with this device. The antenna used for this transmitter must be not be co-located or operating in conjunction with any other antenna or transmitter. End-users must be provided with operating instructions for satisfying RF exposure compliance requirements. The highest reported SAR value is: Body 0.809 W/kg | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
International Standards Laboratory
|
||||
1 | Name |
D****** W****
|
||||
1 | Telephone Number |
886-2******** Extension:
|
||||
1 | Fax Number |
886-2********
|
||||
1 |
d******@isl.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 20 | 2412.00000000 | 2462.00000000 | 0.0800000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC