all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
various |
|
User Manual | Users Manual | 1.01 MiB | / June 11 2008 | |||
various |
|
User Manual 1 | Users Manual | 2.69 MiB | ||||
various |
|
User Manual 2 | Users Manual | 1.69 MiB | ||||
various |
|
User Manual 3 | Users Manual | 465.63 KiB | July 07 2008 | |||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | ID Label/Location Info | |||||||
various | Cover Letter(s) | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | Attestation Statements | |||||||
various | Cover Letter(s) | |||||||
various | ID Label/Location Info | |||||||
various | ID Label/Location Info | |||||||
various | Cover Letter(s) | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | Test Report | |||||||
various | Test Setup Photos | |||||||
various | Internal Photos | / June 11 2008 | ||||||
various | RF Exposure Info | |||||||
various | Cover Letter(s) | |||||||
various | Test Report | |||||||
various | Cover Letter(s) | |||||||
various | Test Report | |||||||
various | Cover Letter(s) | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | RF Exposure Info | |||||||
various | External Photos | July 07 2008 | ||||||
various | Cover Letter(s) | July 07 2008 | ||||||
various | Test Report | July 07 2008 | ||||||
various | Test Report | July 07 2008 | ||||||
various | Test Report | July 07 2008 | ||||||
various | Test Report | July 07 2008 | ||||||
various | Test Report | July 07 2008 | ||||||
various | Test Report | July 07 2008 |
various | User Manual | Users Manual | 1.01 MiB | / June 11 2008 |
Lenovo(Japan), Ltd., Date: September 8, 2008 Document Number: UY610-03-0048-57 Users Manual The attachment is the users manual of the specific Lenovo host PC devices in this application, which indicates the regulatory notice concerning the FCC Part 2, 15B, 15C, 15E, 27, and IC RSS-102e & RSS-210. In addition, some electronic information referred to in the users manual is installed in each host PC devices and is displayed on the LCD screen. ThinkPad X200 Tablet Regulatory Notice Read first regulatory information Part Number: 44C9770 Please read this document before you use the ThinkPad computer. ThinkPad computer complies with the radio frequency and safety standards of any country or region in which it has been approved for wireless use. You must install and use your computer in strict accordance with the instructions as described hereafter. If your ThinkPad computer contains a Wireless WAN adapter, be sure to also read ThinkPad Regulatory Notice for Wireless WAN adapter, included with your computer. Note: You cannot use the Wireless WAN adapter and the Wireless LAN adapter (Models: AR5BHB63-L, 533ANXMMW, 512AN_MMW, or 533AN_MMW) simultaneously. If one of the adapters has established the connection to the network, the other will be disconnected automatically. To confirm the status of the network connection, check the power-status indicators of your computer. For more information about the power-status indicators, see the Power-status indicators section in Access Help. Veuillez lire ce document avant dutiliser lordinateur ThinkPad. Lordinateur ThinkPad est conforme aux normes de scurit et de radiofrquence du pays ou de la rgion o son utilisation sans fil est agre. Vous devez installer et utiliser votre ordinateur en respectant scrupuleusement les instructions dcrites ci-aprs. Si votre ordinateur ThinkPad contient une carte de rseau tendu (WAN) sans fil, veillez lire galement la consigne rglementaire ThinkPad Regulatory Notice for Wireless WAN adapter, fournie avec votre ordinateur. Remarque: Vous ne pouvez pas utiliser simultanment la carte de rseau tendu sans fil et la carte de rseau local sans fil (Modles: AR5BHB63-L, 533ANXMMW, 512AN_MMW, ou 533AN_MMW). Si lune de ces cartes a tabli la connexion avec le rseau, lautre carte sera automatiquement dconnecte. Pour confirmer ltat de la connexion rseau, contrlez les voyants dtat dalimentation. Pour plus dinformations, reportez-vous la section Voyants dtat de lalimentation dans laide Access. Copyright Lenovo 2008 1 USA Federal Communications Commission (FCC) I. User installable Wireless LAN/WiMAX module WLAN Mini PCI Express Cards:
v FCC ID: PPD-AR5BHB63-L (Model: AR5BHB63-L) v FCC ID: PD9LEN512ANMU (Model: 512AN_MMW) v FCC ID: PD9533ANMU (Model: 533AN_MMW) WLAN & WiMAX Mini PCI Express combo Card:
v FCC ID: PD9533ANXMU (Model: 533ANXMMW) Wireless LAN Mini PCI Express Cards marketed in the USA and Canada do not support nor function in the extended channels (12ch, 13ch). For information concerning the wireless cards announced after the publication of this notice, visit the Web site at http://www.lenovo.com/support/site.wss/
document.do?sitestyle=lenovo&lndocid=tpad-matrix i) The FCC RF Exposure compliance: The total radiated energy from the Main, Auxiliary, and Third antennas connected to one of the wireless LAN Mini PCI Express Cards and from the Bluetooth card (with its built-in antenna on the card) conforms to the FCC limit of the SAR (Specific Absorption Rate) requirement regarding 47 CFR Part 2 section 1093, when the computer was tested in either conventional notebook or tablet computer orientations. The transmission antennas used for the wireless LAN Mini PCI Express Card are located at the upper left and right side of the LCD screen, and the antenna used for Bluetooth card (Model: BCM92046MD_GEN) is located under the palm rest at center. See the UltraConnect wireless antennas and Bluetooth antenna sections in Access Help. Note: The transmission diversity function is implemented for this product. For WLAN card (Model: AR5BHB63-L) using Main and Auxiliary antennas for transmission in the 802.11 b/g transmission mode, radio frequency energy is not emitted simultaneously from both Main and Auxiliary antennas. One of the antennas is selected automatically or manually (by users) to have good quality of radiocommunication (transmission diversity function). For the WLAN cards (Models: 533AN_MMW and 533ANXMMW) in the MIMO
(Multiple In Multiple Out) transmission mode, multiple antennas (Main, Auxiliary, and Third) can transmit radio frequency energy simultaneously. For WLAN card (Model: 512AN_MMW) in the IEEE 802.11 a/b/g or MIMO
(Multiple In Multiple Out) transmission mode, the radio frequency energy is emitted from Main antenna. When the Model: 533ANXMMW switches to WiMAX operation mode, only the Main antenna is used for RF transmission. 2 ii) FCC ID of wireless module: There is no FCC ID for Mini PCI Express Card shown on the enclosure of your ThinkPad computer. Instead you will find an indicator pointing to the location of the FCC ID on the bottom side of your ThinkPad computer. For the location of the FCC ID indicator, see the Location of the FCC ID and IC Certification number label section in Access Help. The FCC ID is affixed on the approved module installed in the Mini PCI Express Card slot. For the location of the slot, see the PCI Express Mini Card slot for wireless LAN/WiMAX section in Access Help. iii) Installation of approved wireless module:
LAN/WiMAX Mini PCI Express Card has been preinstalled in your ThinkPad computer, you can install one, provided by Lenovo as an option. Plug the wireless card option into the Mini PCI Express Card slot. For the installation procedure, see the Installing and replacing the PCI Express Mini Card for wireless LAN/WiMAX connection section in Access Help. If no integrated wireless Attention: The ThinkPad computers contain an authentication mechanism. If you install an unauthorized wireless LAN Mini PCI Express Card that is not approved for use in your computer, the computer will not start, but only displays an error message and emits audible beeps. iv) Radio Frequency interference requirements:
v The devices have been tested and found to comply with the limits for a Class B digital device pursuant to FCC Part 15 Subpart B. The model AR5BHB63-L was subject to DoC. Refer to Electronic emission notices on page 10. The models 512AN_MMW, 533AN_MMW, and 533ANXMMW underwent the certification process with each respective FCC ID number listed in I. User installable Wireless LAN/WiMAX module on page 2. v Each device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range. FCC requires these products to be used indoors for the frequency range 5.15 to 5.25 GHz to reduce the potential for harmful interference to co-channel Mobile Satellite systems. v High power radar are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and/or damage this device. II. Preinstalled integrated Bluetooth module v FCC ID: QDS-BRCM1033 (Model: BCM92046MD_GEN) i) FCC ID and installation of the module:
QDS-BRCM1033 on the label at the bottom side of your computer, your computer integrates the Bluetooth transmitter module (Model:
BCM92046MD_GEN). The Bluetooth module is preinstalled by Lenovo, and is not removable by users. If your card requires replacement via the proper steps shown in Getting help and service of the Service and Troubleshooting Guide, If you find the FCC ID 3 shipped with your computer, Lenovo will request you to send your computer with the card to Lenovo so that Lenovo will repair it. ii) The FCC RF safety requirement: The radiated output power of the Bluetooth module is far below the FCC radio frequency exposure limits. Therefore, a 20 cm of separation between the Bluetooth antenna and human body is not required. For the location of the Bluetooth module BCM92046MD_GEN and its built-in antenna, see the About your computer section in Access Help. iii) Radio Frequency interference requirements: The device has been tested and found to comply with the limits for both a Class B digital device regarding FCC Part 15 Subpart B and an intentional radiator regarding FCC Part 15 Subpart C; then it underwent the certification processes for both rules. Thus the FCC ID QDS-BRCM1033 of this device includes both certifications of Part 15 Subpart B and C. III. Preinstalled integrated Wireless USB module v FCC ID: V4EUWB3480MPE (Model: 3480MPe-US) If you find the FCC ID i) FCC ID and installation of the module:
V4EUWB3480MPE on the label at the bottom side of your computer, your computer integrates the Wireless USB card (Model: 3480MPe-US). The Wireless USB card is preinstalled by Lenovo. If the card requires replacement via the proper steps shown in Getting help and service of the Service and Troubleshooting Guide, shipped with your computer, Lenovo will send you a spare part so that you will replace the original adapter with it. ii) The FCC RF safety requirement: The standard FCC rule for RF exposure compliance requires a separation distance of at least 20 cm (8 inches) between the integrated Wireless USB antenna and all persons. However the radiated output power of the Wireless USB card authorized to use for your ThinkPad computer is far below the FCC radio frequency exposure limits. Therefore, a 20 cm of separation between the Wireless USB antenna built into the screen section of your computer and human body is not required. For the location of the Wireless USB antenna, see the Location of the UltraConnect wireless antennas section in Access Help. For the location of the slot for the Wireless USB card, see the About your computer section in Access Help. iii) Radio Frequency interference requirements: The device has been tested and found to comply with the limits for a Class B digital device regarding FCC Part 15 Subpart B and was subject to DoC. Refer to Electronic emission notices on page 10. Also it has been certified as an intentional radiator regarding FCC Part 15 Subpart F under the FCC ID: V4EUWB3480MPE. 4 IV. Digitizer function in LCD screen The ThinkPad X200 Tablet computer employs a digitizer function in LCD screen which is able to sense the Tablet Digitizer Pen shipped associated with your computer. The digitizer emits extra low power radio frequency and complies with the FCC Part 15, Subpart C. The FCC ID: XXXX is indicated on the label at the bottom side of your ThinkPad computer. V. Simultaneous use of RF transmitters Your ThinkPad computer is approved for simultaneous use of the transmitters listed below:
v Wireless LAN adapter (FCC ID: PPD-AR5BHB63-L, PD9LEN512ANMU, v Bluetooth module (FCC ID: QDS-BRCM1033) v Wireless USB adapter (FCC ID: V4EUWB3480MPE) PD9533ANMU, or PD9533ANXMU) Please make sure of the following conditions on use of these wireless features:
1. When you use any other RF option device, you are requested to confirm that the device conforms to the SAR requirement and is approved to use for ThinkPad X200 Tablet computer. 2. When you use any other RF option device, all other wireless features including the above integrated devices in your ThinkPad computer are required to be turned off. 3. Users must follow the RF Safety instructions on wireless option devices that are included in the RF option devices users manual. Canada Industry Canada (IC) IC Certification number I) User installable Wireless LAN modules:
v v v IC: 4104A-ARBHB63L (Model: AR5BHB63-L) IC: 1000M-L512ANMU (Model: 512AN_MMW) IC: 1000M-533ANMU (Model: 533AN_MMW) Wireless LAN Mini PCI Express Cards marketed in the USA and Canada do not support nor function in the extended channels (12ch, 13ch). There is no certification number of Industry Canada for Mini PCI Express Card shown on the enclosure of your ThinkPad computer. Instead you will find an indicator pointing to the location of the IC Certification number on the bottom side of your ThinkPad computer. For the location of the IC Certification number indicator, see the Location of the FCC ID and IC Certification number label section in Access Help. The IC certification number is affixed on the approved module installed in the Mini PCI Express Card slot. For the location of the slot, see the PCI Express Mini Card slot for wireless LAN/WiMAX section in Access Help. 5 Attention: The ThinkPad computer contains an authentication mechanism You can install or remove each wireless feature by yourself. If you install an unauthorized wireless adapter that is not approved for use in the ThinkPad computer, the computer will not start, but only displays an error message and emits audible beeps. II) Preinstalled integrated Bluetooth module:
v IC: 4324A-BRCM1033 (Model: BCM92046MD_GEN) If you find an indication Contains Transmitter Module: Canada IC:
4324A-BRCM1033 on the label at the bottom side of your computer, your computer integrates the Bluetooth transmitter module. The Bluetooth module is preinstalled by Lenovo, and is not removable by users. If your card requires replacement via the proper steps shown in Getting help and service of the Service and Troubleshooting Guide, Lenovo will request you to send your computer with the card to Lenovo so that Lenovo will repair it. III) Wireless USB module: Operation of the Wireless USB Card (Model:
3480MPe-US) is not permitted in Canada. Please do not use this module, as it will be a violation of Industry Canada regulations. III) Low power license-exempt radiocommunication devices (RSS-210):
Operation is subject to the following two conditions:
1. This device may not cause interference, and 2. this device must accept any interference, including interference that may cause undesired operation of the device. The transmitter devices have been designed to operate with the antennas integrated in ThinkPad computer, and having a maximum gain of within 3 dBi. The maximum antenna gain permitted for devices in the 5250-5350 MHz, 5470-5725 MHz, and 5725-5825 MHz bands complies with the e.i.r.p. limit in section A9.2 of RSS-210. When you use the model 512AN_MMW or 533AN_MMW:
v The devices for the band 51505250 MHz are only for indoor usage to reduce potential for harmful interference to co-channel Mobile Satellite systems. v High power radars are allocated as primary users (meaning they have priority) of 52505350 MHz and 56505850 MHz and these radars could cause interference and/or damage to LELAN (Licence-Exempt Local Area Network) devices. IV) Exposure of humans to RF fields (RSS-102): ThinkPad computers employ low gain integral antennas that do not emit RF field in excess of 6 Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canadas Web site at www.hc-sc.gc.ca/rpb The radiated energy from the antennas connected to the wireless adapters conforms to the IC limit of the RF exposure requirement regarding IC RSS-102, Issue 2 clause 4.1. V) Digitizer function in LCD screen: The ThinkPad X200 Tablet computers employ a digitizer function in LCD screen which is able to sense the Tablet Digitizer Pen shipped associated with your computer. The digitizer emits extra low power radio frequency and complies with the standard (RSS-210). The IC certification number IC: XXXX is indicated on the label at the bottom side of your ThinkPad computer. Numro dhomologation IC I) Module sans fil installable par lutilisateur: Les cartes Express mini-PCI de rseau local sans fil:
v v v IC: 4104A-ARBHB63L (Model: AR5BHB63-L) IC: 1000M-L512ANMU (Model: 512AN_MMW) IC: 1000M-533ANMU (Model: 533AN_MMW) Les cartes de rseau local sans fil Express mini-PCI commercialises aux Etats-Unis et au Canada ne prennent pas en charge les canaux tendus (12ch, 13ch) et ne fonctionnent donc pas sur de tels canaux. Le botier de votre ordinateur ThinkPad ne comporte pas de numro dhomologation IC (Industry Canada) pour la carte mini-PCI Express; mais sous votre ThinkPad, vous trouverez un indicateur pointant vers lemplacement du numro dhomologation IC. Pour connatre lemplacement du numro dhomologation IC, consultez la section correspondante dans laide Access. Le numro dhomologation IC est appos sur le module install dans le logement pour carte mini-PCI Express. Pour savoir o se trouve cet emplacement, consultez la section Logement pour cartes mini-PCI Express pour rseau local/WiMAX dans Access Help. Attention: Lordinateur ThinkPad contient un mcanisme dauthentification. Vous pouvez installer ou dsinstaller tout dispositif sans fil. Si vous installez une carte sans fil qui nest pas homologue dans votre ordinateur ThinkPad, lordinateur ne dmarrera pas mais affichera un message derreur et gnrera des bips sonores. II) Module Bluetooth intgr prinstall:
v IC: 4324A-BRCM1033 (Model: BCM92046MD_GEN) 7 Si la mention Contains Transmitter Module: Canada IC: 4324A-BRCM1033 figure sur ltiquette situe au bas de votre ordinateur, cela signifie que ce dernier intgre le module de transmission Bluetooth. Le module Bluetooth est prinstall par Lenovo et ne peut pas tre retir par les utilisateurs. Si votre carte doit tre remplace conformment aux tapes du Chapitre relatif laide et la maintenance dans le manuel Guide de maintenance et didentification des incidents, Lenovo vous demandera de lui envoyer votre ordinateur accompagn de la carte pour rparation. III) Wireless USB module: Lutilisation de la carte USB sans fil (modle 3480MPe-US) nest pas autorise au Canada. Veuillez ne pas utiliser ce module dans ce pays car ce serait une infraction aux lois dIndustrie Canada. III) Remarque relative aux appareils de communication radio de faible puissance sans licence (CNR-210): Le fonctionnement de ce type dappareil est soumis aux deux conditions suivantes:
1. Cet appareil ne doit pas perturber les communications radio, et 2. cet appareil doit supporter toute perturbation, y compris les perturbations qui pourraient provoquer son dysfonctionnement. Les priphriques dmission sont conus pour fonctionner avec des antennes intgres aux ThinkPad et ayant un gain maximal de moins de 3 dBi. Le gain dantenne maximal pour les priphriques dans les bandes de frquence 5250-5350 MHz, 5470-5725 MHz, et 5725-5825 MHz est conforme la limite p.i.r.e nonce dans la section A9.2 de la CNR-210. Lorsque vous utilisez le modle, 512AN_MMW ou 533AN_MMW:
v Tout appareil destin la bande 5150-5250 MHz devra tre exclusivement utilis en intrieur afin de rduire les risques de perturbations lectromagntiques gnantes sur les systmes de satellite mobile dans un mme canal. v Les radars forte puissance sont dsigns comme les utilisateurs principaux (cest--dire quils sont prioritaires) des bandes 5250-5350 MHz et 5650-5850 MHz. Ils peuvent provoquer des perturbations lectromagntiques sur les appareils de type LELAN (rseau de communication local sans licence) ou les endommager. IV) Exposition des tres humains aux champs radiolectriques (RF)
(CNR-102): Lordinateur ThinkPad utilise des antennes intgrales faible gain qui nmettent pas un champ lectromagntique suprieur aux normes imposes par le Ministre de la sant canadien pour la population. Consultez le Safety Code 6 sur le site Web du Ministre de la sant canadien ladresse www.hc-sc.gc.ca/rpb. 8 Lnergie mise par les antennes relies aux adaptateurs sans fil respecte la limite dexposition aux radiofrquences telle que dfinie par Industrie Canada dans la clause 4.1 du document CNR-102. V) Fonction de numrisation sur cran LCD: Les ordinateurs ThinkPad X200 Tablet utilisent une fonction de numrisation sur cran LCD capable de dtecter le stylo numriseur de la tablette graphique qui est associ votre ordinateur. Le numriseur met une frquence radio extrmement basse et il est conforme la norme CNR-210. Le numro de certification IC: XXXX figure sur ltiquette appose au bas de votre ordinateur ThinkPad. 9 Electronic emission notices Federal Communications Commission (FCC) Statement v Model: AR5BHB63-L v ThinkPad X200 Tablet (Machine Type: 4184, 7448, 7449, 7450, 7453, 2263, and 2266) Note: The models 512AN_MMW, 533AN_MMW, 533ANXMMW, and BCM92046MD_GEN underwent certification process for the FCC Part 15 Subpart B compliance under each respective FCC ID number. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
v Reorient or relocate the receiving antenna. v v Connect the equipment into an outlet on a circuit different from that to Increase the separation between the equipment and receiver. which the receiver is connected. v Consult an authorized dealer or service representative for help. Lenovo is not responsible for any radio or television interference caused by unauthorized changes or modifications to this equipment. Unauthorized changes or modifications could void the users authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Responsible Party:
Lenovo (United States) Incorporated 1009 Think Place-Building One Morrisville, NC 27560 Telephone: 1-919-294-5900 10 Tested To Comply With FCC Standards FOR HOME OR OFFICE USE Industry Canada Class B Emission Compliance StatementThis Class B digital apparatus complies with Canadian ICES-003. Avis de conformit la rglementation dIndustrie CanadaCet appareil numrique de la classe B est conforme la norme NMB-003 du Canada. Telecommunication notices Federal Communications Commission (FCC) and Telephone Company Requirements (Part 68 of the FCC Rules) 1. The Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent, and an identification of the business or other entity, or other individual sending the message and the telephone number of the sending machine or such business, other entity, or individual. In order to program this information into your computer, you should be sure to follow the installation instructions for your fax software package. 2. This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA. On this equipment is a label that contains, among other information, a product identifier in the format US:AAAEQ##TXXXX. If requested, this number must be provided to the telephone company. 3. The REN is used to determine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed five (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. The REN for this product is part of the product identifier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). If the built-in modem causes harm to the telephone network, the telephone company may discontinue your service temporarily. If possible, they will notify you in advance. But, if advance notice isnt practical, you will be notified as soon as possible. You will be advised of your right to file a complaint with the FCC. 4. 11 5. Your telephone company may make changes in its facilities, equipment, operations, or procedures that could affect the proper operation of your equipment. If they do, you will be given advance notice so as to give you an opportunity to maintain uninterrupted service. 6. No customer repairs are possible to the modem. If you experience trouble with this built-in modem, contact your Lenovo Authorized Seller, or the Customer Support Center. For the most current phone numbers, go to http://www.lenovo.com/think/support and click Support phone list. The telephone company may ask you to disconnect this equipment from the network until the problem has been corrected, or until you are sure the equipment is not malfunctioning. 7. The modem may not be used on coin service provided by the telephone company. Connection to party lines is subject to state tariffs. Contact your state public utility commission or corporation commission for information. 8. When ordering network interface (NI) service from the Local Exchange Carrier, specify service arrangement USOC RJ11C. 9. A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. See installation instructions for details. If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this Data/Fax Modem does not disable your alarm equipment. If you have questions about what will disable alarm equipment, consult your telephone company or a qualified installer. 10. Industry Canada requirements Notice: This equipment meets the applicable Industry Canada Terminal Equipment Technical Specifications. This is confirmed by the registration number. The abbreviation, IC, before the registration number signifies that registration was performed based on a Declaration of Conformity indicating that Industry Canada technical specifications were met. It does not imply that Industry Canada approved the equipment. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of communication. In some cases, the companys inside wiring associated with a single line individual service may be extended by means of a certified connector assembly (telephone extension cord). The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. 12 Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs of alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate. The Ringer Equivalence Number (REN) for the terminal equipment RD02-D450 is 0.1. The REN assigned to each terminal equipment provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed five. Avis: Le prsent matriel est conforme aux spcifications techniques dIndustrie Canada applicables au matriel terminal. Cette conformit est confirme par le numro denregistrement. Le sigle IC, plac devant le numro denregistrement, signifie que lenregistrement sest effectu conformment une dclaration de conformit et indique que les spcifications techniques dIndustrie Canada ont t respectes. Il nimplique pas quIndustrie Canada a approuv le matriel. Avant dinstaller ce matriel, lutilisateur doit sassurer quil est permis de le raccorder aux installations de lentreprise locale de tlcommunication. Le matriel doit galement tre install en suivant une mthode accepte de raccordement. Dans certains cas, les fils intrieurs de lentreprise utiliss pour un service individuel ligne unique peuvent tre prolongs au moyen dun dispositif homologu de raccordement (cordon prolongateur tlphonique interne). Labonn ne doit pas oublier quil est possible que la conformit aux conditions nonces ci-dessus nempechent pas la dgradation du service dans certaines situations. Actuellement, les entreprises de tlcommunication ne permettent pas que lon raccorde leur matriel des jacks dabonn, sauf dans les cas prcis prvus par les tarifs paticuliers de ces entreprises. Les rparations de matriel homologu doivent tre effectues par un centre dentretien canadien autoris dsign par le fournisseur. La compagnie de 13 tlcommunications peut demander lutilisateur de dbrancher un appareil la suite de rparations ou de modifications effectues par lutilisateur ou cause de mauvais fonctionnement. Pour sa propre protection, lutilisateur doit sassurer que tous les fils de mise la terre de la source dnergie lectrique, des lignes tlphoniques et des canalisations deau mtalliques, sil y en a, sont raccords ensemble. Cette prcaution est particulirement importante dans les rgions rurales. Avertissement: Lutilisateur ne doit pas tenter de faire ces raccordements lui-mme; il doit avoir recours un service dinspection des installations lectriques, ou lectricien, selon le cas. Lindice dquivalence de la sonnerie (IES) du prsent matriel RD02-D450 este de 0.1. LIES assign chaque dispositif terminal indique le nombre maximal de terminaux qui peuvent tre raccords une interface tlphonique. La terminaison dune interface peut consister en une combinaison quelconque de dispositifs, la seule condition que la somme dindices dquivalence de la sonnerie de tous les dispositifs nexcde pas 5. Trademarks The following terms are trademarks of Lenovo in the United States, other countries, or both:
Lenovo ThinkPad Other company, product, and service names may be trademarks or service marks of others. Printed in China 14 The screen copies of electronic users guidance are extracted hereafter. Lenovo(Japan), Ltd., Date: June 10, 2008 Document Number: UY610-03-0048-18 Location of the FCC ID and IC Certification number label 1/1 Location of the FCC ID and IC Certification number label There is no FCC ID or IC Certification number for the PCI Express Mini Card shown on the enclosure of your ThinkPad computer. Instead you will find an indicator pointing to the location of the FCC ID and the IC Certification number for the installed transmitter card on the bottom side of your ThinkPad as shown below. The FCC ID and IC Certification number label is affixed on the card installed in the Mini PCI Express Card slot of your ThinkPad computer. Note: The wording of the label may vary depending on the model. If no integrated wireless PCI Express Mini Card has been preinstalled in your ThinkPad computer, you can install one. To do this, follow the procedure in Installing and replacing the PCI Express Mini Card for wireless LAN/WiMAX connection or Installing and replacing the PCI Express Mini Card for wireless WAN connection. file://C:\TamaTemp\fccidlbl.htm\fccidlbl.htm 2008/06/11 Location of the UltraConnect wireless antennas 1/2 Location of the UltraConnect wireless antennas ThinkPad models feature an integrated diversity antenna system built into the display for optimal reception, enabling wireless communication wherever you are. The following shows the location of each built-in wireless antenna. 1. Wireless WAN antenna (Auxiliary) If your computer comes with a wireless WAN feature, its auxiliary antenna is located at the top left side of the computer display. 2. Wireless LAN and WiMAX combo antenna (Auxiliary) The auxiliary antenna connected to the wireless LAN or WiMAX feature is located at the top left portion of the computer display, near the center. 3. Wireless USB antenna If your computer comes with a wireless USB feature, the antenna is located at the top right portion of the computer display, near the center. 4. Wireless WAN antenna (Main) If your computer comes with a wireless WAN feature, its main transmitter antenna is located at the top right side of the computer display. 5. Wireless LAN and WiMAX combo antenna (Main) The main antenna connected to the wireless LAN or WiMAX feature is located at the right top portion of the computer display. 6. Wireless LAN antenna (Third) If your computer has the Multiple Input Multiple Output (MIMO) wireless LAN feature, the third wireless antenna is located at the right bottom portion of the computer display. file://C:\TamaTemp\antennas.htm\antennas.htm 2008/06/17 Location: Bluetooth antenna 1/1 Front Right Left Bottom 8. Bluetooth antenna Some ThinkPad models have Integrated Bluetooth features. file://C:\DOCUME~1\murota\LOCALS~1\Temp\SQB5A3NH.htm 2008/06/11 Location: PCI Express Mini Card slot for Wireless LAN/WiMAX 1/2 Location: PCI Express Mini Card slot for Wireless LAN/WiMAX Front Right Left Bottom 15. PCI Express Mini Card slot for Wireless LAN/WiMAX Your computer might include a PCI Express Mini Card in the PCI Express Mini Card slot for Wireless LAN/WiMAX which enable wireless LAN communications. file://C:\TamaTemp\LCMPCI.HTM\LCMPCI.HTM 2008/06/11 Location: PCI Express Mini Card slot for Wireless WAN 1/1 Location: PCI Express Mini Card slot for Wireless WAN Front Right Left Bottom 14. PCI Express Mini Card slot for Wireless WAN Some computers have a PCI Express Mini Card in the PCI Express Mini Card slot for Wireless WAN which enable wireless WAN communications. file://C:\TamaTemp\LCMPCI2.HTM\LCMPCI2.HTM 2008/06/11 Location: PCI Express Half Mini Card slot for Wireless USB 1/2 Location: PCI Express Half Mini Card slot for Wireless USB Front Right Left Bottom 4. PCI Express Half Mini Card slot for Wireless USB Some models have the Wireless USB features. This slot also accepts an Intel Turbo Memory Card. file://C:\TamaTemp\LCUWB.HTM\LCUWB.HTM 2008/06/11 1/5 Installing and replacing the PCI Express Mini Card for wireless LAN/WiMAX connection Before you start, print these instructions. Your computer has a PCI Express Mini Card for wireless LAN/WiMAX. To replace the PCI Express Mini Card with a new one, follow the procedure below. Danger: During electrical storms, do not connect the cable to or disconnect it from the telephone outlet on the wall. Danger: Electric current from power, telephone, and communication cables is hazardous. To avoid shock hazard, disconnect the cables before opening the cover of this slot. Attention: Before you start installing a module, touch a metal table or a grounded metal object. This action reduces any static electricity from your body. The static electricity could damage the PCI Express Mini Card. Note: Use the PCI Express Mini Card provided by Lenovo. Replacing a PCI Express Mini Card with two connectors Replacing a PCI Express Mini Card with three connectors Replacing a PCI Express Mini Card with two connectors To replace the PCI Express Mini Card with two connectors, do as follows:
1. Turn off the computer; then disconnect the AC adapter and all cables from the computer. Wait for a few minutes, till the inside of the computer cools, before you start the following procedures. 2. Close the computer display, and turn the computer over. 3. Remove the battery. 4. Remove the keyboard. 5. Remove the palm rest. 6. If a tool for removing connectors is included in the package with the new card, use it to disconnect the cables from the card. If no such tool is included, disconnect the cables from the card by picking up the connectors with your fingers and gently unplugging them. PCI Express Mini Card file://C:\TamaTemp\replpci.htm\replpci.htm 2008/06/11 2/5 PCI Express Half Mini Card 7. Remove the screws. PCI Express Mini Card PCI Express Half Mini Card file://C:\TamaTemp\replpci.htm\replpci.htm 2008/06/11 3/5 8. Remove the card. PCI Express Mini Card PCI Express Half Mini Card 9. Align the contact edge of the PCI Express Mini Card with the corresponding socket contact of the computer. 10. Pivot the card until you can snap it into place by pressing the upper side of the connectors; then secure the card with the two screws. 11. Connect the cables to the new PCI Express Mini Card. Note: If the new PCI Express Mini Card has three connectors, you must attach the cables to the right and left connectors. If you attach either cable to the center connector, the connection speed will be lower. file://C:\TamaTemp\replpci.htm\replpci.htm 2008/06/11 4/5 12. Reinstall the palm rest. 13. Reinstall the keyboard. 14. Reinstall the battery. 15. Turn the computer over again. Connect the AC adapter and cables to the computer; then turn it on. Replacing a PCI Express Mini Card with three connectors If your computer has a Multiple Input Multiple Output (MIMO) or WiMAX feature, the PCI Express Mini Card with three connectors comes with the computer. To replace the card for the MIMO or WiMAX feature, do as follows:
1. Turn off the computer; then disconnect the AC adapter and all cables from the computer. Wait for a few minutes, till the inside of the computer cools, before you start the following procedures. 2. Close the computer display, and turn the computer over. 3. Remove the battery. 4. Remove the keyboard. 5. Remove the palm rest. 6. If a tool for removing connectors is included in the package with the new card, use it to disconnect the cables from the card. If no such tool is included, disconnect the cables from the card by picking up the connectors with your fingers and gently unplugging them. 7. Remove the screws. file://C:\TamaTemp\replpci.htm\replpci.htm 2008/06/11 8. Remove the card. 5/5 9. Align the contact edge of the new card with the corresponding socket contact of the computer. 10. Pivot the card until you can snap it into place by pressing the upper side of the connectors; then secure the card with the two screws. 11. Connect the black cable (AUX) to the right connector, the white cable (MIMO third) to the center connector and the gray cable to the left connector on the new card. Note: If the new PCI Express Mini Card has two connectors, you must attach the gray cable to the left connector and the black cable to the right connector. 12. Reinstall the palm rest. 13. Reinstall the keyboard. 14. Reinstall the battery. 15. Turn the computer over again. Connect the AC adapter and cables to the computer; then turn it on. file://C:\TamaTemp\replpci.htm\replpci.htm 2008/06/11 Installing and replacing the PCI Express Mini Card for wireless WAN connection 1/2 Installing and replacing the PCI Express Mini Card for wireless WAN connection Before you start, print these instructions. Some ThinkPad models have a PCI Express Mini Card slot for wireless WAN connection. To replace the PCI Express Mini Card with a new one, follow the procedure below. Danger: During electrical storms, do not connect the cable to or disconnect it from the telephone outlet on the wall. Danger: Electric current from power, telephone, and communication cables is hazardous. To avoid shock hazard, disconnect the cables before opening the cover of this slot. Attention: Before you start installing a PCI Express Mini Card, touch a metal table or a grounded metal object. This action reduces any static electricity from your body. The static electricity could damage the card. Replacing the PCI Express Mini Card To replace the PCI Express Mini Card, do as follows:
1. Turn off the computer; then disconnect the AC adapter and all cables from the computer. Wait for a few minutes, till the inside of the computer cools, before you start the following procedures. 2. Close the computer display, and turn the computer over. 3. Remove the battery. 4. Remove the keyboard. 5. Remove the palm rest. 6. If a tool for removing connectors is included in the package with the new card, use it to disconnect the cables from the card. If no such tool is included, disconnect the cables from the card by picking up the connectors with your fingers and gently unplugging them. Note: Depending on the system configuration of your computer, the card may have only one connector. 7. Remove the screws that secure the card. file://C:\TamaTemp\replwan.htm\replwan.htm 2008/06/11 Installing and replacing the PCI Express Mini Card for wireless WAN connection 2/2 8. Remove the card. 9. Align the contact edge of the new Wireless WAN Card with the corresponding socket contact of the computer. 10. Pivot the card until you can snap it into place by pressing the upper side of the connectors; then secure the card with the two screws. Connect the cables to the new card. Note: Depending on the system configuration of your computer, the card may have only one connector. 11. Reinstall the palm rest. 12. Reinstall the keyboard. 13. Reinstall the battery. 14. Turn the computer over again. Connect the AC adapter and cables to the computer; then turn it on. file://C:\TamaTemp\replwan.htm\replwan.htm 2008/06/11 Power-status indicators 1/2 Power-status indicators The computer has status indicators that show the mode (sleep/standby, hibernation, or normal), AC power status, and the status of the battery. The following shows the location and the meaning of the indicators:
For models with Bluetooth For models with Wireless USB 1. Sleep (standby in Windows XP) status
Green: The computer is in sleep (standby) mode.
Blinking green: The computer is entering sleep (standby) or hibernation mode, or is resuming normal operation. 2. AC power status 3. Battery status
Green: The AC adapter is connected and the computer is operating on AC power. If a battery is installed in the computer, it is charged when this indicator is green.
Off: The computer is operating on battery power.
Green: The battery has more than 20% charge.
Orange: The battery has between 5% and 20% charge.
Fast blinking orange: The battery has less than 5% charge. Note: The battery may be charging.
Slow blinking orange: The battery is being charged. When it reaches 20%, the blinking color changes to green.
Slow blinking green: The battery has between 20% and 80% charge, and charging is continuing. When the battery reaches 80% charge, blinking stops, but the charging may continue until the battery is 100% charged. Note: If the computer is operating on battery power, the Battery status indicator does not work while the computer is turned off or it is in sleep (standby) mode or hibernation mode. If your computer is shipped with a wireless WAN feature, a Bluetooth feature, a Wireless USB feature, a wireless LAN feature, and a WiMAX feature, you can use the following indicators:
4. Wireless WAN/WiMAX status
Green: The wireless WAN feature or WiMAX feature is on, and the radio link is ready for use.
Blinking green: Data is being transmitted. 5. Bluetooth or Wireless USB status
Green: The Bluetooth feature or Wireless USB feature is on, and the radio link is ready for use.
Blinking green: Data is being transmitted. 6. Wireless LAN status
Green: The wireless feature (the IEEE 802.11 standard) is on, and the radio link is ready for use.
Blinking green: Data is being transmitted. file://C:\TamaTemp\battstat.htm\battstat.htm 2008/06/11 Location: wireless radio switch 1/1 Location: wireless radio switch Front Right Left Bottom 2. Wireless radio switch You can quickly turn the wireless features of your ThinkPad computer on and off using this switch. file://C:\TamaTemp\LCwlsw.HTM\LCwlsw.HTM 2008/06/11 Wireless connections 1/2 Wireless connections Wireless connection is the transfer of data without the use of cables by means of radio waves only. Depending on the frequency used for data transmission, the area covered, or the type of the device used for data transfer, the following categories of wireless networks may be available to you:
Wireless LAN A wireless local area network covers a relatively small geographic area, such as an office building or a house. Devices based on the IEEE 802.11 standards can connect to this network. Wireless WAN A wireless wide area network covers a broader geographic area. Cellular networks are used for data transmission, and access is provided by a wireless service carrier. Bluetooth One of a number of technologies used to create a wireless personal area network. Bluetooth can connect devices a short distance from one another, and is commonly used for connecting peripheral devices to a computer, transferring data between hand-held devices and PC, or remotely controlling and communicating with devices such as mobile phones. Wireless USB This wireless analog of the USB standard can create a wireless personal area network by implementing short-range large-bandwidth radio transmissions. It is used primarily for connecting a PC to peripherals that are no more than a short distance from the host. WiMAX (Worldwide Interoperability for Microwave Access) This long-range wireless data transmission technology based on the IEEE 802.16 standard, is expected to provide the user a "last mile" broadband connectivity similar to that provided by cable or ADSL, but without the need to physically connect a cable to the PC. Using wireless LAN connections Using wireless WAN connections Using Bluetooth Using Wireless USB Using WiMAX Checking wireless connection status Enabling or disabling the wireless feature file://C:\TamaTemp\Wireless.htm\Wireless.htm 2008/06/11 Making wireless LAN connections 1/1 Using wireless LAN connections Your computer comes with a built-in wireless networking card and a configuration utility to help you make wireless connections and monitor the status of your connection, so that you can stay connected to your network while you are in the office, in a meeting room, or at home, with no need for a wired connection. Attention: If you carry your ThinkPad computer with the wireless LAN feature into an airplane, you need to disable it before boarding. To disable it, refer to the instructions in Enabling or disabling the wireless feature. Note: You can purchase a wireless networking card as an option. For more information, refer to Finding ThinkPad options. Note: If you use the computer in tablet mode, do not cover the UltraConnect wireless antennas built into the display. Tips for using the wireless LAN feature
Place your computer so that there are as few obstacles as possible between the wireless LAN access point and the computer.
For the best connection of the wireless LAN feature, open your computer display to an angle of slightly more than 90 degrees.
If you use the wireless feature (the IEEE 802.11 standard) of your computer simultaneously with a Bluetooth option, data transmission speed can be delayed and the performance of the wireless feature can be degraded. Wireless networking setup Wireless security features Wireless upgradeable ThinkPad models file://C:\TamaTemp\Wireconn.htm\Wireconn.htm 2008/06/11 Using WiMax 1/1 Using WiMAX Some ThinkPad computers come with a built-in wireless LAN card integrating WiMAX technology. WiMAX -- a long-range wireless data transmission technology based on the IEEE 802.16 standard -- provides you with a "last mile" broadband connectivity similar to that offered by cable or ADSL, but without the need to physically connect a cable to the PC. To use the WiMAX feature, start Access Connections. To start the Access Connections wizard, click Start --> All Programs --> ThinkVantage --> Access Connections, and follow the instructions on the screen. file://C:\TamaTemp\wimax.HTM\wimax.HTM 2008/06/11 Using wireless WAN connections 1/1 Using wireless WAN connections Wireless Wide Area Network (wireless WAN) enables you to establish wireless connections over remote public or private networks. These connections can be maintained over a large geographical area, such a city or an entire country, by use of multiple antenna sites or satellite systems maintained by wireless service providers. Some ThinkPad computers come with a built-in wireless WAN card integrating some wireless WAN technologies, such as 1xEV-DO or HSPA. You can connect to the Internet or your company network with the built-in wireless WAN card and the configuration utility to make a wireless WAN connection and monitor its status. Note: Wireless WAN service is provided by authorized service providers in some countries. Note: When the wireless WAN connection is enabled, you cannot set the screen orientation of your computer to Secondary Landscape. For maximum performance from your wireless WAN connection, please keep the following best usage guidelines in mind:
Keep your notebook away from your body.
Place your notebook on a flat surface and keep the lid open at a 105 degree angle.
If your notebook has a retractable antenna, ensure that the antenna is fully extended.
Place your notebook away from concrete or brick walls that may dampen cellular signals.
Best reception will be available near windows and other locations where cellular phone reception is the strongest. To use a wireless WAN connection with built-in wireless WAN features, start Access Connections. To start the Access Connections wizard, click Start -> All Programs -> ThinkVantage -> Access Connections, and follow the instructions on the screen. file://C:\TamaTemp\usewan.htm\usewan.htm 2008/06/11 Using Wireless USB 1/1 Using Wireless USB Note: For Japanese models, when you use the Wireless USB feature, use AC power to run your computer. If you do not use AC adapter, the Wireless USB feature will not work. If your computer is equipped with Wireless USB features, you can enable or disable those features by pressing Fn+F5. If you press Fn+F5, a list of wireless features is displayed. You can enable or disable the Wireless USB radio with a single click. Note: Only a Certified Wireless USB device can be connected to your ThinkPad computer. Using a Wireless USB device with your computer for the first time When a Wireless USB device is used for the first time, you must associate it with your computer, by doing the following:
1. Open the Wireless USB Connection Manager by double-clicking its icon in the task tray. 2. Connect the Wireless USB device to your computer, using a USB cable. 3. Wait until the Wireless USB device is listed in the Wireless USB Connection Manager and the balloon message "Wireless USB device associated"
appears. 4. Remove the USB cable. 5. Wait until the status of the Wireless USB device in the Wireless USB Connection Manager changes to "Connected."
Once the device is associated, it will automatically connect without a USB cable as long as it is within a range of availability. For more details, refer to the manual provided with the device. Note: The Wireless USB device may reconnect automatically even after you click the "Disconnect" button in the USB Connection Manager. To completely disconnect the Wireless USB device, press Fn + F5 keys. file://C:\TamaTemp\useuwb.htm\useuwb.htm 2008/06/11 Using Bluetooth 1/6 Using Bluetooth For Windows Vista For Windows XP For Windows Vista:
If your computer is equipped with the Integrated Bluetooth features, you can enable or disable the features by pressing Fn+F5. If you press Fn+F5, a list of wireless features is displayed. You can enable or disable the Bluetooth features with a single click. To connect to a Bluetooth device, start Access Connections. Access Connections enables you to easily pair your computer with the available devices, take advantage of their functions, or transfer files. To use a Bluetooth device, do the following:
Click Start --> All Programs --> ThinkVantage --> Access Connections, and then select the Connect to Devices tab. Click the Find button to find the Bluetooth devices in your vicinity. Double-click the device or drag and drop it within the circle surrounding your computer to pair them, and then click the device again to select the task from the task list. To configure a Bluetooth device or manage connection settings, you can also use Bluetooth Devices in Control Panel. 1. Click Start --> Control Panel. 2. Click Hardware and Sound. 3. Click Bluetooth Devices. To send data to a Bluetooth-enabled device, do as follows:
1. Right-click data that you want to send. 2. Select Send To -> Bluetooth Devices. For details, refer to the Windows online help. Note: If you use the wireless feature (the IEEE 802.11 standard) of your computer simultaneously with a Bluetooth option, data transmission speed can be delayed and the performance of the wireless feature can be degraded. file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Using Bluetooth 2/6 For Windows XP:
If your computer is equipped with the Integrated Bluetooth features, you can enable or disable the features by pressing Fn+F5. If you press Fn+F5, a list of wireless features is displayed. You can enable or disable the Bluetooth features with a single click. In Windows XP, you can use either ThinkPad Bluetooth with Enhanced Data Rate Software, or the Microsoft Bluetooth software. By default, ThinkPad Bluetooth with Enhanced Data Rate Software is installed on your computer. Using Bluetooth for the first time on your computer If this is the first time Bluetooth has been used on your computer, use either of the following procedures:
1. Double-click the My Bluetooth Places icon on the desktop, or the Bluetooth icon in the task bar. The Start Using Bluetooth window opens, and some virtual device drivers are installed automatically. 2. Wait until the installation of the drivers is complete. OR 1. Right-click the My Bluetooth Places icon on the desktop, or the Bluetooth icon in the task bar. 2. Select Start Using Bluetooth. The Start Using Bluetooth window opens, and some virtual device drivers are installed automatically. 3. Wait until the installation of the drivers is complete. Some other virtual device drivers will be installed on demand when you use certain Bluetooth profiles for the first time. Using the Microsoft Bluetooth software If you are using Windows XP and want to use the Microsoft standard Bluetooth features, install the software by following the instructions in Installing the Microsoft Bluetooth software in Windows XP. For information about how to use the Bluetooth function, do as follows:
1. Press Fn+F5 to turn on Bluetooth. 2. Click Start --> Control Panel. 3. Click Printers and Other Hardware. 4. Click Bluetooth Devices. 5. Click the Options tab. 6. Click Learn more about Bluetooth Settings. file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Using Bluetooth 3/6 Using ThinkPad Bluetooth with Enhanced Data Rate Software If ThinkPad Bluetooth with Enhanced Data Rate Software is installed on your computer, two icons are displayed on the screen:
My Bluetooth Places on the desktop
Bluetooth Configuration in the system tray of the taskbar My Bluetooth Places To use the Bluetooth features, do the following:
1. Double-click the My Bluetooth Places icon on the desktop. 2. For Windows XP, go to Bluetooth Tasks and double-click View devices in range. A list of the devices on which Bluetooth has been enabled appears. 3. Click the device to which you want access. A list of the services available on that device appears, as follows:
Bluetooth keyboard and mouse (Human interface devices)
Printer (HCRP)
Audio gateway
Headset
PIM synchronization
Fax
File transfer
PIM item transfer
Dial-up networking
Network access
Bluetooth serial port
Bluetooth Imaging
Hands Free
AV profile 4. Click the service you want. For more information, press the F1 key to open the online help for Bluetooth. file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Using Bluetooth 4/6 Bluetooth Configuration To use the configuration features of Bluetooth, right-click the icon. A pop-up menu appears. Select Bluetooth Setup Wizard or Advanced Configuration. The Bluetooth Setup Wizard has the following capabilities:
Finding all Bluetooth-enabled devices that can provide services
Finding a specific Bluetooth-enabled device that you want to use, and configuring the services on that device
Configuring the Bluetooth-enabled services on your computer that are provided for remote devices
Configuring the name and device type of your computer The Advanced Configuration has the following functions:
Configuring the name and device type of your computer
Configuring your computer settings so that remote Bluetooth-enabled devices can find your computer
Configuring your computer settings so that your computer can find remote Bluetooth-enabled devices
Configuring, on your computer, the Bluetooth-enabled services provided for remote devices
Configuring the services on remote Bluetooth-enabled devices
Displaying information about Bluetooth hardware For details, refer to the help for Bluetooth. To see the help, double-click My Bluetooth Places, and click Help and then Bluetooth help. Another way to start the help is to right-click Bluetooth Configuration in the system tray of the taskbar, and click Advanced Configuration and then Help. Installing the Microsoft Bluetooth software in Windows XP If you want to use the Microsoft Bluetooth software, do as follows:
First uninstall the ThinkPad Bluetooth with Enhanced Data Rate Software. 1. Turn Bluetooth power off. 2. Click Start-->Control Panel. 3. Click Add/Remove Programs. 4. Select ThinkPad Bluetooth with Enhanced Data Rate Software; then click Change/Remove to uninstall the software. file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Using Bluetooth 5/6 5. Follow the instructions on the screen. Next install the Microsoft Bluetooth software, as follows:
1. Turn Bluetooth power on. Microsoft Bluetooth software is loaded automatically. 2. If the Found New Hardware Wizard window pops up, do the following:
1. Select No, not this time, and then click Next. 2. Select Install from a list or specific location (Advanced); then click Next. 3. Select Search for the best driver in those locations. 4. Select Include this location in the search:, and type "C:\SWTOOLS\Drivers\MSBTooth," or specify the location in which you placed the extracted INF file. Then click Next. 3. Click Finish. Installing ThinkPad Bluetooth with Enhanced Data Rate Software in Windows XP If you are using the Microsoft Bluetooth software and want to use ThinkPad Bluetooth with Enhanced Data Rate Software instead, replace the Microsoft Bluetooth software with ThinkPad Bluetooth with Enhanced Data Rate Software as follows:
1. Press Fn+F5 to turn the Bluetooth power on. 2. Click Start -> Run. 3. Type "C:\SWTOOLS\Drivers\TPBTooth\Setup.exe" (or specify the full path to the setup.exe file you have downloaded from http://www.lenovo.com/think/support); then click OK. 4. Click Next. 5. Select I accept the terms in the license agreement; then click Next. 6. Click Next to select the default destination folder. If you need to change the destination folder, click Change, select or enter the name of the destination folder in the Change current destination folder window, and click OK. 7. Click Install to begin installation. 8. Click OK to accept the driver signature. 9. Click Finish. 10. Restart the computer if necessary. file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Using Bluetooth 6/6 replace the Bluetooth driver, as follows:
1. Click Start-->Control Panel. 2. Click Performance and Maintenance; then click System. 3. Click the Hardware tab; then click Device Manager. 4. Double-click Bluetooth Radios to extract the Bluetooth Radios device tree. 5. Double-click the ThinkPad Bluetooth with Enhanced Data Rate icon to open the Properties window. 6. Click the Driver tab; then click Update Driver. 7. Click No, not this time, and then click Next. 8. Select Install from a list or specific location (Advanced), and then click Next. 9. Select Don't search. I will choose the driver to install; then click Next. 10. Select the driver that has no "Digital Signed" icon; then click Next. 11. Click Finish. can be delayed and the performance of the wireless feature can be degraded. Note: If you use the wireless feature (the IEEE 802.11 standard) of your computer simultaneously with a Bluetooth option, data transmission speed file://C:\TamaTemp\BLUETOO.HTM\BLUETOO.HTM 2008/06/11 Wireless networking setup 1/1 Wireless networking setup To use the built-in wireless networking card (the IEEE 802.11 standard) to communicate, start Access Connections. To start the Access Connections wizard, click Start -> All Programs -> ThinkVantage -> Access Connections, and follow the instructions on the screen. Note: Before you start setting up wireless networking connections by using Access Connections, obtain a Network Name (SSID) and your encryption information from your network administrator. Access Connections, a connectivity assistant program, can easily enable one network adapter and disable the other adapters on demand. After setting up your wireless networking connection, you can use the program to quickly switch the network settings. file://C:\TamaTemp\wireset.htm\wireset.htm 2008/06/11 Wireless security features 1/1 Wireless security features Advances in wireless technology require that we manage your security more reliably than ever. Therefore, Lenovo has extended its Embedded Security Subsystem to encompass virtually all of our ThinkPad and desktop computer lines. This security subsystem helps protect data, hardware, network access and communications - both wired and wireless - on select ThinkPad and desktop PCs. The Embedded Security Subsystem provides hardware-based protection of critical security information, including passwords, encryption keys, and electronic credentials. It also helps identify computer users involved in transactions, and helps establish that data transmissions are authentic, confidential and intact. Security and Privacy Services for wireless risk assessment and wireless solution design can help you assess the risks based on your business needs, identify your information risk position, and integrate security strategies, policies, and architectures to help you achieve your wireless e-business objectives. To effectively manage risk on an ongoing basis, organizations must have a sound security strategy. By understanding threats and vulnerabilities at an early stage, we can help define the necessary scope and features of your wireless e-business security infrastructure. For more information on wireless security offerings, click the following link:
http://www.pc.ibm.com/us/think/thinkvantagetech/security.html file://C:\TamaTemp\wiresec.HTM\wiresec.HTM 2008/06/11 Checking wireless connection status 1/2 Checking wireless connection status You can check the signal strength and status of your wireless connection either by opening Access Connections, or by double-clicking the Access Connections wireless status icon in the system tray. The Access Connections wireless status icon displays the signal strength and status of your wireless connection. Wireless status icon states: wireless LAN No link or a very poor one Usable but weak link Strong link Wireless radio is disabled Note: If you have trouble in making a connection, try moving your computer closer to your wireless access point. Wireless status icon states: wireless WAN Power to the WAN radio is off. No association No signal Signal level 1 Signal level 2 file://C:\TamaTemp\wirestat.htm\wirestat.htm 2008/06/11 Enabling or disabling the wireless feature 1/2 Enabling or disabling the wireless feature To enable or disable the wireless feature, press Fn+F5. A list of wireless features is displayed. You can turn the feature on and off with a single click. You can also enable or disable the feature by the following procedures. To enable the wireless feature, do as follows:
1. Click the Wireless Icon in the system tray. 2. Click Power On Wireless Radio. To disable the wireless feature, do as follows:
1. Click the Wireless Icon in the system tray. 2. Click Power Off Wireless Radio. Note: To enable the wireless radio, do as follows:
1. Select On for the Wireless LAN Radio Frequency in the BIOS Setup Utility. 2. Select the On position of the wireless radio switch on the computer. 3. Click the Wireless Icon in the system tray and select Power On Wireless Radio. Or press Fn+F5, and then turn the feature on. Note: You can use the wireless radio switch to disable the wireless radio of all the wireless devices on your computer. Note: You can also use the Tablet Shortcut Menu to enable or disable the wireless feature if you are using your computer in tablet mode. file://C:\TamaTemp\Wlenab.htm\Wlenab.htm 2008/06/11 Wireless upgradeable ThinkPad models 1/1 Wireless upgradeable ThinkPad models Depending on the model, your ThinkPad computer might be wireless upgradeable. This means that your computer has an antenna that can support wireless LAN access when wireless LAN access points are available. Wireless devices are available from Lenovo: Finding ThinkPad options. file://C:\TamaTemp\WIREREAD.HTM\WIREREAD.HTM 2008/06/11 Wireless related information 1/3 Wireless related information Wireless interoperability Wireless LAN PCI Express Mini Card is designed to be interoperable with any wireless LAN product that is based on Direct Sequence Spread Spectrum (DSSS), Complementary Code Keying (CCK), and/or Orthogonal Frequency Division Multiplexing (OFDM) radio technology, and is compliant to:
The IEEE 802.11a/b/g Standard on Wireless LANs, as defined and approved by the Institute of Electrical and Electronics Engineers.
The Wireless Fidelity (WiFi) certification as defined by the Wi-Fi Alliance. Bluetooth Daughter Card is designed to be interoperable with any Bluetooth product that is compliant to Bluetooth Specification 2.0 +
EDR as defined by the Bluetooth SIG. Following profiles are supported by Bluetooth Daughter Card:
Generic Access
Service Discovery
Serial Port
Dial-up Networking
FAX
LAN Access using PPP
Personal Area Network
Generic Object Exchange
Generic Object Push
File Transfer
Synchronization
Audio Gateway
Headset
Printer file://C:\TamaTemp\wiinfo.htm\wiinfo.htm 2008/06/11 Wireless related information 2/3
(
y
)
Basic Image
Handsfree
AV Usage environment and your health Wireless LAN PCI Express Mini Card and Bluetooth Daughter Card emit radio frequency electromagnetic energy like other radio devices. However, the level of energy emitted is far much less than the electromagnetic energy emitted by wireless devices like for example mobile phones. Because Wireless LAN PCI Express Mini Card and Bluetooth Daughter Card operate within the guidelines found in radio frequency safety standards and recommendations, Lenovo believes the integrated wireless cards are safe for use by consumers. These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situation or environment, the use of Wireless LAN PCI Express Mini Card or Bluetooth Daughter Card may be restricted by the proprietor of the building or responsible representatives of the organization. These situations may for example include:
Using the integrated wireless cards on board of airplanes, or in hospitals
In any other environment where the risk of interference to other devices or services is perceived or identified as harmful. If you are uncertain of the policy that applies on the use of wireless devices in a specific organization (e.g. airport or hospital), you are encouraged to ask for authorization to use Wireless LAN PCI Express Mini Card or Bluetooth Daughter Card prior to turning on the computer. file://C:\TamaTemp\wiinfo.htm\wiinfo.htm 2008/06/11 Using the tablet mode In the tablet mode, you can use your ThinkPad computer in a creative and intuitive way by jotting down notes and illustrations with the Tablet Digitizer Pen and then storing them digitally. To use your ThinkPad computer in the tablet mode, do as follows:
1. Unlock the display latch (1) and open the computer display (2) slowly, holding the upper left and right sides of the display with both hands. Your computer is now in the notebook mode. 2. Open the display by at least 45 degrees, preferably by 90 degrees. Grasp the center of one side of the computer display with one hand while holding the keyboard bezel with the other hand; then rotate the display slowly clockwise or counter-clockwise (the figure below shows clockwise rotation as an example) until the back of the display is facing the keyboard. Your computer is now in the picture frame mode. Note: While rotating the display, do not press the upper edge of either side of the display. 3. Close the computer display slowly, holding the upper left and right sides with both hands. Note: Make sure that the display is rotated at 180 degrees, so that the back of the display faces the keyboard. 4. Press the center latch down to lock the display. Note: Do not rotate, twist, or bend the center latch of the display. Your computer is now in the tablet mode. To return your ThinkPad computer to the notebook mode, do as follows:
1. Take note of the display swivel indicator located on the hinge. The arrow lights green to show which direction you need to rotate the display to return it to notebook mode. Note: Do not force the display to rotate in the wrong direction. 2. Unlatch the display latch and open the display by at least 45 degrees, preferably by 90 degrees. 3. Follow the direction shown by the dual-swivel indicator and rotate the display slowly (figure below shows counter-clockwise rotation as an example) until the front of the display is facing the keyboard. Your computer is now in the notebook mode. Tips on using your computer in the tablet mode z To close the computer display, first make sure that the display either faces the keyboard or is positioned at 180 degrees to the keyboard, so that the back of the display faces the keyboard. z Do not pick up or hold the computer by the display only. z Do not hit, vibrate, or bump the computer display. z To allow free ventilation, do not place any obstacle, such as a thick-piled carpet or a soft cushion, z When you use the computer in the picture frame mode, hold the display with one hand and use in front of the fan. the Tablet Digitizer Pen. z If you hold the computer with one hand while using it in the tablet mode, do not expose it to excessive vibration, shock, or rotation. z Do not use the computer outdoors. Do not expose it to rain. z If you put your computer in a carrying case, put it into notebook mode and close the display. Using the Tablet Digitizer Pen The Tablet Digitizer Pen and its accessories are shipped in a separate box within the ThinkPad shipping box. You can use the pen to control your computer just as you would with a mouse or keyboard. Note: This pen is not waterproof. Take care not to soak it or dip it in water. You can store the pen in the slot on the right side of the ThinkPad computer. Press it gently into the slot until you hear a click. To remove the pen from its slot, press it gently into the slot (1) to release it; then pull it out (2). Note: The pen contains pressure sensors. Do not push the tip of the pen for an extended period of time. Do not subject the pen to shock or vibration. The Tablet Digitizer Pen consists of a tip (2), a click button (3), and an eraser tip (4). Hold the pen and point the tip at the display to move the cursor (1). To make a selection (single click), tap the display once with the pen. To double-click, tap twice without pausing. To do a right-click, tap the display once and then hold the tip of the pen on the display; the right-
click icon appears. Pressing the click button (3) is the same as a right-click. The eraser tip (4) functions like an eraser in applications that support this function. Note: You can enable or disable the pen buttons in the Tablet and Pen Settings panel of the Tablet Shortcut Menu. Note: The Digitizer Pen shipped with the ThinkPad X200 Tablet computer is for use with that computer only. Do not insert it into the pen slot of the ThinkPad X41 Tablet computer. only. Do not insert it into the pen slot of the ThinkPad X200 Tablet computer. Using the Tablet PC Input Panel Besides functioning as a basic selection tool, the Tablet Digitizer Pen also enables you to write text or draw on the screen, as you would with a pen on paper. Different methods of input can be chosen from the Tablet PC Input Panel on the Windows taskbar. To configure the Tablet Digitizer Pen settings, use the Tablet and Pen Settings panel of the Tablet Shortcut Menu. Replacing the Tablet Digitizer Pen tip The tip of the Tablet Digitizer Pen may wear out. Replacement tips and a tip removal tool are included in the pen box shipped with your computer. Note: Your computer is shipped with five replacement tips for the Digitizer Pen. Be sure to store the pen tips in a secure place for future use. The pen tips will not be covered under the warranty for the digitizer pen or the computer. To replace a pen tip, do as follows:
1. Grip the pen tip with the tip removal tool, and pull it out. 2. Insert a replacement pen tip fully into the Tablet Digitizer Pen. Using the touch panel Some models have the touch panel feature. The touch panel feature makes the interaction with your ThinkPad computer even more natural, because you can use your finger instead of a pen for navigation on the go. To make a selection (single click), tap the display once with your finger. To double-click, tap twice without pausing. To do a right-click, tap the display once and then hold your finger on the display until the right-
click icon appears. Tips on using the touch panel z The touch panel is a glass panel covered with a plastic film. For input you can use either your finger or the Tablet Digitizer Pen shipped with your computer. Do not use any pen other than the specified one, or any metallic object, because to do so might damage the touch panel or cause it to malfunction. z If you put your computer in a carrying case, put it into notebook mode and close the display. Do not carry your computer in tablet mode. z If you use both your finger and the Tablet Digitizer Pen simultaneously for input to the screen, only data entered by use of the Digitizer Pen will be processed. z If you use your finger to input to the touch panel, touch only one point at a time. If you touch several points simulatneously, the input will not be processed correctly. z With the touch panel, gradually a discrepancy may start to appear between the point you touched with your finger during the finger point, and its actual position on the screen. To avoid this, regularly correct the accuracy of the finger input by use of the touch panel Settings Utility. Cleaning the touch panel display 1. To remove fingerprints, etc., from the touch panel display, use a dry, soft, lint-free cloth. (A piece of absorbent cotton will also serve the purpose.) Do not apply solvents to the cloth. 2. Gently wipe foreign particles and dust from the touch panel with one side of the cloth. 3. Wipe smudges or fingerprints with the other side of the cloth, or with a clean cloth. 4. After using the cloth, wash it with a neutral detergent.
various | User Manual 1 | Users Manual | 2.69 MiB |
4
1 _ n e _ r e v o c
. 0 1 V G U 0 5 5 Y d a P a e d I o v o n e L 0 5 5 Y d a P a e d I
. 0 1 V e d u G i r e s U o v o n e L Lenovo China 2009 i a n h C n i d e t n i r P
. 1 1
6 5 1 2 0 0 7 4 1
N
P M T
. i i g n k n h T w e N
. d l r o W w e N m o c
. o v o n e l
. w w w
. E R O T S E H T O T T I N R U T E R T O N O D 3
2 _ n e _ r e v o c
. 0 1 V G U 0 5 5 Y d a P a e d I o v o n e L
g n i w o l l o f e h t d a e r o t e r u s e b
, s t r o p p u s t i t c u d o r p e h t d n a n o i t a m r o f n i s i h t g n i s u e r o f e B e t o N
, y l t c e r r o c g n k r o w i t o n s i t c u d o r p r u o y f I
. n o i t a c i l b u p s i h t h t i w e g a k c a p e h t n i d e d u l c n i e d i u G r e s U m e t s y S e u c s e R y e K e n O
. 4 0 1 e g a p n o s e c i t o N
. D x i d n e p p A
. 5 5 e g a p n o n o i t a m r o f n I e r a C d n a
, e s U
, y t e f a S
. 6 r e t p a h C
s e t a d p u d n a n o i t a m r o f n i t r o p p u s d n i f n a c u o y
, y l l a n o i t i d d A
. m o c o v o n e l
. t r o p p u s r e m u s n o c
p t t h t a d e t a c o l e t i s b e W o v o n e L e h t n o t r o p p u s o v o n e L a t c a t n o c
, e c n a i t s s s a l i a c n h c e t r o F 4
7 7 8
1 e e r f l l o t g n i l l a c y b y a d a s r u o h 4 2
) 6 8 6 6
3 5 4
7 7 8
1
t s i l i a c e p s O V O N E L h t i w d e d i v o r p e r a s e c i v r e s r o
d n a s t c u d o r p r u O
S T H G I R D E T C I R T S E R S R E S U T N E M N R E V O G
. S U e l u d e h c S P D A A S G e h t j o t t c e b u s s i t n e m n r e v o G e h t y b e r u s o l c s i d r o n o i t a c i l p u d
, e s U
. S T H G I R D E T C I R T S E R
. d e v r e s e r s t h g i r l l A
. 9 0 0 2 o v o n e L t h g i r y p o C
) 8 0 0 2 r e b m e c e D
n o i t i d E t s r i F
. s e t t a S d e t i n U e h t m o r f s r e s u e h t r o l f y n O
l a i c r e m m o C n i h t r o f t e s s n o i s i v o r p e h t r e d n u m a r g o r P s i h t e d i v o r p e w n e h t
, s m r e t e s e h t r e d n u m a r g o r P s i h t R A F
, l a r e n e G
a t a D n i s t h g i R r e d n u r o
, e l b a c i l p p a n e h w
, 9 1
7 2 2
. 2 5 R A F t a s t h g i R d e t c i r t s e R e r a w t f o S r e t u p m o C
) I I I e t a n r e t l A
4 1
. 7 2 2
. 2 5 t p e c c a o t e l b a n u s i y c n e g a e h t f i r o
, e s n e c i l l a i c r e m m o c s i h t f o s m r e t d r a d n a t s e h t r o
, y n a f i
, o v o n e L h t i w t c a r t n o c Y550 UG V1.0_en.book Page 1 Wednesday, December 10, 2008 4:51 PM ENERGY STAR model information ENERGY STAR is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy aimed at saving money and protecting the environment through energy efficient products and practices. Lenovo is proud to offer our customers products with an ENERGY STAR compliant designation. Lenovo computers of the following machine types, if the ENERGY STAR mark is affixed, have been designed and tested to conform to the ENERGY STAR 4.0 program requirements for computers. 20017 4186 By using ENERGY STAR compliant products and taking advantage of the power-management features of your computer, you reduce the consumption of electricity. Reduced electrical consumption contributes to potential financial savings, a cleaner environment, and the reduction of greenhouse gas emissions. Y550 UG V1.0_en.book Page 2 Wednesday, December 10, 2008 4:51 PM For more information about ENERGY STAR, visit http://www.energystar.gov. Lenovo encourages you to make efficient use of energy an integral part of your day-to-day operations. To help in this endeavor, Lenovo has preset the following power-management features to take effect when your computer has been inactive for a specified duration:
Table 1. ENERGY STAR power-management features, by operating system Windows XP Windows Vista Turn off monitor: After 10 minutes Power plan: Balanced Turn off the display: After 10 Turn off hard disks: After 30 minutes minutes System standby: After 20 minutes System hibernates: After 2 hours Put the computer to sleep: After 25 minutes Advanced power settings:
- Turn off hard disks: After 20 minutes
- Hibernate: After 1 hour To awaken your computer from a Sleep or System Standby mode, press any key on your keyboard. For more information about these settings, refer to your Windows Help and Support information system. Y550 UG V1.0_en.book Page 3 Wednesday, December 10, 2008 4:51 PM Explanation of hard disk capacity Dear user, While using your computer, you may discover that the nominal hard disk capacity indicated is somewhat different from the disk capacity displayed by the operating system. For example, a nominal 40GB hard disk will appear as less than 40GB in the operating system. This discrepancy is not an error in hard disk installation nor any other problem, but a normal phenomenon of computers. This phenomenon is primarily due to the following reasons:
I. Different standards used by the manufacturer and operating system when calculating hard disk capacity Hard disk manufacturers use a radix of 1000, i.e. 1G = 1,000MB, 1MB =
1,000KB, 1KB = 1,000 bytes. However, when identifying hard disk capacity, operating systems use a radix of 1024, i.e. 1GB = 1,024MB, 1MB = 1,024KB, 1KB = 1,024 bytes. The standard adopted by your computer is that of the hard disk manufacturers. Since the standards adopted by the hard disk manufacturer and operating system are different, the hard disk capacity displayed by the operating system will be different from the nominal hard disk capacity. For example, if the hard disk is nominally X G, even when it is completely empty, the capacity displayed by the operating system will be:
X 1000 1000 1000/ (1024 1024 1024) X 0.931 G Y550 UG V1.0_en.book Page 4 Wednesday, December 10, 2008 4:51 PM If a portion of the hard disk space has been used for some specific purpose, then the capacity indicated by the operating system will be even less than X 0.931 G. II. A portion of the hard disk space is used for specific purposes Lenovo computers come with preinstalled OneKey Rescue System, so the hard disk has a special portion partitioned before delivery, which is used to store hard disk mirror and OneKey Rescue System program files. The size of the reserved space for this partition varies according to the model, operating system and software of the computer. For the sake of safety, this partition is not evident, which is commonly referred to as a hidden partition. In addition, after the hard disk is partitioned or formatted, the system will assign a certain amount of hard disk space for the system files. For the above reasons, the available hard disk space indicated by the operating system is always less than the computers nominal hard disk capacity. Y550 UG V1.0_en.book Page i Wednesday, December 10, 2008 4:51 PM Contents Chapter 1. Getting to Know Your Computer ...................................... 1 Top view........................................ 1 Left-side view ............................... 3 Right-side view............................. 5 Front view ..................................... 6 Bottom view.................................. 7 Chapter 2. Using Your Computer .................. 9 Using the touch pad..................... 9 Using the keyboard.................... 11 Special keys and buttons........... 14 Using the optical drive .............. 17 Using memory cards.................. 17 Using lenovo remote control
(specific models only)................ 19 Using the integrated camera..... 19 Using the internet....................... 20 Securing your computer............ 22 Installing device drivers............ 24 Using battery and AC adapter.................................. 24 Chapter 3. Using External Devices ..............28 Connecting a Universal Serial Bus
(USB) device................................28 Connecting an eSATA port device ...........................................30 Connecting a PC card device....31 Connecting an external display..........................................33 Connecting a headphone and audio device ................................35 Connecting an external microphone .................................37 Connecting a Bluetooth device
(specific models only)................38 Chapter 4. Troubleshooting .......39 Frequently Asked Questions ....39 Troubleshooting .........................41 Chapter 5. Getting Help and Service .........................................50 Getting help and service............50 Getting help on the Web ...........51 Calling the customer support center............................................51 Getting help around the world ............................................54 i Y550 UG V1.0_en.book Page ii Wednesday, December 10, 2008 4:51 PM Contents Chapter 6. Safety, Use, and Care Information.................................. 55 Important safety information ................................. 55 Caring your computer............... 72 Accessibility and comfort ......... 80 Maintenance ............................... 83 Appendix A. Lenovo Limited Warranty...................................... 87 Warranty information ............... 95 Lenovo warranty service telephone numbers .................... 99 Appendix B. Customer Replaceable Units (CRUs) ....... 101 Appendix C. Specifications ..... 102 Specifications............................ 102 Appendix D. Notices ................ 104 Notices ....................................... 104 Wireless related information ............................... 107 TV tuner information .............. 110 Electronic emissions notices ... 113 WEEE and recycling statements ................................. 119 EU WEEE Statements .............. 120 Japan Recycling Statements.... 121 Notice for Users in the U.S.A. ........................................ 123 Notice on deleting data from your hard disk ................................... 123 Trademarks............................... 125 Index.......................................... 126 ii Y550 UG V1.0_en.book Page 1 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer Top view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b c d e f g c h i
* The illustrations in this manual may differ from the actual product. Please refer to the actual product. 1 Y550 UG V1.0_en.book Page 2 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer
Integrated camera ............................................................................ 19 Computer display The color display provides clear and brilliant text and graphics. Speakers OneKey Rescue System button ...................................................... 16 Power button Wireless LAN antennas An isotropic antenna system is built into the display for optimal reception, enabling wireless communication wherever you are. Touch inductive panel...................................................................... 14 Volume buttons Turn up/down or mute the volume with volume buttons. Built-in array microphone The built-in microphone (with noise reduction) can be used for video conferencing, voice narration, or simple audio recordings. 2 Y550 UG V1.0_en.book Page 3 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer Left-side view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b c d e f g 3 Y550 UG V1.0_en.book Page 4 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer Note:
Security keyhole Your computer comes with a security keyhole. You can purchase a security cable and lock to fit this keyhole.
Before purchasing any security product, verify that it is compatible with this type of security keyhole. VGA port ........................................................................................... 33 Fan louvers
Make sure that none of the fan louvers are blocked, otherwise, overheating of the computer may occur. HDMI port.......................................................................................... 34 RJ-45 port ......................................................................................... 20 eSATA port........................................................................................ 30 ExpressCard slot............................................................................ 31 Important:
4 Y550 UG V1.0_en.book Page 5 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer Right-side view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b c d
USB port ........................................................................................... 28 TV-in jack (Specific models only) Use this jack to connect with TV signal cable through the provided TV adapter (Analog/digital input supported). Optical drive ..................................................................................... 17 AC power adapter jack Connect the power adapter here to supply power to the computer and charge the battery pack. Note:
To prevent damage to the computer and battery pack, use the supplied AC adapter only. 5 Y550 UG x-Ch1.fm Page 6 Thursday, December 11, 2008 3:31 PM Chapter 1. Getting to Know Your Computer Front view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b cd e f
Integrated wireless device switch Use this switch to disable the wireless radio of all the wireless devices on your computer. Card reader socket........................................................................... 17 Microphone jack (external).............................................................. 37 Headphone jack (S/PDIF) (external)................................................ 35 CIR port............................................................................................. 19 CIR port, used for lenovo remote control. System status indicators 6 Y550 UG V1.0_en.book Page 7 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer Bottom view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b c d e f 7 Y550 UG V1.0_en.book Page 8 Wednesday, December 10, 2008 4:51 PM Chapter 1. Getting to Know Your Computer
Subwoofer The multimedia subwoofer features a super bass effect while you are watching movies or enjoying music. Battery latch - spring loaded The spring-loaded battery latch keeps the battery pack secured in place. When you insert a battery pack, this latch automatically secures the battery in place. To remove the battery, hold this latch in the unlocked position. Battery pack...................................................................................... 24 Battery latch - manual The manual battery latch is used to keep the battery pack secured. Move the manual battery latch to the unlocked position to insert or remove the battery pack. Move the manual latch to the locked position after inserting the battery pack. Hard Disk Drive compartment Central Processing Unit (CPU)/ Memory (DDR 3 RAM)/ Wireless LAN Card/ TV card (Specific models only) compartment
Do not disassemble or replace any component by yourself! If you do need to, ask a Lenovo authorized service center or dealer to disassemble or replace it. Important:
8 Y550 UG V1.0_en.book Page 9 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Using the touch pad - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The touch pad consists of a pad keyboard. To move the cursor
the pad in the direction in which you want the cursor to move. The functions of the left the left and right mouse buttons on a conventional mouse.
on the screen, slide your fingertip over click buttons correspond to those of and two click buttons below the and right
b a dc Note:
You can also attach and use a USB mouse through the USB connector. For details, see Connecting a Universal Serial Bus (USB) device on page 28. 9 Y550 UG V1.0_en.book Page 10 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
Gestures The touch pad can recognize some gestures and make actions like zoom in/out, or scroll up/down easily. Chiralmotion Slide your finger to the right side/bottom of the touch pad until you see the scroll mark, then draw on the touch pad in a twisting motion. Draw clockwise or counterclockwise to scroll the page down/left or up/right. Pinch Use two fingers and make a pinch gesture on the touch pad to zoom out;
reverse the gesture to zoom in.
Palm Check To prevent mis-touch, the touch pad ignores big active area motions, like any movement at the touch pad with your palm, you may set the area size by Synaptics Pointing Device in the lower right corner of the desktop. 10 Y550 UG V1.0_en.book Page 11 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Using the keyboard - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer has a numeric keypad and function keys incorporated in the standard keyboard.
Numeric keypad The keyboard has keys that, when enabled, work as a 10-key numeric keypad. To enable or disable the numeric keypad, press Fn+F8.
* The illustrations in this manual may differ from the actual product. Please refer to the actual product. 11 Y550 UG V1.0_en.book Page 12 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
Function key combinations Through the use of the function keys, you can change operational features instantly. To use this function, press and hold the Fn key
; then press one of the function keys
b a 12 Y550 UG x-Ch2.fm Page 13 Thursday, December 11, 2008 3:31 PM Chapter 2. Using Your Computer The following describes the features of each function key. Fn + Esc: Turn on/off the integrated camera. Fn + F1: Put your computer in sleep mode. Fn + F2: Turn on/off the LCD screen. Fn + F3: Shift to other connected display devices. Fn + F4: Open the interface for display resolution settings. Fn + F5: Open the interface for integrated wireless devices settings
(enable/disable). Fn + F6: Enable/disable the touch pad. Fn + F8: Enable/disable the numeric keypad. Fn + F9: Activate the pause function. Fn + F10: Activate the break function. Fn + F11: Enable/disable Scroll Lock. Fn + F12: Turn on/off the insert input. Fn + PrtSc: System request. Fn + up/down arrow: Increase/decrease display brightness. Fn + right/left arrow: Increase/decrease sound volume. 13 Y550 UG V1.0_en.book Page 14 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Special keys and buttons - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer has several special keys and buttons.
Touch inductive panel and volume buttons a b c d e f 14 Y550 UG V1.0_en.book Page 15 Wednesday, December 10, 2008 4:51 PM Touch inductive panel (
Chapter 2. Using Your Computer
) Slidebar:
Quick launch customized applications by the slide and release at the Slidebar when Lenovo Desktop Navigator is installed. OneKey Theater:
Open OneKey Theater to select Normal mode or Movie mode as prefered. Open Dolby function setup screen.
Volume buttons (
Volume up Volume down Mute
) 15 Y550 UG V1.0_en.book Page 16 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
OneKey Rescue System button Press the OneKey Rescue System button to enter the main interface of OneKey Rescue System while the power is off. Attention:
When you press the OneKey Rescue System button to turn on the computer, ensure that your computer is not connected to other peripherals
(such as USB storage device, etc.), otherwise the system may not operate properly. For details, see OneKey Rescue System User Guide. Note:
When your computer is running Windows Vista, and if you have the OneKey Recovery application installed, you can start the application by pressing the OneKey Rescue System button. 16 Y550 UG V1.0_en.book Page 17 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Using the optical drive - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer comes with an optical drive, such as a CD/DVD drive. Using memory cards - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer comes with one Multi-media Card reader socket used to insert a memory card, such as an SD Card, a MultiMediaCard, a Memory Stick, an xD-Picture Card, an SD pro card or a Memory Stick Pro. 17 Y550 UG V1.0_en.book Page 18 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Note:
Only use the memory card types listed above; for more information on usage, read the instructions shipped with the memory card. This card reader does not support SDIO devices (e.g. SDIO Bluetooth, etc.). 18 Y550 UG V1.0_en.book Page 19 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Using lenovo remote control (specific models only) - - - - - - - - - -
You can use the remote control with Windows Media Center for convenient media enjoyment. For details of the remote control operation, see the instructions shipped with it. Note:
The Windows Media Center function mentioned in the instructions of the remote control is supported only by Windows Vista Home Premium and Windows Vista Ultimate operating systems from Microsoft at present, but not supported by other operating systems. If necessary, please install the operating system that supports the function. Using the integrated camera - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
With the built-in camera, you can take photos or movies and use with various applications, such as EasyCapture, Windows Live Messenger or Yahoo!
Messenger, and so on.
If you use Windows Vista, you need to install a separate third party Note:
dedicated application, because Windows Vista does not include a program for taking pictures or movies with the integrated camera.
The camera status indicator turns on when the camera is in use. When you do not need to use the camera, you may turn off it with Fn+Esc to save power. 19 Y550 UG V1.0_en.book Page 20 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Using the internet - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Using RJ-45 port The LAN port supports a standard RJ-45 connector, and allows you to connect the computer to a high-speed DSL/cable modem connection and local area network (LAN). Attention:
As the voltage of a telephone connection is higher than that of a network, do not attempt to connect a telephone cable to the RJ-45 port or else a short circuit of the computer might occur. 20 Y550 UG V1.0_en.book Page 21 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
Using wireless LAN An isotropic antenna system is built into the display for optimal reception, enabling wireless communication wherever you are. To enable wireless communications, do the following;
1 Slide the integrated wireless device switch to the right. 2 Press Fn + F5 to make configure. 21 Y550 UG V1.0_en.book Page 22 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Securing your computer - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This section provides information about how to help protect your computer from theft and unauthorized use.
Attaching a security lock (optional) You can attach a security lock to your computer to help prevent it from being removed without your permission. Attach a security lock to the keyhole of the computer; then secure the chain on the lock to a stationary object. Refer to the instructions shipped with the security lock. Refer to the Left-side view on page 3 for the location of the security keyhole. Note:
You are responsible for evaluating, selecting, and implementing the locking devices and security features. Lenovo makes no comments, judgements, or warranties about the function, quality, or performance of locking devices and security features. 22 Y550 UG V1.0_en.book Page 23 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
Using VeriFace VeriFace is a face recognition software which takes a digital snapshot, extracts key features of your face, and creates a digital map that becomes the systems password. Note:
The face registration and verification works best in a environment with steady and even light. For more instructions on VeriFace, see the help file on your software.
Using passwords Using passwords helps prevent your computer from being used by others. Once you set a password and enable it, a prompt appears on the screen each time you power on the computer. Enter your password at the prompt. The computer cannot be used unless you enter the correct password. Make sure that only authorized individuals access your computer. Establishing different kinds of passwords requires that other possible users know the proper passwords in order to access your computer or your data. This password can be from two to eight alphanumeric characters in any combination. For details about how to set the password, see the Help to the right of the screen in BIOS Setup Utility. Note:
To enter BIOS Setup Utility, press F2 when starting up your computer. 23 Y550 UG V1.0_en.book Page 24 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Installing device drivers - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A compatible device driver is a requirement to ensure correct operation and performance of each component in your computer. If your computer is pre-installed with an operating system, Lenovo provides all drivers that you need in your hard disk. Using battery and AC adapter - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
When you cannot use the AC adapter to power your computer, you may depend on battery power to keep your computer running.
The operating system may run slower when using the battery mode. Note:
Checking battery status You can determine the percentage of battery power remaining by using Windows Power options. As each computer user has different habits and needs, it is difficult to predict how long a battery charge will last. There are two main factors:
The amount of energy stored in the battery when you commence work.
The way you use your computer: for example, how often you access the hard disk drive and how bright you make the computer display. 24 Y550 UG V1.0_en.book Page 25 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer
Using the AC adapter The power to run your computer can come either from the battery pack or from AC power through the AC adapter. Attention:
Using an improper power cord could cause severe damage to your computer. To use the AC adapter, do the following. Be sure to take these steps in the order in which they are given here. 1 Connect the power cord to the transformer pack. 2 Plug the power cord into an electrical outlet. 3 Connect the AC adapter to the AC power adapter jack of the computer. You can check the status of your battery at any time by looking at the battery meter at the bottom of your display.
When you do not use the AC adapter, disconnect it from the electrical outlet.
Do not wrap the power cord tightly around the AC power transformer Note:
pack when it is connected to the transformer.
You can charge the battery when the AC adapter is connected to the computer and the battery is installed. You need to charge it in any of the following conditions:
When you purchase a new battery
If the battery status indicator starts blinking
If the battery has not been used for a long time 25 Y550 UG V1.0_en.book Page 26 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Before you charge the battery, make sure that its temperature is at least 10C (50F).
Charging the battery When you check the battery status and find that the battery is low, you need to charge the battery or replace it with a charged battery. If an AC outlet is convenient, first, connect the power cord to the transformer pack, second, plug the power cord into the electrical outlet, and then connect the AC adapter to the power jack of the computer. Charging time will depend on the usage environment.
Handling the battery Danger:
Do not attempt to disassemble or modify the battery pack. Attempting to do so can cause an explosion, or liquid leakage from the battery pack. A battery pack other than the one specified by Lenovo, or a disassembled or modified battery pack is not covered by the warranty. 26 Y550 UG V1.0_en.book Page 27 Wednesday, December 10, 2008 4:51 PM Chapter 2. Using Your Computer Danger:
If the rechargeable battery pack is incorrectly replaced, there may be danger of an explosion. The battery pack contains a small amount of harmful substances. To avoid possible injury:
Replace only with a battery of the type recommended by Lenovo.
Keep the battery pack away from fire.
Do not expose the battery pack to water or rain.
Do not attempt to disassemble the battery pack.
Do not short-circuit the battery pack.
Keep the battery pack away from children. Danger:
Do not put the battery pack in trash that is disposed of in landfills. When disposing of the battery, comply with local ordinances or regulations and your companys safety standards. 27 Y550 UG V1.0_en.book Page 28 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Your computer has many built-in features and connection capabilities. Attention:
Do not connect or disconnect any external device cables other than USB while the computer power is on; otherwise, you might damage your computer. To avoid possible damage to attached devices, wait at least five seconds after the computer is shut down to disconnect external devices. Connecting a Universal Serial Bus (USB) device - - - - - -
Your computer comes with USB ports compatible with USB devices such as a keyboard, mouse, camera, hard disk drive, printer and scanner. 28 Y550 UG V1.0_en.book Page 29 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices
Attention:
When using a high power consumption USB device such as USB ODD, use external device power adapter. Otherwise, the device may not be recognized, or system shut down may result. 29 Y550 UG V1.0_en.book Page 30 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting an eSATA port device - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer comes with an eSATA port used for connecting high-speed storage device (e.g. eSATA HDD) that are compatible with the eSATA port. 30 Y550 UG V1.0_en.book Page 31 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting a PC card device - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer comes with an ExpressCard/34"* slot used for connecting PC card devices that are compatible with the ExpressCard/34"* interface.
* Only use the ExpressCard/34 module. 31 Y550 UG V1.0_en.book Page 32 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices
Inserting an ExpressCard/34 module Gently slide the ExpressCard/34 module with the front label facing upward. Slide until it clicks into place.
Removing an ExpressCard/34 module 1 Push the ExpressCard/34 module until you hear a click. 2 Gently pull the ExpressCard/34 module out of the ExpressCard/34"
slot. 32 Y550 UG V1.0_en.book Page 33 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting an external display - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
You can connect an external display to your computer.
Connecting a VGA monitor You can connect a VGA monitor by using a VGA port. To connect a VGA monitor, plug the display cable to the VGA port of your computer. To shift to other connected display devices, press Fn + F3 to set up. 33 Y550 UG V1.0_en.book Page 34 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices
Connecting an HDMI monitor You can connect an HDMI monitor by using an HDMI port. To shift to other connected display devices, press Fn + F3 to set up. 34 Y550 UG V1.0_en.book Page 35 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting a headphone and audio device - - - - - - - - - - - - - - - - -
Your computer comes with one headphone jack (S/PDIF) used for connecting headphones, speakers, and audio devices that are compatible with the S/PDIF interface. 35 Y550 UG V1.0_en.book Page 36 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices
Warning:
Listening to music at high volume over extended periods of time may damage your hearing. Excessive use of headphones or earphones for a long period of time at high volume can be dangerous if the output of the headphones or earphone connectors do not comply with specifications of EN 50332-2. The headphone output connector of your computer complies with EN 50332-2 Sub clause 7. This specification limits the computers maximum wide band true RMS output voltage to 150 mV. To help protect against hearing loss, ensure that the headphones or earphones you use also comply with EN 50332-2 (Clause 7 limits) for a wide band characteristic voltage of 75 mV. Using headphones that do not comply with EN 50332-2 can be dangerous due to excessive sound pressure levels. 36 Y550 UG V1.0_en.book Page 37 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting an external microphone - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer comes with one external microphone jack for connecting an external microphone. 37 Y550 UG V1.0_en.book Page 38 Wednesday, December 10, 2008 4:51 PM Chapter 3. Using External Devices Connecting a Bluetooth device (specific models only) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If your computer has an integrated Bluetoothadapter card, it can connect to and transfer data wirelessly to other Bluetoothenabled devices, such as laptop computers, PDAs and cell phones.
Enabling Bluetooth communications 1 Slide the integrated wireless device switch to the right. 2 Press Fn + F5 to make configuration. Note:
When you do not need to use the Bluetooth function, turn it off to save battery power. For details on connecting other Bluetoothenabled devices (market available), please refer to the instructions shipped with the devices that you have purchased separately. 38 Y550 UG V1.0_en.book Page 39 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting Frequently Asked Questions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This section lists frequently asked questions and tells where you can find detailed answers. For details about each publication included in the package with your computer, see Lenovo IdeaPad Y550 Setup Poster. What safety precautions should I follow when using my computer?
See Chapter 6. Safety, Use, and Care Information for detailed information about safety. How can I prevent problems with my computer?
See Chapter 6. Safety, Use, and Care Information on page 55 of this guide. More tips can be found in Chapter 1 and 2. What are the main hardware features of my new computer?
More information can be found in Chapter 1 and 2. Where can I find the detailed specifications for my computer?
See http://consumersupport.lenovo.com. I need to upgrade a device or I need to replace one of the following: the hard disk drive, memory, or the keyboard. See Appendix B. Customer Replaceable Units (CRUs) on page 101 of this guide. My computer is not operating properly. Study the relevant information in Chapter 2. 39 Y550 UG V1.0_en.book Page 40 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting Where are the recovery discs?
Your computer did not come with a recovery disc. For an explanation of the alternative recovery methods offered by Lenovo, see OneKey Rescue System User Guide. How can I contact the Customer Support Center?
See Chapter 5. Getting Help and Service on page 50 of this Guide. For the phone numbers of the Customer Support Center nearest to you, see Lenovo warranty service telephone numbers on page 99. Where can I find warranty information?
For the warranty applicable to your computer, including the warranty period and type of warranty service, see Appendix A. Lenovo Limited Warranty on page 87. 40 Y550 UG V1.0_en.book Page 41 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting Troubleshooting - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you do not find your problem here, see Chapter 2. The following section only describes problems that might prevent you from accessing the comprehensive information in Chapter 2.
Display problems When I turn on the computer, nothing appears on the screen. Note:
If you are using an external monitor, see Computer screen problems on page 45.
If the screen is blank, make sure that:
- The battery is installed correctly.
- The AC adapter is connected to the computer and the power cord is plugged into a working electrical outlet.
- The computer power is on. (Press the power button again for confirmation.)
- The memory is installed correctly.
If these items are properly set, and the screen remains blank, have the computer serviced. 41 Y550 UG V1.0_en.book Page 42 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting When I turn on the computer, only a white cursor appears on a blank screen. Restore backed-up files to your Windows environment or the entire contents of your hard disk to the original factory contents using OneKey Recovery. If you still see only the cursor on the screen, have the computer serviced. My screen goes blank while the computer is on. Your screen saver or power management may be enabled. Do one of the following to exit from the screen saver or to resume from sleep or hibernation mode:
Touch the touch pad.
Press any key on the keyboard.
Press the power button. 42 Y550 UG V1.0_en.book Page 43 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting
A Password problem I forgot my password.
If you forgot your user password, you must take your computer to a Lenovo authorized servicer or a marketing representative to have the password canceled.
If you forgot your HDD password, a Lenovo authorized servicer cannot reset your password or recover data from the hard disk. You must take your computer to a Lenovo authorized servicer or a marketing representative to have the hard disk drive replaced. Proof of purchase is required, and a fee will be charged for parts and service.
If you forget your supervisor password, a Lenovo authorized servicer cannot reset your password. You must take your computer to a Lenovo authorized servicer or a marketing representative to have the system board replaced. Proof of purchase is required, and a fee will be charged for parts and service.
Keyboard problems A number appears when you enter a letter. The numeric lock function is on. To disable it, press Fn + F8. All or some of the keys on the external numeric keypad do not work. Make sure that the external numeric keypad is correctly connected to the computer. 43 Y550 UG V1.0_en.book Page 44 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting
Sleep or hibernation problems The computer enters sleep mode unexpectedly. If the processor overheats, the computer automatically enters sleep mode to allow the computer to cool and to protect the processor and other internal components. Check the settings for sleep mode. The computer enters sleep mode immediately after Power-on self-test (POST). Make sure that:
The battery is charged.
The operating temperature is within the acceptable range. See Specifications on page 102. If the battery is charged and the temperature is within range, have the computer serviced. The critical low-battery error message appears, and the computer immediately turns off. The battery power is getting low. Connect the AC adapter to the computer, or replace the battery with a fully charged one. The computer does not return from sleep mode and the computer does not work. If the computer does not return from sleep mode, it may have entered hibernation mode automatically because the battery is depleted. Check the sleep indicator. 44 Y550 UG V1.0_en.book Page 45 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting
If your computer is in sleep mode connect the AC adapter to the computer, then press any key or the power button.
If your computer is in hibernation mode or power-off state. Connect the AC adapter to the computer, then press the power button to resume operation. If the system still does not return from sleep mode, your system has stopped responding, and you cannot turn off the computer; reset the computer. Unsaved data may be lost. To reset the computer, press and hold the power button for 4 seconds or more. If the computer is still not reset, remove the AC adapter and the battery.
Computer screen problems The screen is blank. Do the following:
If you are using the AC adapter, or using the battery, and the battery status indicator is on, press Fn + up arrow to make the screen brighter.
If the Power indicator is in blinking, press the power button to resume from the sleep mode.
If the problem persist, follow do the Solution in the following problem The screen is unreadable or distorted. 45 Y550 UG V1.0_en.book Page 46 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting The screen is unreadable or distorted. Make sure that:
The display device driver is installed correctly.
The screen resolution and color quality are correctly set.
The monitor type is correct. Incorrect characters appear on the screen. Did you install the operating system or application program correctly? If they are installed and configured correctly, have the computer serviced. A message, Unable to create overlay window, appears when you try to start DVD playback.
-or-
You get poor or no playback of video, DVD or game applications. Do either of the following:
If you are using 32-bit color mode, change the color depth to 16-bit mode.
If you are using a desktop resolution over the optimum, reduce the desktop size and the color depth. 46 Y550 UG V1.0_en.book Page 47 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting
Sound problems No sound can be heard from the speaker even when the volume is turned up. Make sure that:
The Mute function is off.
The headphone jack is not used.
Speakers is selected as a playback device.
Battery problems Your computer shuts down before the battery status indicator shows empty.
-or-
Your computer operates after the battery status indicator shows empty. Discharge and recharge the battery. The operating time for a fully charged battery is short. For details, see Handling the battery in Chapter 2. The computer does not operate with a fully charged battery. The surge protector in the battery might be active. Turn off the computer for one minute to reset the protector; then turn on the computer again. 47 Y550 UG V1.0_en.book Page 48 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting The battery does not charge. For details, see Handling the battery in Chapter 2.
A hard disk drive problem The hard disk drive does not work. In the Boot menu in BIOS Setup Utility, make sure that the hard disk drive is included in the Boot priority order correctly.
A startup problem The Microsoft Windows operating system does not start. Use the OneKey Recovery to help solve or identify your problem. For details about OneKey Recovery, see OneKey Rescue System User Guide.
Other problems Your computer does not respond.
To turn off your computer, press and hold the power button for 4 seconds or more. If the computer still does not respond, remove the AC adapter and the battery.
Your computer might lock when it enters sleep mode during a communication operation. Disable the sleep timer when you are working on the network. 48 Y550 UG V1.0_en.book Page 49 Wednesday, December 10, 2008 4:51 PM Chapter 4. Troubleshooting The computer does not start from a device you want. See the Boot menu of the BIOS Setup Utility. Make sure that the Boot priority order in the BIOS Setup Utility is set so that the computer starts from the device you want. Also make sure that the device from which the computer starts is enabled. In the Boot menu in the BIOS Setup Utility, make sure that the device is included in the Boot priority order list. 49 Y550 UG V1.0_en.book Page 50 Wednesday, December 10, 2008 4:51 PM Chapter 5. Getting Help and Service Getting help and service - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you need help, service, technical assistance, or just want more information about Lenovo computers, you will find a wide variety of sources available from Lenovo to assist you. This section contains information about where to go for additional information about Lenovo computers, what to do if you experience a problem with your computer, and whom to call for service should it be necessary. Microsoft Service Packs are the latest software source for Windows product updates. They are available by means of a Web download (connection charges may apply) or from a disc. For more specific information and links, go to the Microsoft Web site at http://www.microsoft.com. Lenovo offers Up and Running technical assistance with installation of, or questions related to, Service Packs for your Lenovo-preinstalled Microsoft Windows product. 50 Y550 UG V1.0_en.book Page 51 Wednesday, December 10, 2008 4:51 PM Chapter 5. Getting Help and Service Getting help on the Web - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The Lenovo Web site on the World Wide Web has up-to-date information about Lenovo computers and support. The address for the Lenovo home page is http://consumersupport.lenovo.com. You can find support information for your Lenovo IdeaPad computer at http://consumersupport.lenovo.com. Research this Web site to learn how to solve problems, find new ways to use your computer, and learn about options that can make working with your Lenovo computer even easier. Calling the customer support center - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you have tried to correct the problem yourself and still need help, during the warranty period, you can get help and information by telephone through the Customer Support Center. The following services are available during the warranty period:
Problem determination - Trained personnel are available to assist you with determining if you have a hardware problem and deciding what action is necessary to fix the problem.
Lenovo hardware repair - If the problem is determined to be caused by Lenovo hardware under warranty, trained service personnel are available to provide the applicable level of service. 51 Y550 UG V1.0_en.book Page 52 Wednesday, December 10, 2008 4:51 PM Chapter 5. Getting Help and Service
Engineering change management - Occasionally, there might be changes that are required after a product has been sold. Lenovo or your reseller, if authorized by Lenovo, will make selected Engineering Changes (ECs) available that apply to your hardware. The following items are not covered:
Replacement or use of parts not manufactured for or by Lenovo or non warranted parts
Identification of software problem sources
Configuration of BIOS as part of an installation or upgrade
Changes, modifications, or upgrades to device drivers
Installation and maintenance of network operating systems (NOS)
Installation and maintenance of application programs To determine if your Lenovo hardware product is under warranty and when the warranty expires, go to http://consumersupport.lenovo.com, and click Warranty, then follow the instructions on the screen. Refer to your Lenovo hardware warranty for a full explanation of Lenovo warranty terms. Be sure to retain your proof of purchase to obtain warranty service. If possible, be near your computer when you make your call in case the technical assistance representative needs to help you resolve a computer problem. Please ensure that you have downloaded the most current drivers and system updates, and recorded information before you call. When calling for technical assistance, please have the following information available:
52 Y550 UG V1.0_en.book Page 53 Wednesday, December 10, 2008 4:51 PM Chapter 5. Getting Help and Service
Machine Type and Model
Serial numbers of your computer, monitor, and other components, or your proof of purchase
Description of the problem
Hardware and software configuration information for your system The telephone numbers for your Customer Support Center location are located in Appendix A. Lenovo Limited Warranty on page 87.
Note:
Telephone numbers are subject to change without notice. For the latest list of Customer Support Center telephone numbers and hours of operation, visit the Support Web site at http://consumersupport.lenovo.com. If the number for your country or region is not listed, contact your Lenovo reseller or Lenovo marketing representative. 53 Y550 UG V1.0_en.book Page 54 Wednesday, December 10, 2008 4:51 PM Chapter 5. Getting Help and Service Getting help around the world - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you travel with your computer or relocate it to a country where your Lenovo machine type is sold, your computer might be eligible for International Warranty Service, which automatically entitles you to obtain warranty service throughout the warranty period. Service will be performed by service providers authorized to perform warranty service. Service methods and procedures vary by country, and some services might not be available in all countries. Service centers in certain countries might not be able to service all models of a particular machine type. In some countries, fees and restrictions might apply at the time of service. To determine whether your computer is eligible for International Warranty Service and to view a list of the countries where service is available, go to http://consumersupport.lenovo.com, click Warranty, and follow the instructions on the screen. 54 Y550 UG V1.0_en.book Page 55 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Important safety information - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This information can help you safely use your notebook personal computer. Follow and retain all information included with your computer. The information in this document does not alter the terms of your purchase agreement or the Lenovo Limited Warranty. For more information, see Appendix A. Lenovo Limited Warranty on page 87. Customer safety is important. Our products are developed to be safe and effective. However, personal computers are electronic devices. Power cords, power adapters, and other features can create potential safety risks that can result in physical injury or property damage, especially if misused. To reduce these risks, follow the instructions included with your product, observe all warnings on the product and in the operating instructions, and review the information included in this document carefully. By carefully following the information contained in this document and provided with your product, you can help protect yourself from hazards and create a safer computer work environment.
This information includes references to power adapters and batteries. In addition to notebook computers, some products (such as speakers and monitors) ship with external power adapters. If you have such a product, this information applies to your product. In addition, computer products contain a coin-sized internal battery that provides power to the system clock even when the computer is unplugged, so the battery safety information applies to all computer products. Note:
55 Y550 UG V1.0_en.book Page 56 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Conditions that require immediate action Products can become damaged due to misuse or neglect. Some product damage is serious enough that the product should not be used again until it has been inspected and, if necessary, repaired by an authorized servicer. As with any electronic device, pay close attention to the product when it is turned on. On very rare occasions, you might notice an odor or see a puff of smoke or sparks vent from your product. Or you might hear sounds like popping, cracking, or hissing. These conditions might merely mean that an internal electronic component has failed in a safe and controlled manner. Or, they might indicate a potential safety issue. However, do not take risks or attempt to diagnose the situation yourself. Contact the Customer Support Center for further guidance. For a list of Service and Support phone numbers, see http://consumersupport.lenovo.com. Frequently inspect your computer and its components for damage or wear or signs of danger. If you are unsure about the condition of a component, do not use the product. Contact the Customer Support Center or the product manufacturer for instructions on how to inspect the product and have it repaired, if necessary. In the unlikely event that you notice any of the following conditions, or if you have any safety concerns with your product, stop using the product and unplug it from the power source and telecommunication lines until you can speak to the Customer Support Center for further guidance.
Power cords, plugs, power adapters, extension cords, surge protectors, or power supplies that are cracked, broken, or damaged.
Signs of overheating, smoke, sparks, or fire. 56 Y550 UG V1.0_en.book Page 57 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Damage to a battery (such as cracks, dents, or creases), discharge from a battery, or a buildup of foreign substances on the battery.
A cracking, hissing, or popping sound, or strong odor that comes from the product.
Signs that liquid has been spilled or an object has fallen onto the computer product, the power cord, or power adapter.
The computer product, power cord, or power adapter has been exposed to water.
The product has been dropped or damaged in any way.
The product does not operate normally when you follow the operating instructions. Note:
If you notice these conditions with a product (such as an extension cord) that is not manufactured for or by Lenovo, stop using that product until you can contact the product manufacturer for further instructions, or until you get a suitable replacement.
Safety guidelines Always observe the following precautions to reduce the risk of injury and property damage. 57 Y550 UG V1.0_en.book Page 58 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Service and upgrades Attention:
Do not attempt to service a product yourself unless instructed to do so by the Customer Support Center or your documentation. Only use a service provider who is approved to repair your particular product. Note:
Some computer parts can be upgraded or replaced by the customer. Upgrades typically are referred to as options. Replacement parts approved for customer installation are referred to as Customer Replaceable Units, or CRUs. Lenovo provides documentation with instructions when it is appropriate for customers to install options or replace CRUs. You must closely follow all instructions when installing or replacing parts. The Off state of a power indicator does not necessarily mean that voltage levels inside a product are zero. Before you remove the covers from a product equipped with an ac power cord, always make sure that the power is turned off and that the product is unplugged from any power source. For more information on CRUs, see Appendix B. Customer Replaceable Units (CRUs) on page 101. If you have any questions or concerns, contact the Customer Support Center. Although there are no moving parts in your computer after the power cord has been disconnected, the following warnings are required for your safety. 58 Y550 UG V1.0_en.book Page 59 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Danger:
Hazardous moving parts. Keep fingers and other body parts away. Attention:
Before replacing any CRUs, turn off the computer and wait three to five minutes to let the computer cool before opening the cover.
Power cords and power adapters Danger:
Use only the power cords and power adapters supplied by the product manufacturer. The power cord and power adapter are intended for use with this product only. They should never be used with any other product. The power cords shall be safety approved. For Germany, it shall be H03VV-F, 3G, 0.75 mm2, or better. For other countries, suitable types should be used accordingly. Never wrap a power cord around a power adapter or other object. Doing so can stress the cord in ways that can cause the cord to fray, crack, or crimp. This can present a safety hazard. Always route power cords or any other cables so that they will not be walked on, tripped over, or pinched by objects. 59 Y550 UG V1.0_en.book Page 60 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Protect power cords and power adapters from liquids. For instance, do not leave your power cord or power adapter near sinks, tubs, toilets, or on floors that are cleaned with liquid cleansers. Liquids can cause a short circuit, particularly if the power cord or power adapter has been stressed by misuse. Liquids also can cause gradual corrosion of power cord terminals and/or the connector terminals on a power adapter, which can eventually result in overheating. Always connect power cords and signal cables in the correct order and ensure that all power cord connectors are securely and completely plugged into receptacles. Do not use any power adapter that shows corrosion at the ac input pins or shows signs of overheating (such as deformed plastic) at the ac input or anywhere on the power adapter. Do not use any power cords where the electrical contacts on either end show signs of corrosion or overheating or where the power cord appears to have been damaged in any way. 60 Y550 UG V1.0_en.book Page 61 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Extension cords and related devices Danger:
Ensure that extension cords, surge protectors, uninterruptible power supplies, and power strips that you use are rated to handle the electrical requirements of the product. Never overload these devices. If power strips are used, the load should not exceed the power strip input rating. Consult an electrician for more information if you have questions about power loads, power requirements, and input ratings.
Plugs and outlets Danger:
If a receptacle (power outlet) that you intend to use with your computer equipment appears to be damaged or corroded, do not use the outlet until it is replaced by a qualified electrician. Do not bend or modify the plug. If the plug is damaged, contact the manufacturer to obtain a replacement. Do not share an electrical outlet with other home or commercial appliances that draw large amounts of electricity; otherwise, unstable voltage might damage your computer, data, or attached devices. Some products are equipped with a three-pronged plug. This plug fits only into a grounded electrical outlet. This is a safety feature. Do not defeat this safety feature by trying to insert it into a non-grounded 61 Y550 UG V1.0_en.book Page 62 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information outlet. If you cannot insert the plug into the outlet, contact an electrician for an approved outlet adapter or to replace the outlet with one that enables this safety feature. Never overload an electrical outlet. The overall system load should not exceed 80 percent of the branch circuit rating. Consult an electrician for more information if you have questions about power loads and branch circuit ratings. Be sure that the power outlet you are using is properly wired, easily accessible, and located close to the equipment. Do not fully extend power cords in a way that will stress the cords. Be sure that the power outlet provides the correct voltage and current for the product you are installing. Carefully connect and disconnect the equipment from the electrical outlet.
Power supply statement Danger:
Never remove the cover on a power supply or any part that has the following label attached. 62
various | User Manual 2 | Users Manual | 1.69 MiB |
Y550 UG V1.0_en.book Page 63 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Hazardous voltage, current, and energy levels are present inside any component that has this label attached. There are no serviceable parts inside these components. If you suspect a problem with one of these parts, contact a service technician.
Lithium coin cell battery notice Danger:
Danger of explosion if battery is incorrectly replaced. When replacing the lithium coin cell battery, use only the same or an equivalent type that is recommended by the manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of. Do not:
Throw or immerse into water
Heat to more than 100C (212F)
Repair or disassemble Dispose of the battery as required by local ordinances or regulations. The following statement applies to users in the state of California, U.S.A. California Perchlorate Information:
63 Y550 UG V1.0_en.book Page 64 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Products containing CR (manganese dioxide) lithium coin cell batteries may contain perchlorate. Perchlorate Material special handling may apply. See http://www.dtsc.ca.gov/hazardouswaste/perchlorate.
Heat and product ventilation Danger:
Computers, AC adapters, and many accessories can generate heat when turned on and when batteries are charging. Notebook computers can generate a significant amount of heat due to their compact size. Always follow these basic precautions:
When your computer is turned on or the battery is charging, the base, the palm rest, and some other parts may become hot. Avoid keeping your hands, your lap, or any other part of your body in contact with a hot section of the computer for any extended length of time. When you use the keyboard, avoid keeping your palms on the palm rest for a prolonged period of time. Your computer generates some heat during normal operation. The amount of heat depends on the amount of system activity and the battery charge level. Extended contact with your body, even through clothing, could cause discomfort or even a skin burn. Periodically take breaks from using the keyboard by lifting your hands from the palm rest; and be careful not to use the keyboard for any extended length of time.
Do not operate your computer or charge the battery near flammable materials or in explosive environments. 64 Y550 UG V1.0_en.book Page 65 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Ventilation slots, fans and/or heat sinks are provided with the product for safety, comfort, and reliable operation. These areas might inadvertently become blocked by placing the product on a bed, sofa, carpet, or other flexible surface. Never block, cover, or disable these features.
When the AC adapter is connected to an electrical outlet and your computer, it generates heat. Do not place the adapter in contact with any part of your body while using it. Never use the AC adapter to warm your body. Extended contact with your body, even through clothing, may cause a skin burn. For your safety, always follow these basic precautions with your computer:
Keep the cover closed whenever the computer is plugged in.
Regularly inspect the outside of the computer for dust accumulation.
Remove dust from vents and any perforations in the bezel. More frequent cleanings might be required for computers in dusty or high-
traffic areas.
Do not restrict or block any ventilation openings.
Do not operate your computer inside furniture, as this might increase the risk of overheating.
Airflow temperatures into the computer should not exceed 35 C (95 F). 65 Y550 UG V1.0_en.book Page 66 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
CD and DVD drive safety Danger:
CD and DVD drives spin discs at a high speed. If a CD or DVD is cracked or otherwise physically damaged, it is possible for the disc to break apart or even shatter when the CD drive is in use. To protect against possible injury due to this situation, and to reduce the risk of damage to your computer, do the following:
Always store CD/DVD discs in their original packaging.
Always store CD/DVD discs out of direct sunlight and away from direct heat sources.
Remove CD/DVD discs from the computer when not in use.
Do not bend or flex CD/DVD discs, or force them into the computer or their packaging.
Check CD/DVD discs for cracks before each use. Do not use cracked or damaged discs. 66 Y550 UG V1.0_en.book Page 67 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Electrical current safety information Danger:
Electric current from power, telephone, and communication cables is hazardous. To avoid a shock hazard:
Do not use your computer during a lightning storm.
Do not connect or disconnect any cables or perform installation, maintenance, or reconfiguration of this product during an electrical storm.
Connect all power cords to a properly wired and grounded electrical outlet.
Connect to properly wired outlets any equipment that will be attached to this product.
Whenever possible, use one hand only to connect or disconnect signal cables.
Never turn on any equipment when there is evidence of fire, water, or structural damage.
Disconnect the attached power cords, battery pack, and all the cables before you open the device covers, unless instructed otherwise in the installation and configuration procedures.
Do not use your computer until you have closed the cover. Never use the computer when the cover is open. 67 Y550 UG V1.0_en.book Page 68 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Connect and disconnect cables as described in the following procedures when installing, moving, or opening covers on this product or attached devices. To connect:
1. Turn everything OFF. 2. First, attach all cables to devices. 3. Attach signal cables to connectors. 4. Attach power cords to outlets. 5. Turn devices ON. To disconnect:
1. Turn everything OFF. 2. First, remove power cords from outlets. 3. Remove signal cables from connectors. 4. Remove all cables from devices. The power cord must be disconnected from the wall outlet or receptacle before installing all other electrical cables connected to your computer. The power cord may be reconnected to the wall outlet or receptacle only after all other electrical cables have been connected to the computer. 68 Y550 UG V1.0_en.book Page 69 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Laser compliance statement Some personal computer models are equipped from the factory with a CD or DVD drive. CD and DVD drives are also sold separately as options. CD and DVD drives are laser products. The drives classification label (shown below) is on the surface of the drive. CLASS 1 LASER PRODUCT LASER KLASSE 1 LUOKAN 1 LASERLAITE APPAREIL A LASER DE CLASSE 1 KLASS 1 LASER APPARAT Example of the label 69 Y550 UG V1.0_en.book Page 70 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information These drives are certified in the U.S. to conform to the requirements of the Department of Health and Human Services 21 Code of Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, these drives are certified to conform to the requirements of the International Electrotechnical Commission (IEC) 60825-1 and CENELEC EN 60825-1 for Class 1 laser products. Class 1 laser products are not considered hazardous. The design of the laser system and the optical storage drive ensures that there is no exposure to laser radiation above a Class 1 level during normal operation, user maintenance, or servicing. When a CD or DVD drive is installed, note the following handling instructions. Danger:
Use of controls, adjustments, or performance of procedures other than those specified herein might result in hazardous radiation exposure. Do not remove the drive covers. Removing the covers of the CD or DVD drive could result in exposure to hazardous laser radiation. There are no serviceable parts inside the CD or DVD drive. Some CD and DVD drives contain an embedded Class 3A or Class 3B laser diode. Note the following statement. 70 Y550 UG V1.0_en.book Page 71 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Danger:
Laser radiation when open. Do not stare into the beam, do not view directly with optical instruments, and avoid direct exposure to the beam.
Liquid crystal display (LCD) notice Attention:
Mercury Information (does not apply to LED backlit models):
The fluorescent lamp in the liquid crystal display contains mercury;
dispose according to local, state or federal laws. The LCD is made of glass, and rough handling or dropping the computer can cause the LCD to break. If the LCD breaks and the internal liquid crystal material contacts the eyes, mouth or clothing, take the following actions immediately :
In case contact to the eyes or mouth, rinse with large amount of running water for more than 15 minutes. If any symptoms are present after washing, get medical care. In case contact to the skin or clothing, wipe it immediately and wash with soap and large amount of running water for more than 15 minutes. The skin or clothing maybe damaged if liquid crystal material is left adhered. 71 Y550 UG V1.0_en.book Page 72 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Caring your computer - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Though your computer is designed to function reliably in normal work environments, you need to use common sense in handling it. By following these important tips, you will get the most use and enjoyment out of your computer.
Be careful about where and how you work
Do not leave the base of your computer, or any other part that becomes hot during operation, in contact with your lap or any part of your body for an extended period when the computer is functioning or when the battery is charging. Your computer dissipates some heat during normal operation. This heat is a function of the level of system activity and battery charge level. Extended contact with your body, even through clothing, could cause discomfort or, eventually, a skin burn.
When the AC adapter is connected to an electrical outlet and your computer, it generates heat. Do not place the adapter in contact with any part of your body while using it. Never use the AC adapter to warm your body. Extended contact with your body, even through clothing, may cause a skin burn.
Route the cables of an AC adapter, a mouse, a keyboard, a printer, or any other electronic device, or communication lines, so that they cannot be walked on, tripped over, pinched by your computer or other objects, or in any way subjected to treatment that could disturb the operation of your computer. Applying strong force to the cables may damage or break them. 72 Y550 UG V1.0_en.book Page 73 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Place liquids away from your computer to avoid spills, and keep your computer away from water (to avoid the danger of electrical shock).
Do not eat or smoke over your keyboard. Particles that fall into your keyboard can cause damage.
Store packing materials safely out of the reach of children to prevent the risk of suffocation from plastic bags.
Keep your computer away from magnets, activated cellular phones, electrical appliances, or speakers (within 13 cm or 5 in).
Avoid subjecting your computer to extreme temperatures (below 5C/
41F or above 35C/95F).
Some appliances, such as certain portable desktop fans or air purifiers, can produce negative ions. If a computer is close to such an appliance, and is exposed for an extended time to air containing negative ions, it may become electrostatically charged. Such a charge may be discharged through your hands when you touch the keyboard or other parts of the computer, or through connectors on I/O devices connected to it. Even though this kind of electrostatic discharge (ESD) is the opposite of a discharge from your body or clothing to the computer, it poses the same risk of a computer malfunction. Your computer is designed and manufactured to minimize any effects of electrostatic charge. An electrostatic charge above a certain limit, however, can increase the risk of ESD. Therefore, when using the computer close to an appliance that can produce negative ions, give special attention to the following:
- Avoid directly exposing your computer to the air from an appliance that can produce negative ions.
- Keep your computer and peripherals as far as possible from such an appliance. 73 Y550 UG V1.0_en.book Page 74 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
- Wherever possible, ground your computer to facilitate safe electrostatic discharge. Note:
Not all such appliances cause a significant electrostatic charge. When you handle options or CRUs, or perform any work inside the computer, take the following precautions to avoid static-electricity damage:
- Limit your movement. Movement can cause static electricity to build up around you.
- Always handle components carefully. Handle adapters, memory modules, and other circuit boards by the edges. Never touch exposed circuitry.
- Prevent others from touching components.
- When you install a static-sensitive option or CRU, touch the static-
protective package containing the part to a metal expansion-slot cover or other unpainted metal surface on the computer for at least two seconds. This reduces static electricity in the package and your body.
- Whenever possible, remove the static-sensitive part from the static-
protective packaging and install the part without setting it down. When this is not possible, place the static-protective packaging on a smooth, level surface and place the part on it.
- Do not place the part on the computer cover or other metal surface. 74 Y550 UG V1.0_en.book Page 75 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Be gentle with your computer
Avoid placing any objects (including paper) between the display and the keyboard or under the keyboard.
Do not drop, bump, scratch, twist, hit, vibrate, push, or place heavy objects on your computer, display, or external devices.
Avoid turning the display beyond 127.
Carry your computer properly
Before moving your computer, be sure to remove any media, turn off attached devices, and disconnect cords and cables.
Be sure your computer is in sleep or hibernation mode, or turned off, before moving it. This will prevent damage to the hard disk drive and data loss.
When picking up your open computer, hold it by the bottom. Do not pick up or hold your computer by the display.
Use a quality carrying case that provides adequate cushion and protection. Do not pack your computer in a tightly packed suitcase or bag.
For outdoor use
Backup your critical data before you take your computer outdoors.
Ensure that the battery is full.
Be sure to turn off the power and close the LCD well.
Do not leave anything between the closed LCD and the keyboard. 75 Y550 UG V1.0_en.book Page 76 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
When you leave the computer in your car, place it on the back seat to avoid being insolated.
Carry the AC adapter and power cord with the computer.
Handle storage media and drives properly
If your computer comes with an optical drive, do not touch the surface of a disc or the lens on the tray.
Wait until you hear the CD or DVD click into the center pivot of an optical drive before closing the tray.
When installing your hard disk, follow the instructions shipped with your hardware, and apply pressure only where needed on the device.
Data safety
Do not delete unknown files or change the name of files or directories that were not created by you; otherwise, your computer software might fail to work.
Be aware that accessing network resources can leave your computer vulnerable to computer viruses, hackers, spyware, and other malicious activities that might damage your computer, software, or data.
It is your responsibility to ensure that you have adequate protection in the form of firewalls, antivirus software, and anti-spyware software and keep this software up to date. 76 Y550 UG V1.0_en.book Page 77 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Take care in setting passwords
Remember your passwords. If you forget a supervisor or hard disk password, Lenovo authorized service providers will not reset it, and you might have to replace your system board or hard disk drive.
Other important tips
Your computer might have both an Ethernet connector and a modem connector. If so, be sure to connect your communication cable to the correct one, so your connector is not damaged.
Register your Lenovo products with Lenovo (refer to the Web page:
http://consumersupport.lenovo.com). This can help authorities return your computer to you if it is lost or stolen. Registering your computer also enables Lenovo to notify you about possible technical information and upgrades.
Only an authorized Lenovo repair technician should disassemble and repair your computer.
Do not modify or tape the latches to keep the display open or closed.
Take care not to turn your computer over while the AC adapter is plugged in. This could break the adapter plug.
Turn off your computer if you are replacing a device, or else verify that the device is warm- or hot-swappable. 77 Y550 UG V1.0_en.book Page 78 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Before you install any of the following devices, touch a metal table or a grounded metal object. This action reduces any static electricity from your body. The static electricity could damage the device.
- ExpressCard
- Memory Card, such as SD Card, Memory Stick, MultiMediaCard, xD-
Picture Card, and Memory Stick Pro card.
- Memory module
When transferring data to or from a Flash Media Card, such as an SD card, do not put your computer in sleep or hibernation mode before the data transfer is complete. To do so might cause damage to your data.
Cleaning the cover of your computer Occasionally clean your computer as follows:
1 Prepare a mixture of a gentle kitchen-use detergent (one that does not contain abrasive powder or strong chemicals such as acid or alkaline). Use 5 parts water to 1 part detergent. 2 Absorb the diluted detergent into a sponge. 3 Squeeze excess liquid from the sponge. 4 Wipe the cover with the sponge, using a circular motion and taking care not to let any excess liquid drip. 5 Wipe the surface to remove the detergent. 6 Rinse the sponge with clean running water. 78 Y550 UG V1.0_en.book Page 79 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information 7 Wipe the cover with the clean sponge. 8 Wipe the surface again with a dry, soft lint-free cloth. 9 Wait for the surface to dry completely and remove any cloth fibers Note:
from the computer surface.
Shut down the computer and then disconnect the power cord before cleaning the computer.
Cleaning your computer keyboard 1 Absorb some isopropyl rubbing alcohol on a soft, dust-free cloth. 2 Wipe each keytop surface with the cloth. Wipe the keys one by one; if you wipe several keys at a time, the cloth may hook onto an adjacent key and possibly damage it. Make sure that no liquid drips onto or between the keys. 3 Allow to dry. 4 To remove any crumbs and dust from beneath the keys, you can use a camera blower with a brush or cool air from a hair drier. Note:
Avoid spraying cleaner directly on the display or the keyboard. 79 Y550 UG V1.0_en.book Page 80 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Cleaning your computer display 1 Gently wipe the display with a dry, soft lint-free cloth. If you see a scratchlike mark on your display, it might be a stain transferred from the keyboard when the cover was pressed from the outside. 2 Wipe or dust the stain gently with a soft, dry cloth. 3 If the stain remains, moisten a soft, lint-free cloth with water or a 50-50 mixture of isopropyl alcohol and water that does not contain impurities. 4 Wring out as much of the liquid as you can. 5 Wipe the display again; do not let any liquid drip into the computer. 6 Be sure to dry the display before closing it. Accessibility and comfort - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
As your computer enables you to work in so many places, it is important that you remain attentive to good posture, good lighting, and proper seating. By keeping these considerations in mind, you can improve performance and achieve greater comfort. Lenovo is committed to providing the latest information and technology to our customers with disabilities. 80 Y550 UG V1.0_en.book Page 81 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
Ergonomic information Working in the virtual office may mean adapting to frequent changes in your environment. Following some simple rules will make things easier and bring you the maximum benefits of your computer. Keeping in mind such basics as good lighting and proper seating, for example, can help you improve your performance and achieve greater comfort.
This example shows someone in a conventional setting. Even if you work in a casual, less conventional setting, many of the tips in this section still apply. Develop good habits, and they will serve you well. Note:
81 Y550 UG V1.0_en.book Page 82 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information General Posture: Below are some general recommendations for assuming a healthy working posture. It is best to periodically make minor modifications in your working posture to deter the onset of discomfort caused by long periods of working in the same position. Frequent, short breaks from your work will also help to prevent any minor discomfort associated with your working posture. Display: Position the display to maintain a comfortable viewing distance of 510-760 mm (20-30 inches). Avoid glare or reflections on the display from overhead lighting or outside sources of light. Keep the display screen clean and set the brightness to levels that enable you to see the screen clearly. Press Fn + up/down arrow to adjust display brightness. Head Position: Keep your head and neck in a comfortable and neutral
(vertical, or upright) position. Chair: Use a chair that gives you good back support and seat height adjustment. Use chair adjustments to best suit your desired posture. Arm and Hand Position: If available, utilize chair arm rests or an area on your working surface to provide weight support for your arms. Keep your forearms, wrists, and hands in a relaxed and neutral (horizontal) position. Type with a soft touch without pounding the keys. Leg Position: Keep your thighs parallel to the floor and your feet flat on the floor or on a footrest. 82 Y550 UG V1.0_en.book Page 83 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
What if you are traveling?
It may not be possible to observe the best ergonomic practices when you are using your computer while on the move or in a casual setting. Regardless of the setting, try to observe as many of the tips as possible. Sitting properly and using adequate lighting, for example, will help you maintain desirable levels of comfort and performance.
Questions about vision?
Your computers visual display screen is designed to meet the highest standards and to provide you with clear, crisp images and large, bright displays that are easy to see, yet easy on the eyes. Of course, any concentrated and sustained visual activity can be tiring. If you have questions on eye fatigue or visual discomfort, consult a vision care specialist for advice. Maintenance - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
An important part of owning your computer is maintenance. With proper care, you can avoid common problems. The following sections provide information that can help you to keep your computer running smoothly. 83 Y550 UG V1.0_en.book Page 84 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
General tips for maintenance 1 Check the capacity of your hard disk drive from time to time. If the hard disk drive gets too full, Windows will slow down and might produce errors. 2 Empty your recycle bin on a regular basis. 3 Use Diskeeper Lite or the Microsoft Disk Defragmenter on your hard disk drive on a regular basis to improve data seek and read time.
To free up disk space, uninstall unused application programs. Note:
You might also want to look for application program duplication or overlapping versions.
Clean out your Inbox, Sent, and Trash folders from your e-mail client program.
At least once a week, make a point to back up your data. If critical data is present, it is a good idea to perform a daily backup. Lenovo has many backup options available for your computer. CD-RW drives and CD-
RW/DVD drives are available for most computers and are easily installed.
Use or schedule System Restore to take a system snapshot periodically. 84 Y550 UG V1.0_en.book Page 85 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information Note:
Always take a system snapshot before installing new drivers, updating software, or installing new software.
Update device drivers and BIOS when needed.
Profile your machine at http://consumersupport.lenovo.com to keep up to date with current drivers and revisions.
Keep up to date on device drivers on other non-Lenovo hardware. You might want to read the device driver information release notes prior to updating for compatibility or known issues.
Keep a log book. Entries might include major hardware or software changes, driver updates, minor issues you have experienced and how you resolved them.
If you ever need to run a recovery operation on your computer to return the contents of the hard disk to the factory-installed state, the following tips might help along the way:
Remove all external devices such as the printer, keyboard, and so on.
Make sure that the battery is charged and that you have the AC adapter connected.
Boot into the BIOS and load the default settings.
Turn off the computer and start the recovery process.
If your computer uses discs as the recovery media, do not remove the disc from the drive until you are prompted to do so. 85 Y550 UG V1.0_en.book Page 86 Wednesday, December 10, 2008 4:51 PM Chapter 6. Safety, Use, and Care Information
If required, you can find your countrys Customer Support Center at the following Web address: http://consumersupport.lenovo.com. When calling the Customer Support Center, please make sure you have your machine type, model, and serial number available and the computer is in front of you. Also, if the machine is producing error codes, it is helpful to have the error screen on or the message written down. Device drivers are programs that contain instructions for the operating system about how to operate or drive a certain piece of hardware. Each hardware component on your computer has its own specific driver. If you add a new component, the operating system needs to be instructed on how to operate that piece of hardware. After you install the driver, the operating system can recognize the hardware component and understand how to use it.
Due to the fact that drivers are programs, like any other file on your computer, they are susceptible to corruption and might not perform properly if corruption occurs. Note:
86 Y550 UG V1.0_en.book Page 87 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty This Lenovo Limited Warranty applies only to Lenovo branded hardware products you purchased for your own use and not for resale. This Lenovo Limited Warranty is available in other languages at www.lenovo.com/warranty.
What this warranty covers Lenovo warrants that each hardware product that you purchase is free from defects in materials and workmanship under normal use during the warranty period. The warranty period for the product starts on the original date of purchase specified on your sales receipt or invoice unless Lenovo informs you otherwise in writing. The warranty period and type of warranty service that apply to your product are designated below under the section titled Warranty Information. THIS WARRANTY IS YOUR EXCLUSIVE WARRANTY AND REPLACES ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SOME STATES OR JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF EXPRESS OR IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN THAT EVENT, SUCH WARRANTIES APPLY ONLY TO THE EXTENT REQUIRED BY LAW AND ARE LIMITED IN DURATION TO THE WARRANTY PERIOD. NO WARRANTIES APPLY AFTER THAT PERIOD. SOME STATES OR JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, SO THE ABOVE LIMITATION ON DURATION MAY NOT APPLY TO YOU. 87 Y550 UG V1.0_en.book Page 88 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty
How to obtain warranty service If the product does not function as warranted during the warranty period, you may obtain warranty service by contacting Lenovo or an approved service provider. Each of them is referred to as a Service Provider. A list of Service Providers and their telephone numbers is available at www.lenovo.com/support/phone. Warranty service may not be available in all locations and may differ from location to location. Charges may apply outside a Service Providers normal service area. Contact a local Service Provider for location-specific information.
What your service provider will do to correct problems When you contact a Service Provider, you must follow the problem determination and resolution procedures specified. Your Service Provider will attempt to diagnose and resolve your problem over the telephone, e-mail or through remote assistance. Your Service Provider may direct you to download and install designated software updates. Some problems can be resolved with a replacement part that you can install yourself called a Customer Replaceable Unit or CRU. If so, your Service Provider will ship the CRU to you for you to install. If your problem cannot be resolved over the telephone or remotely, through your application of software updates or the installation of a CRU by you, 88 Y550 UG V1.0_en.book Page 89 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty your Service Provider will arrange for service under the type of warranty service designated for the product under the section titled Warranty Information. If your Service Provider determines that it is unable to repair your product, your Service Provider will replace it with one that is at least functionally equivalent. If your Service Provider determines that it is unable to either repair or replace your product, your sole remedy is to return the product to your place of purchase or to Lenovo for a refund of your purchase price.
Replacement of a product or part When the warranty service involves the replacement of a product or part, the replaced product or part becomes Lenovos property and the replacement product or part becomes your property. Only unaltered Lenovo products and parts are eligible for replacement. The replacement product or part provided by Lenovo may not be new, but it will be in good working order and at least functionally equivalent to the original product or part. The replacement product or part shall be warranted for the balance of the period remaining on the original product. Before your Service Provider replaces a product or part, you agree to:
1. remove all features, parts, options, alterations, and attachments not under warranty service;
2. ensure that the product or part is free of any legal obligations or restrictions that prevent its replacement; and 89 Y550 UG V1.0_en.book Page 90 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty 3. obtain authorization from the owner to have your Service Provider service a product or part if you do not own it.
Your additional responsibilities Where applicable, before service is provided, you agree to:
1. follow the service request procedures that your Service Provider specifies;
2. backup or secure all programs and data contained in the product;
3. provide your Service Provider with all system keys or passwords and sufficient, free, and safe access to your facilities to perform service; and 4. ensure that all information about identified or identifiable individuals
(Personal Data) is deleted from the product or that, with respect to any Personal Data that you did not delete, you are in compliance with all applicable laws.
Use of personal information If you obtain service under this warranty, Lenovo will store, use and process information about your warranty service and your contact information, including name, phone numbers, address, and e-mail address. Lenovo will use this information to perform service under this warranty and to improve our business relationship with you. We may contact you to inquire about your satisfaction regarding our warranty service or to notify you about any product recalls or safety issues. In accomplishing these purposes, we may transfer your information to any country where we do business and may provide it to entities acting on our behalf. We may also disclose it where required by law. 90 Y550 UG V1.0_en.book Page 91 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty
What this warranty does not cover This warranty does not cover the following:
uninterrupted or error-free operation of a product;
loss of, or damage to, your data;
any software programs, whether provided with the product or installed subsequently;
failure or damage resulting from misuse, accident, modification, unsuitable physical or operating environment, natural disasters, power surges, or improper maintenance by you;
damage caused by a non-authorized service provider;
failure of, or damage caused by, any third party products, including those that Lenovo may provide or integrate into the Lenovo product at your request; and
any technical or other support, such as assistance with how-to questions and those regarding product set-up and installation. This warranty is voided by removal or alteration of identification labels on the product or its parts. 91 Y550 UG V1.0_en.book Page 92 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty
Limitation of liability Lenovo is responsible for loss or damage to your product only while it is:
1) in your Service Providers possession; or 2) in transit in those cases where the Service Provider is responsible for the transportation. Neither Lenovo nor your Service Provider is responsible for any of your data including confidential, proprietary, or personal data contained in a product. You should remove and/or backup all such information from the product prior to its service or return. Circumstances may arise where, because of a default on Lenovos part or other liability, you may be entitled to recover damages from Lenovo. In each such instance, regardless of the basis of your claim against Lenovo
(including breach, negligence, misrepresentation, or other contract or tort claim), except and to the extent that liability cannot be waived or limited by applicable laws, Lenovo shall not be liable for more than the amount of actual direct damages suffered by you, up to the amount you paid for the product. This limit does not apply to damages for bodily injury (including death) and damage to real property or tangible personal property for which Lenovo is liable under law. This limit also applies to Lenovos suppliers, resellers, and your Service Provider. It is the maximum amount for which Lenovo, its suppliers, resellers, and your Service Provider are collectively responsible. UNDER NO CIRCUMSTANCES SHALL LENOVO, ITS SUPPLIERS, RESELLERS, OR SERVICE PROVIDERS BE LIABLE FOR ANY OF THE FOLLOWING EVEN IF INFORMED OF THEIR POSSIBILITY: 1) THIRD 92 Y550 UG V1.0_en.book Page 93 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty PARTY CLAIMS AGAINST YOU FOR DAMAGES; 2) LOSS OR DAMAGE TO YOUR DATA; OR 3) SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, BUSINESS REVENUE, GOODWILL OR ANTICIPATED SAVINGS. AS SOME STATES OR JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
Dispute resolution If you acquired the product in Cambodia, Indonesia, Philippines, Vietnam or Sri Lanka, disputes arising out of or in connection with this warranty shall be finally settled by arbitration held in Singapore and this warranty shall be governed, construed and enforced in accordance with the laws of Singapore, without regard to conflict of laws. If you acquired the product in India, disputes arising out of or in connection with this warranty shall be finally settled by arbitration held in Bangalore, India. Arbitration in Singapore shall be held in accordance with the Arbitration Rules of Singapore International Arbitration Center (SIAC Rules) then in effect. Arbitration in India shall be held in accordance with the laws of India then in effect. The arbitration award shall be final and binding on the parties without appeal. Any award shall be in writing and set forth the findings of fact and the conclusions of law. All arbitration proceedings, including all documents presented in such proceedings, shall be conducted in the English language, and the English language version of this warranty prevails over any other language version in such proceedings. 93 Y550 UG V1.0_en.book Page 94 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty
Other rights THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS AND YOU MAY HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE OR JURISDICTION TO JURISDICTION. YOU MAY ALSO HAVE OTHER RIGHTS UNDER APPLICABLE LAW OR WRITTEN AGREEMENT WITH LENOVO. NOTHING IN THIS WARRANTY AFFECTS STATUTORY RIGHTS, INCLUDING RIGHTS OF CONSUMERS UNDER NATIONAL LEGISLATION GOVERNING THE SALE OF CONSUMER GOODS THAT CANNOT BE WAIVED OR LIMITED BY CONTRACT.
European Economic Area (EEA) Customers in the EEA may contact Lenovo at the following address: EMEA Service Organisation, Lenovo (International) B.V., Floor 2, Einsteinova 21, 851 01, Bratislava, Slovakia. Service under this warranty for Lenovo hardware products purchased in EEA countries may be obtained in any EEA country in which the product has been announced and made available by Lenovo. 94 Y550 UG V1.0_en.book Page 95 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty Warranty information - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Product or Machine Country or Region of Warranty Period Purchase Type of Warranty Service Type Notebook:
20017, 4186 Taiwan India, China (Hong Kong S.A.R.), China (Macau S.A.R.) United States of America, Canada Indonesia, Malaysia, Singapore, Thailand, Philippines, Vietnam, South Africa, Australia, New Zealand, France, Mexico Russia, Ukraine, the Republic of Kazakhstan Poland, Turkey Parts and Labor -
1 year Battery pack -
1 year 3, 4 1, 4 1, 3 1, 3 or 4 Parts and Labor -
2 years Battery pack -
1 year 4 1, 3 or 4 If required, your Service Provider will provide repair or exchange service depending on the type of warranty service specified for your product and the available service. Scheduling of service will depend upon the time of your call, parts availability, and other factors. 95 Y550 UG V1.0_en.book Page 96 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty A warranty period of three (3) years on parts and one (1) year on labor means that Lenovo will provide warranty service without charge for:
a. parts and labor during the first year of the warranty period (or a longer period as required by law); and b. parts only, on an exchange basis, in the second and third years of the warranty period. Your Service Provider will charge you for any labor provided in performance of the repair or replacement in the second and third years of the warranty period.
Types of warranty service 1 Customer Replaceable Unit (CRU) Service Under CRU Service, your Service Provider will ship CRUs to you for installation by you. CRU information and replacement instructions are shipped with your product and are available from Lenovo at any time upon request. CRUs that are easily installed by you are called Self-service CRUs, while Optional-service CRUs may require some technical skill and tools. Installation of Self-service CRUs is your responsibility. You may request that a Service Provider install Optional-service CRUs under one of the other types of warranty service designated for your product. An optional service offering may be available for purchase from Lenovo to have Lenovo install Self-service CRUs for you. You may find a list of CRUs and their designation in the publication that ships with your product or at www.lenovo.com/CRUs. The requirement to return a defective CRU, if any, will be specified in the materials shipped with a replacement CRU. When return is required: 1) return instructions, a prepaid return shipping label, and a container will be included with the replacement CRU; and 96 Y550 UG V1.0_en.book Page 97 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty 2) you may be charged for the replacement CRU if your Service Provider does not receive the defective CRU within thirty (30) days of your receipt of the replacement. 2 On-site Service Under On-Site Service, your Service Provider will either repair or exchange the product at your location. You must provide a suitable working area to allow disassembly and reassembly of the Lenovo product. For some products, certain repairs may require your Service Provider to send the product to a designated service center. 3 Courier or Depot Service Under Courier or Depot Service, your product will be repaired or exchanged at a designated service center, with shipping arranged by your Service Provider. You are responsible for disconnecting the product. A shipping container will be provided to you for you to return your product to a designated service center. A courier will pick up your product and deliver it to the designated service center. Following its repair or exchange, the service center will arrange the return delivery of the product to you. 4 Customer Carry-In or Mail-In Service Under Customer Carry-In or Mail-In Service, your product will be repaired or exchanged at a designated service center, with delivery or shipping arranged by you. You are responsible to deliver or mail, as your Service Provider specifies, (prepaid by you unless specified otherwise) the product, suitably packaged to a designated location. After the product has been repaired or exchanged, it will be made available for your collection. Failure to collect the product may result in your Service Provider disposing of the 97 Y550 UG V1.0_en.book Page 98 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty product as it sees fit. For Mail-in Service, the product will be returned to you at Lenovos expense, unless your Service Provider specifies otherwise. 5 Product Exchange Service Under Product Exchange Service, Lenovo will ship a replacement product to your location. You are responsible for its installation and verification of its operation. The replacement product becomes your property in exchange for the failed product, which becomes the property of Lenovo. You must pack the failed product in the shipping carton used to ship the replacement product and return it to Lenovo. Transportation charges, both ways, are paid by Lenovo. Failure to use the carton in which the replacement product was received may result in your responsibility for damage to the failed product during shipment. You may be charged for the replacement product if Lenovo does not receive the failed product within thirty (30) days of your receipt of the replacement product. 98 Y550 UG V1.0_en.book Page 99 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty Lenovo warranty service telephone numbers - - - - - - - - - - -
Warranty Service Telephone Numbers The phone numbers provided below are correct as of the time of printing and are subject to change without notice. For the latest warranty service contact telephone number in a country please contact Lenovo, or your reseller in your country.
Singapore
Malaysia
Thailand Indonesia
Philippines
Vietnam
India Toll free 800 6012 047 1800 18 2388 1800 06 0087 001 803 0601 2003 1800 111 00724 1800 1528 1800 113324 011-26388288 9900173324 400-810-8888
(852) 2516-3919
(886) 0800-000-702 0800-689 1-877-453-6686 1-877-453-6686 1-800-92536686 0826-536-686 Alternate No. SMS
P.R.China
Hong Kong
Taiwan
Macau
United States
Canada
Mexico
France 99 Y550 UG V1.0_en.book Page 100 Wednesday, December 10, 2008 4:51 PM Appendix A. Lenovo Limited Warranty
South Africa
Australia
New Zealand
Russia Toll free Alternate No.
Ukraine
the Republic of Kazakhstan
Poland
Turkey 0861-536-686 1300 557 073 0800 446 833 8-800-700-7888
+7-(495) 662-7888
+38 044 458-38-70
+7 (727) 2971150
+7 (727) 2971160 0800-702-062 Refer to http://consumersupport.lenovo.com/tr Additionally, you can find support information, and updates, including service phone numbers for unlisted countries on the Lenovo Web site located at: http://consumersupport.lenovo.com. 100 Y550 UG V1.0_en.book Page 101 Wednesday, December 10, 2008 4:51 PM Appendix B. Customer Replaceable Units (CRUs) Customer Replaceable Units (CRUs) are computer parts that can be upgraded or replaced by the customer. There are two types of CRUs:
internal and external. External CRUs are easy to install, whereas internal CRUs require some technical skills and in some cases might require tools such as a screwdriver. However, both internal and external CRUs are safe for removal by the customer. Customers are responsible for replacing all external CRUs. Internal CRUs can be removed and installed by customers or by a Lenovo service technician during the warranty period. Your computer contains the following types of external CRUs:
External CRUs (pluggable): These CRUs unplug from the computer. Examples of these types of CRUs include the AC adapter and power cord.
External CRUs with latches: These CRUs include a latch to help you remove and replace the part. Examples of these types of CRUs include the notebook main battery, an optical drive, a hard-disk drive, and an extended battery. Your computer contains the following types of internal CRUs:
Internal CRUs (located behind an access panel): These CRUs are isolated parts within the computer that are concealed by an access panel that is typically secured by either one or two screws. Once the access panel is removed, only the specific CRU is visible. Examples of these types of CRUs include memory modules and hard disk drives. Internal CRUs (located within the product): These CRUs are accessible only by opening the computers outer case. Examples of these CRUs include PCI Express Mini Cards and the integrated keyboard.
101 Y550 UG V1.0_en.book Page 102 Wednesday, December 10, 2008 4:51 PM Appendix C. Specifications Specifications - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Size
Approximate 384.2 mm 254.5 mm 26-37 mm Environment Temperature Operating with no optical disc in the drive: 5C to 35C (41F to 95F) Operating with an optical disc in the drive: 10C to 35C (50F to 95F) Note:
Storage: -20C to 60C (-4F to 140F)
When you charge the battery pack, its temperature must be at least 10C (50F).
Relative humidity:
Operating with no optical disc in the drive: 8% to 95%
Operating with an optical disc in the drive: 8% to 80%
102 Y550 UG V1.0_en.book Page 103 Wednesday, December 10, 2008 4:51 PM Appendix C. Specifications Power source
(AC adapter)
Input rating of the AC adapter: 100-240 V ac, 50 to 60 Hz
65 W (with integrated graphics card)/90 W (with Note:
discrete graphics card)
For models with discrete graphics card, the supplied 90 W AC adapter with the unit is recommended. Otherwise, it will cause AC adapter overheating or machine malfunction. Battery pack
Lithium-ion (Li-Ion) battery pack Nominal voltage: 11.1 V dc Capacity: 56-57 Wh 103 Y550 UG V1.0_en.book Page 104 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Notices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Lenovo may not offer the products, services, or features discussed in this document in all countries. Consult your local Lenovo representative for information on the products and services currently available in your area. Any reference to a Lenovo product, program, or service is not intended to state or imply that only that Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any Lenovo intellectual property right may be used instead. However, it is the users responsibility to evaluate and verify the operation of any other product, program, or service. Lenovo may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:
Lenovo (United States), Inc. 1009 Think Place - Building One Morrisville, NC 27560 U.S.A. Attention: Lenovo Director of Licensing LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. 104 Y550 UG V1.0_en.book Page 105 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. Lenovo may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. The products described in this document are not intended for use in implantation or other life support applications where malfunction may result in injury or death to persons. The information contained in this document does not affect or change Lenovo product specifications or warranties. Nothing in this document shall operate as an express or implied license or indemnity under the intellectual property rights of Lenovo or third parties. All information contained in this document was obtained in specific environments and is presented as an illustration. The result obtained in other operating environments may vary. Lenovo may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Any references in this publication to non-Lenovo Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this Lenovo product, and use of those Web sites is at your own risk. Any performance data contained herein was determined in a controlled environment. Therefore, the result obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through 105 Y550 UG V1.0_en.book Page 106 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. The software interface and hardware configuration described in all the manuals included with your computer may not match the actual configuration of the computer you purchased.
Export classification notice This product is subject to the Untied States Export Administration Regulations (EAR) and has an Export Classification Control Number
(ECCN) of 4A994.b. It can be re-exported except to any of the embargoed countries in the EAR E1 country list.
Television output notice The following notice applies to models that have the factory-installed television-output feature. This product incorporates copyright protection technology that is protected by U.S. patents and other intellectual property rights. Use of this copyright protection technology must be authorized by Macrovision, and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision. Reverse engineering or disassembly is prohibited. 106 Y550 UG V1.0_en.book Page 107 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Wireless related information - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Wireless interoperability Wireless LAN PCI Express Mini Card is designed to be interoperable with any wireless LAN product that is based on Direct Sequence Spread Spectrum (DSSS), Complementary Code Keying (CCK), and/or Orthogonal Frequency Division Multiplexing (OFDM) radio technology, and is compliant to:
The IEEE 802.11a/b/g/n Standard on Wireless LANs, as defined and approved by the Institute of Electrical and Electronics Engineers.
The Wireless Fidelity (WiFi) certification as defined by the Wi-Fi Alliance. Bluetooth Daughter Card is designed to be interoperable with any Bluetooth product that is compliant to Bluetooth Specification 2.0 + EDR as defined by the Bluetooth SIG. Following profiles are supported by Bluetooth Daughter Card:
Generic Access
Service Discovery
Serial Port
Dial-up Networking
FAX
LAN Access using PPP
Personal Area Network
Generic Object Exchange
Generic Object Push
File Transfer 107 Y550 UG V1.0_en.book Page 108 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Synchronization
Audio Gateway
Headset
Printer
Human Interface Devices (Keyboard/Mouse)
Basic Image
Handsfree
AV
Usage environment and your health Wireless LAN PCI Express Mini Card and Bluetooth Daughter Card emit radio frequency electromagnetic energy like other radio devices. However, the level of energy emitted is far much less than the electromagnetic energy emitted by wireless devices like for example mobile phones. Due to the fact that wireless LAN PCI Express Mini Card and Bluetooth Daughter Card operate within the guidelines found in radio frequency safety standards and recommendations, Lenovo believes the integrated wireless cards are safe for use by consumers. These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situation or environment, the use of wireless LAN PCI Express Mini Card or Bluetooth Daughter Card may be restricted by the proprietor of the building or responsible representatives of the organization. These situations may for example include:
108 Y550 UG V1.0_en.book Page 109 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Using the integrated wireless cards on board of airplanes, or in hospitals
In any other environment where the risk of interference to other devices or services is perceived or identified as harmful. If you are uncertain of the policy that applies on the use of wireless devices in a specific organization (e.g., airport or hospital), you are encouraged to ask for authorization to use wireless LAN PCI Express Mini Card or Bluetooth Daughter Card prior to turning on the computer. 109 Y550 UG V1.0_en.book Page 110 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices TV tuner information - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Products with television tuner options installed The notice below applies to products containing television (TV) tuner devices that connect to external antennas or to cable/CATV systems, or both, and that are intended to be installed in North America. Users and installers in other countries should follow local codes and ordinances when installing appliances that connect to external antennas and cable/CATV systems. If local codes are not applicable, it is recommended that users/
installers follow guidelines similar to those that follow. The TV tuner should connect to TNV-1 circuit only. When install the coaxial cable to the TV tuner should make sure its metal shield is reliable connected to protective earthing system of the building.
Note to CATV system installer This reminder is provided to call the CATV system installers attention to Article 820-40 of the National Electrical Code (NEC) that provides guidelines for proper grounding and, in particular, specifies that the cable ground shall be connected to the grounding system of the building, as close as possible to the point of cable entry as practical. 110 Y550 UG V1.0_en.book Page 111 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Example of antenna grounding
Ground clamp Antenna lead-in wire Antenna discharge unit
(NEC Section 810-20) Grounding conductors
(NEC Section 810-21)
Power service grounding electrode system (NEC Article 250, Part H) Ground clamps Electronic service equipment 111 Y550 UG V1.0_en.book Page 112 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices The following notice applies to all countries and regions:
Danger:
Outdoor antenna grounding If an outside antenna or cable system is connected to the equipment, be sure the antenna or cable system is grounded as to provide some protection against voltage surges and built-up static charges.
Lightning For added protection for this equipment during a lightning storm, or when it is left unattended and unused for long periods of time, unplug it from the wall outlet and disconnect the antenna or cable system. This will prevent damage to the video product due to lightning and power line surges.
Power lines An outside antenna system should not be located in the vicinity of overhead power lines or where it can fall into such power lines or circuits. When installing an outside antenna system, extreme care should be taken to keep from touching such power lines or circuits, as contact with them may be fatal. 112 Y550 UG V1.0_en.book Page 113 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Electronic emissions notices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The following information refers to Lenovo IdeaPad Y550, machine type 20017 4186.
Federal Communications Commission (FCC) Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, used, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee the interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult an authorized dealer or service representative for help. Properly shielded and grounded cables and connectors must be used in order to meet FCC emission limits. Proper cables and connectors are available from Lenovo authorized dealers. Lenovo is not responsible for any radio or television interference caused by using other than 113 Y550 UG V1.0_en.book Page 114 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices recommended cables or connectors or by unauthorized changes or modifications to this equipment. Unauthorized changes or modifications could void the users authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Responsible party:
Lenovo (United States) Incorporated 1009 Think Place - Building One Morrisville, NC 27650 U.S.A. Telephone: (919) 294-5900
Industry Canada Class B Emission Compliance Statement This Class B digital apparatus complies with Canadian ICES-003.
Avis de conformit la rglementation dIndustrie Canada Cet appareil numrique de la classe B est conforme la norme NMB-003 du Canada. 114 Y550 UG V1.0_en.book Page 115 Wednesday, December 10, 2008 4:51 PM
German Class B Compliance Statement Deutschsprachiger EU Hinweis:
Appendix D. Notices Hinweis fr Gerte der Klasse B EU-Richtlinie zur Elektromagnetischen Vertrglichkeit Dieses Produkt entspricht den Schutzanforderungen der EU-Richtlinie 2004/108/EG (frher 89/336/EWG) zur Angleichung der Rechtsvorschriften ber die elektromagnetische Vertrglichkeit in den EU-Mitgliedsstaaten und hlt die Grenzwerte der EN 55022 Klasse B ein. Um dieses sicherzustellen, sind die Gerte wie in den Handbchern beschrieben zu installieren und zu betreiben. Des Weiteren drfen auch nur von der Lenovo empfohlene Kabel angeschlossen werden. Lenovo bernimmt keine Verantwortung fr die Einhaltung der Schutzanforderungen, wenn das Produkt ohne Zustimmung der Lenovo verndert bzw. wenn Erweiterungskomponenten von Fremdherstellern ohne Empfehlung der Lenovo gesteckt/eingebaut werden. Deutschland:
Einhaltung des Gesetzes ber die elektromagnetische Vertrglichkeit von Betriebsmittein Dieses Produkt entspricht dem Gesetz ber die elektromagnetische Vertrglichkeit von Betriebsmitteln EMVG (frher Gesetz ber die elektromagnetische Vertrglichkeit von Gerten). Dies ist die Umsetzung der EU-Richtlinie 2004/108/EG (frher 89/336/EWG) in der Bundesrepublik Deutschland. 115 Y550 UG V1.0_en.book Page 116 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Zulassungsbescheinigung laut dem Deutschen Gesetz ber die elektromagnetische Vertrglichkeit von Betriebsmitteln, EMVG vom 20. Juli 2007 (frher Gesetz ber die elektromagnetische Vertrglichkeit von Gerten), bzw. der EMV EG Richtlinie 2004/108/EC (frher 89/336/EWG), fr Gerte der Klasse B. Dieses Gert ist berechtigt, in bereinstimmung mit dem Deutschen EMVG das EG-Konformittszeichen - CE - zu fhren. Verantwortlich fr die Konformittserklrung nach Paragraf 5 des EMVG ist die Lenovo
(Deutschland) GmbH, Gropiusplatz 10, D-70563 Stuttgart. Informationen in Hinsicht EMVG Paragraf 4 Abs. (1) 4:
Das Gert erfllt die Schutzanforderungen nach EN 55024 und EN 55022 Klasse B. 116 Y550 UG V1.0_en.book Page 117 Wednesday, December 10, 2008 4:51 PM
European Union Compliance Statement Class B Compliance European Union - Compliance to the Electromagnetic Compatibility Directive Appendix D. Notices This product is in conformity with the protection requirements of EU Council Directive 2004/108/EC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Lenovo cannot accept responsibility for any failure to satisfy the protection requirements resulting from a non-recommended modification of the product, including the installation of option cards from other manufacturers. This product has been tested and found to comply with the limits for Class B Information Technology Equipment according to European Standard EN 55022. The limits for Class B equipment were derived for typical residential environments to provide reasonable protection against interference with licensed communication devices. Properly shielded and grounded cables and connectors must be used in order to reduce the potential for causing interference to radio and TV communications and to other electrical or electronic equipment. Such cables and connectors are available from Lenovo authorized dealers. Lenovo cannot accept responsibility for any interference caused by using other than recommended cables and connectors. 117 Y550 UG V1.0_en.book Page 118 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Japanese VCCI Class B Statement
Japan Compliance Statement for Power line Harmonics A statement of compliance to the IEC 61000-3-2 harmonics standard is required for all products connecting to the power mains and rated less than 20A per phase.
Korea Class B 118 Y550 UG V1.0_en.book Page 119 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices WEEE and recycling statements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
General recycling statement Lenovo encourages owners of information technology (IT) equipment to responsibly recycle their equipment when it is no longer needed. Lenovo offers a variety of programs and services to assist equipment owners in recycling their IT products. Information on product recycling offerings can be found on Lenovos Internet site at http://www.pc.ibm.com/ww/lenovo/about/environment 119 Y550 UG V1.0_en.book Page 120 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices EU WEEE Statements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
The Waste Electrical and Electronic Equipment (WEEE) mark applies only to countries within the European Union (EU) and Norway. Appliances are labeled in accordance with European Directive 2002/96/EC concerning waste electrical and electronic equipment (WEEE). The Directive determines the framework for the return and recycling of used appliances as applicable throughout the European Union. This label is applied to various products to indicate that the product is not to be thrown away, but rather reclaimed upon end of life per this Directive. Users of electrical and electronic equipment (EEE) with the WEEE marking per Annex IV of the WEEE Directive must not dispose of end of life EEE as unsorted municipal waste, but use the collection framework available to them for the return, recycle, recovery of WEEE and minimize any potential effects of EEE on the environment and human health due to the presence of hazardous substances. For additional WEEE information go to:
http://consumersupport.lenovo.com. 120 Y550 UG V1.0_en.book Page 121 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Japan Recycling Statements - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Collecting and Recycling a Disused Lenovo Computer or Monitor If you are a company employee and need to dispose of a Lenovo computer or monitor that is the property of the company, you must do so in accordance with the Law for Promotion of Effective Utilization of Resources. Computers and monitors are categorized as industrial waste and should be properly disposed of by an industrial waste disposal contractor certified by a local government. In accordance with the Law for Promotion of Effective Utilization of Resources, Lenovo Japan provides, through its PC Collecting and Recycling Services, for the collecting, reuse, and recycling of disused computers and monitors. For details, visit the Lenovo Web site at www.ibm.com/jp/pc/service/recycle/pcrecycle http://www.ibm.com/jp/pc/service/recycle/pcrecycle Pursuant to the Law for Promotion of Effective Utilization of Resources, the collecting and recycling of home-used computers and monitors by the manufacturer was begun on October 1, 2003. This service is provided free of charge for home-used computers sold after October 1, 2003. For details, visit the Lenovo Web site at www.ibm.com/jp/pc/service/recycle/personal http://www.ibm.com/jp/pc/service/recycle/personal 121 Y550 UG V1.0_en.book Page 122 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Disposing of a Lenovo Computer Components Some Lenovo computer products sold in Japan may have components that contain heavy metals or other environmental sensitive substances. To properly dispose of disused components, such as a printed circuit board or drive, use the methods described above for collecting and recycling a disused computer or monitor.
Disposing a Disused Battery Pack from Lenovo Notebook Computers Your Lenovo notebook computer has a lithium ion battery pack or a nickel metal hydride battery pack. If you are a company employee who uses a Lenovo notebook computer and need to dispose of a battery pack, contact the proper person in Lenovo sales, service, or marketing, and follow that persons instructions. You also can refer to the instructions at www.ibm.com/jp/pc/environment/recycle/battery http://www.ibm.com/jp/pc/environment/recycle/battery If you use a Lenovo notebook computer at home and need to dispose of a battery pack, you must comply with local ordinances and regulations. You also can refer to the instructions at www.ibm.com/jp/pc/environment/recycle/battery http://www.ibm.com/jp/pc/environment/recycle/battery 122 Y550 UG V1.0_en.book Page 123 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Notice for Users in the U.S.A. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
California Perchlorate Information:
Products containing CR (manganese dioxide) lithium coin cell batteries may contain perchlorate. Perchlorate Material special handling may apply. See http://www.dtsc.ca.gov/hazardouswaste/perchlorate. Notice on deleting data from your hard disk - - - - - - - - - - - - - - - -
As computers spread into every corner of life, they process more and more information. The data on your computer, some of it sensitive, is stored on a storage device called the hard disk. Before you dispose of, sell, or hand over your computer, you need to delete that data. Handing your computer over to someone else without deleting the loaded software, such as operating systems and application software, may even violate License Agreements. You are advised to check the terms and conditions of those Agreements. Deleting the data from the hard disk is not easy. There are methods that seem to delete the data:
Move the data to the recycle bin, and then choose the Empty recycle bin command.
Use the Delete command.
Format your hard disk, using the software for initializing it. 123 Y550 UG V1.0_en.book Page 124 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices
Using the preinstalled recovery program, bring the hard disk back to factory-ship state. These operations, however, only change the file allocation of the data; they do not delete the data itself. In other words, the data retrieval processing is disabled under an operating system such as Windows. The data is still there, even though it seems to be lost. Thus, it is sometimes possible to read the data by use of special software for data recovery. There is a risk that people of bad faith may read and misuse the critical data on hard disks for unexpected purposes. To prevent the leakage of data, it becomes very important that you take responsibility for deleting all the data from the hard disk when you dispose of, sell, or hand over your computer. You can destroy the data physically by smashing the hard disk with a hammer, or magnetically by means of strong magnetic power, thus making the data unreadable. But we recommend that you make use of the software (payware) or service (pay service) specifically developed for the purpose. 124 Y550 UG V1.0_en.book Page 125 Wednesday, December 10, 2008 4:51 PM Appendix D. Notices Trademarks - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Lenovo, lenovo logo, IdeaPad, VeriFace, OneKey Rescue (OneKey Recovery, OneKey AntiVirus), APS, Power Express, Energy Management and ReadyComm are either registered trademarks or trademarks of Lenovo in the United States and/or other countries. Microsoft, Windows and Windows Vista are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. All other trademarks and registered trademarks are trademarks or registered trademarks of their respective holders. In this manual, and marks are not specified. 125 Y550 UG V1.0_en.book Page 126 Wednesday, December 10, 2008 4:51 PM Index A AC adapter Jack .............................................. 5 Using ......................................... 24 B Battery Charging ................................... 26 Bluetooth Connecting................................ 38 Interoperability....................... 107 Switch.......................................... 6 Usage environment ................ 108 C Camera..................................... 2, 13, 19 Card reader........................................ 17 Caring your computer....................... 72 CIR port................................................ 6 Cleaning Computer cover........................ 78 Computer display..................... 80 Computer keyboard ................. 79 126 Customer Replaceable Unit (CRU) parts list............................................ 101 Customer support center................... 51 D Display Cleaning .................................... 80 Drivers................................................ 24 E eSATA ................................................ 30 ExpressCard/34" slot......................... 31 F FCC Statement ................................. 113 Frequently Asked Questions............. 39 Function key combinations ............... 12 Y550 UG V1.0_en.book Page 127 Wednesday, December 10, 2008 4:51 PM H Hard disk drive Problems.................................... 48 HDMI port ..................................... 4, 34 Headphone jack (S/PDIF) ................. 35 Help Customer support center.......... 51 Help and service ....................... 50 on the web................................. 51 Hibernation mode problems ............. 44 I Internet ............................................... 20 K Keyboard Cleaning .................................... 78 Problems.................................... 43 Using ......................................... 11 Index L Lenovo Limited Warranty .................87 M Maintenance.......................................83 Microphone Built-in.........................................2 External .....................................37 N Notice Electronic emissions................113 for US Users ............................123 Numeric Keypad................................11 O OneKey Rescue System button .....2, 16 Optical drive.......................................17 127 Y550 UG V1.0_en.book Page 128 Wednesday, December 10, 2008 4:51 PM Index P Password Problems ................................... 43 Using ......................................... 23 Power button ....................................... 2 Problems Battery....................................... 47 Computer screen ...................... 45 Display ...................................... 41 Hard disk drive ........................ 48 Hibernation mode .................... 44 Keyboard................................... 43 Password................................... 43 Sleep mode................................ 44 Sound ........................................ 47 Startup....................................... 48 R Remote control................................... 19 S Security .............................................. 22 Security keyhole .................................. 4 128 Speakers ............................................... 2 Specifications ................................... 102 Storage media Handling ................................... 76 Subwoofer ............................................ 8 T Touch inductive panel............. 2, 14, 15 Touch pad ............................................ 9 Trademarks...................................... 125 Troubleshooting................................. 41 TV TV-in jack .................................... 5 U USB port......................................... 5, 28 V VeriFace.............................................. 23 VGA port........................................ 4, 33 Volume button................................... 14 Y550 UG V1.0_en.book Page 129 Wednesday, December 10, 2008 4:51 PM W Warranty information........................ 95 Web Help........................................... 51 Wireless LAN Antennas ..................................... 2 Connecting ................................ 21 Interoperability ....................... 107 Switches................................. 6, 13 Usage environment................. 108 Index 129 Y550 UG V1.0_en.book Page 130 Wednesday, December 10, 2008 4:51 PM
various | User Manual 3 | Users Manual | 465.63 KiB | July 07 2008 |
Shared Folder Notification Device to Device (ad hoc) Network Notification File and printer sharing enables other computers on a network to access resources on your computer. You should be cautious when you use your wireless notebook computer with file and printer sharing enabled. Use this feature to receive notifications when you connect to a wireless network with shared folders that meet one of the following conditions:
l The Microsoft Windows firewall is disabled l File and Printer Sharing are enabled as an exception to the Microsoft Windows firewall settings. Unshare shared folders automatically when connected to an unsecured network. Select to unshare shared folders automatically, each time you connect to an unsecured network. This feature provides some additionally security. Disable this notification Select to maintain your current shared folder settings each time you connect to an open, unsecured network. Notify when connected to an unsecured network. Select to receive notification each time you are connected to an open, unsecured network. Receive alerts dependent on the following settings when connected to an ad hoc network. You are alerted every two minutes, with a maximum of five alerts. Notify when no peers have joined the ad hoc network Select to receive notification if no peers join the ad hoc network. Notify when all peers leave the ad hoc network Select to receive an alert when all the peers leave the ad hoc network. Network Name (SSID) Notification WiFi Settings Wi-Fi Protected Setup*
OK Cancel Notifies you when the default network name (SSID) is used to connect to a network. Common examples of pre-defined, default network names are: wireless, WLAN, linksys, default. Connecting to an access point that has the default network name (SSID) can be a security problem. This access point usually uses all the default security and, management settings (for example, Open authentication; default IP address, user name, or password). If this is a personal network, change the network name and security settings to improve the security of the network. Notify when connected to a network with the default SSID name Select to receive an alert when connected to a network with the default network name. Disable WiFi scanning when associated: This setting disables scanning for additional WiFi access points after the adapter connects to an access point
(network). Disabling scanning when already connected can improve the connection performance. Enable device registration Turn this on to let the computer act as an external registrar. In this capacity, the computer can set up an unconfigured access point or join a configured access point. After the access point has been configured, the computer, as an external registrar, can add new computers (enrollees) to the network. Default state is OFF. Turn Enable device registration off to let the computer detect and connect to a network as an enrollee. Notify when Wi-Fi Protected Setup access points are within range of your computer Turn to on to let you know when an access point equipped with Wi-Fi Protected Setup* is within range of your computer. This is necessary if you want to enroll
(connect) this computer to the access point. Default state is On. Saves settings and return to the previous page. Closes and cancels changes. Help?
Provides help information for this page. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Intel(R) Wireless Troubleshooter (Tools menu) Intel(R) Wireless Troubleshooter Window Open Intel(R) Wireless Troubleshooter Resolve Errors The Intel Wireless Troubleshooter is an application that can help you resolve wireless network connection issues. When a connection issue is detected, a desktop alert notification appears at the bottom right corner of your desktop. Once you click the desktop alert, a diagnostic message displays the recommended steps to resolve the connection problem. For example, if a connection problem occurred because of an invalid password, the Profile Manager application is launched when you click a displayed hyperlink, letting you enter the correct password. From the Intel Wireless Troubleshooter you can enable or disable the alert notifications. The Intel Wireless Troubleshooter is only supported under Microsoft Windows XP*. Intel(R) Wireless Troubleshooter Window The Intel Wireless Troubleshooter contains two panes. The left pane displays a list of available tools. The right pane displays the current connection issue and is divided into two sections: the error message and the recommended action. The recommended action contains descriptions about available utilities and helps to resolve the associated connection issue. If you click on a help link, the help text is displayed in a window. If you click on the associated issue resolution link, a program is launched to resolve the connection issue. Name Menu Options File Wireless Event Viewer: Launches Wireless Event Viewer. Also Description selectable in the left pane. Disable Notification/Enable Notification: Select to disable or enable alert notifications. Also selectable in the left pane. Exit: Click to exit the Intel Wireless Troubleshooter application. View History: Displays or removes the History data on the right panel of the Intel Wireless Troubleshooter. Tools Manual Diagnostics Tool: Run diagnostic test to verify the functionality of your wireless adapter. See Manual Diagnostics Tool for more information. Help Intel(R) Wireless Troubleshooter Help: Displays online help for the Intel Wireless Troubleshooter. About: Displays version information for the Intel Wireless Troubleshooter. Available Help The date, time and error message:
l Description of error. l Link to resolve error (if available). See Resolve Errors next. l Link to recommended steps to resolve error. History Maintains a list of the last five alerts. The alerts are listed chronologically, with the most recent alert at the top of the list. How to Open Use Intel(R) Wireless Troubleshooter Open the Intel(R) PROSet/Wireless WiFi Connection Utility. At the Tools menu, click Intel
(R) Wireless WiFi Troubleshooter. Resolve Errors Use the following recommendations to resolve detected network connection issues. Did not receive an IP address The ad hoc network is idle and no peers have joined the network The ad hoc network is idle and all peers have left the network You are connected to a network with default network name (SSID). The network or the access point may not be configured with security You are connected to a network that is not configured with security and there are shared folders detected in your system The wireless network adapter in the system is disabled No wireless network adapter was detected in the system No wireless network adapter driver was installed Corrupted wireless network adapter driver Adapter Driver is not loaded Disconnection from an access point If you are an advanced user or administrator, use these error messages to diagnose problems within your wireless network profiles. The application failed to start No certificate found Authentication failed due to invalid user name Authentication failed due to invalid user credentials Authentication failed due to an invalid user certificate Your certificate will expire soon Authentication failed due to invalid server identity Authentication failed due to invalid server credentials Authentication failed due to an invalid server certificate Authentication failed because the AAA server is unavailable The AAA server rejected the EAP method Incorrect PIN for retrieving certificate Error occurred because the GSM adapter was unexpectedly removed Smart Card was unexpectedly removed Authentication failed because timer expired An administrator profile failed to authenticate Administrator profile did not receive an IP address Did not receive an IP address The wireless adapter failed to get a valid IP address. The wireless security password or encryption key does not match the one used by the access point. Other causes are: the wireless network requires a static IP address; there is a problem with the DHCP server; or, a general network problem. To clear this message:
l Reenter the wireless security password in the network security settings. See Personal Security. l Restart the access point, router, computer, and DSL/cable modem. l Verify the security configuration on the access point or wireless router. For assistance, contact your access point or router manufacturer. l Contact your network administrator for help to set up your wireless connection. The ad hoc network is idle and no peers have joined the network If you create an ad hoc network and no peers join that ad hoc network for two minutes, this alert notifies you that the ad hoc network is idle. This alert notification is enabled or disabled in the Application Settings. To clear this message:
1. From the Tools menu, click Application Settings. 2. Scroll down to locate Device to Device (ad hoc) Network Notification. 3. Clear Notify when no peers have joined the ad hoc network. 4. Click OK to save your settings and return to the WiFi connection utility main window. The ad hoc network is idle and all peers have left the network If you create or join an ad hoc network with other participants, this alert notifies you when any or all participants have left the ad hoc network. This alert notification is set in the Application Settings. To clear this message:
1. From the Tools menu, click Application Settings. 2. Scroll down to locate Device to Device (ad hoc) Network Notification. 3. Clear Notify when all peers leave the ad hoc network. 4. Click OK to save your settings and return to the WiFi connection utility main window. You are connected to a network with default network name (SSID). The network or the access point may not be configured with security Connecting to an access point that uses a default network name (SSID) can be a security problem. This access point usually uses all the default security and management settings
(for example, Open authentication, default IP address, user name, or password.) If this is a personal network, change the network name and security settings to improve the security of the network. This alert notification is enabled or disabled in the Application Settings. To clear this message:
1. From the Tools menu, click Application Settings. 2. Scroll down to locate SSID Notification. 3. Clear Notify when connected to a network with the default SSID name. 4. Click OK to save your settings and return to the WiFi connection utility main window. You are connected to a network that is not configured with security and there are shared folders detected in your system File and printer sharing enables other computers on a network to access resources on your computer. You should be cautious when you use your wireless portable computer with file and printer sharing enabled. If you are alerted when connecting to a wireless LAN with shared folders, you can disable this notification. See Application Settings. To clear this message and restore the network shared folders on disconnection:
1. From the Tools menu, click Application Settings. 2. Scroll down to locate Shared Folder Notification. 3. Select Disable this notification to maintain your current shared folder settings each time that you connect to an open, unsecured network. 4. Click OK to save your settings and return to the WiFi connection utility main window. The wireless network adapter in the system is disabled Enable the wireless adapter. 1. Right-click My Computer. 2. Select Properties. 3. Click Hardware. 4. Click Device Manager. 5. Double-click Network Adapters. 6. Right-click the Intel(R) PRO/Wireless adapter that is listed. 7. Click Enable. 8. Click File > Exit to close the Device Manager. 9. Click OK to close System Properties. No wireless network adapter was detected in the system The system could not detect an Intel wireless adapter in the system. The adapter may be removed or not installed. First verify if there is a wireless adapter listed in the Device Manager:
1. Right-click My Computer. 2. Select Properties. 3. Click Hardware. 4. Click Device Manager. 5. Double-click Network Adapters. If an Intel(R) PRO/Wireless adapter is listed, update the driver from the Intel Corporation Support Web site at www.intel.com/support/. If an Intel(R) PRO/Wireless adapter is not listed, contact your computer manufacturer. No wireless network adapter driver was detected in the system The system could not detect an Intel wireless adapter in the system. You may need to update the wireless adapter driver. First verify if there is a wireless adapter listed in the Device Manager:
1. Right-click My Computer. 2. Select Properties. 3. Click Hardware. 4. Click Device Manager. 5. Double-click Network Adapters. If the wireless adapter is listed:
1. Go to Start > Control Panel > Add or Remove Programs. 2. Select Intel(R) PROSet/Wireless WiFi Software. 3. Click Change/Remove. 4. Select repair. 5. Click Next. If these steps do not resolve the problem, download and install the latest software for the Intel wireless adapter from the Intel Corporation Support Web site at www.intel.com/
support/. If an Intel(R) PRO/Wireless adapter is not listed, contact your computer manufacturer. Corrupted wireless network adapter driver The system detected that the network driver is corrupted. You need to update the wireless adapter driver. 1. Right click the Intel(R) PRO/Wireless network card that is installed in your computer. 2. Click Update Driver. The Windows Welcome to the Hardware Update Wizard is displayed. 3. At the Hardware Update Wizard screen, click Yes, this time only. 4. Click Next. 5. Click Install the software automatically. Or if you know where the driver is located, click Install from a list or specified location. If an Intel(R) PRO/Wireless adapter is listed, update the driver from the Intel Corporation Support Web site at www.intel.com/support/. If an Intel(R) PRO/Wireless adapter is not listed, contact your computer manufacturer. If you receive the message Cannot Continue the Hardware Update Wizard, contact the Intel Corporation Support Web site at www.intel.com/support/. Adapter Driver is not loaded The system detected that the wireless adapter driver is not loaded. You need to install/
update the wireless adapter driver. 1. Right click the Intel(R) PRO/Wireless network card that is installed in your computer. 2. Click Update Driver. The Windows Welcome to the Hardware Update Wizard is displayed. 3. At the Hardware Update Wizard screen, click Yes, this time only. 4. Click Next. 5. Click Install the software automatically. Or if you know where the driver is located, click Install from a list or specified location. If an Intel(R) PRO/Wireless adapter is listed, update the driver from the Intel Corporation Support Web site at www.intel.com/support/. If an Intel(R) PRO/Wireless adapter is not listed, contact your computer manufacturer. If you receive the message Cannot Continue the Hardware Update Wizard, contact the Intel Corporation Support Web site at www.intel.com/support/. Disconnection from an access point The following error messages are displayed when the wireless adapter is disconnected from the network access point. Disconnect from access point due to failed association. Disconnect from access point due to authentication failures. Disconnect from access point due to TKIP Michael Integrity Check failure. Disconnect from access point due to Class 2 frame non-authentication failure. Disconnect from access point due to Class 3 frame non-association failure. Disconnect from access point due to re-association failure. Disconnect from access point due to Information Element failure. Disconnect from access point due to EAPOL-Key protocol 4-way handshake failure. Disconnect from access point due to 802.1X authentication failure. Recommended action:
Manually reconnect or verify network settings stored in profile then remove the access point from the Exclude list. For example, on the WiFi connection utility main window, click Profiles to open the Profiles list. Select the profile and click Connect. The application failed to start The application that you specified to start when this profile connected, could not be found. Verify the path and file name in the Profile Wizard Advanced Settings. To verify the path and file name:
1. From the WiFi connection utility main window, click Profiles. 2. Select the Profile. 3. Click Properties. 4. Click Advanced. 5. Click Start Application. 6. Click Enable Auto Launch. Verify that the file name and file location path are correct. 7. Click OK to close the Advanced Settings. 8. Click OK to close the General Settings and return to the Profiles list. No certificate found This error may occur if a machine certificate or a user certificate was not found in the relevant certificate store. To resolve, perform the following steps:
1. Verify that a valid machine or user certificate is present in the machine or user certificate store, depending on the type of profile you are using. 2. If a valid certificate is not present in the store, request a valid machine or user certificate from the domain's Certificate Authority. Note that the computer needs to be joined to a domain in order to be eligible to get a machine certificate from the domain's Certificate Authority. 3. Contact your Administrator for assistance. Authentication failed due to invalid user name: Reenter user name This authentication error can be caused by an invalid user name when using either TTLS, PEAP, LEAP, or EAP-SIM profiles. Use the following steps to resolve this error:
1. Select the appropriate profile from the Profiles list. 2. Click Properties. 3. Click Next. 4. Select the appropriate 802.1X Authentication Type. l For TTLS, PEAP and EAP-FAST profiles: Select Use the following for User Credentials. m Verify the User Name information. m If Use Windows logon or Prompt each time I connect is selected, verify that the correct user credentials information is used when you connect to the wireless network. NOTE: This option is only available if you have the Single Sign On Pre-logon Connect component installed. l For LEAP profiles: Select Use the following user name and password and verify the user name information. If Use Windows logon user name and password or Prompt for user name and password is selected, make sure that the correct user credentials information is used when you connect to the wireless network. l For EAP-SIM authentication type: Verify that the correct user name is being used under Specify user name (identity). 5. To save the settings, click OK. Authentication failed due to invalid user credentials: Reenter credentials This authentication error can be caused by invalid user credentials when using either TTLS, PEAP, LEAP or EAP-FAST profiles. Use the following steps to resolve this error:
1. Select the appropriate profile from the Profiles list. 2. Click Properties to open the General Settings. 3. Click Next to open the Security Settings. Enterprise Security is selected. 4. The 802.1X Authentication Type should be selected. 5. Select Use the following for User Credentials. 6. Verify the User Name, Domain, and password information. m If Use Windows logon or Prompt each time I connect is selected, verify that the correct user credentials information is used when you connect to the wireless network. 7. Click OK to save the settings. Authentication failed due to an invalid user certificate: Select another certificate This authentication error can be caused by an invalid user certificate. Use the following steps to resolve this error:
1. Select the appropriate profile from the Profiles list. 2. Click Properties to open the General Settings. 3. Click Next to open the Security Settings. Enterprise Security is selected. 4. Select the appropriate Authentication Type. 5. For TLS User: You can select to Use the certificate issued to this computer. Or you can click Use a user certificate on this computer. Then click Select and choose another user certificate from the list of installed certificates. 6. Click OK. 7. Click OK to save the settings. Notes about Certificates: The specified identity should match who the certificate is issued to and should be registered on the authentication server (for example, RADIUS server) that is used by the authenticator. Your certificate must be valid with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in with the same user name you used when the certificate was installed. Your certificate will expire soon This message applies to Windows XP* users only. This certificate you are using in your profile will expire soon. This message does not imply connection failure, but is instead a warning intended to help you avoid connection failure in the future. The time left from when this message is first displayed, until the certificate expires, is set by the Administrator. Use the following steps to resolve this error:
1. In the Intel Wireless Troubleshooter window, click on the link to update your certificate. If you are not able to obtain a new certificate, contact your Administrator. Authentication failed due to invalid server identity: Reenter server name This authentication error can be caused by invalid server identity information. Use the following steps to resolve this error:
1. Select the appropriate profile from the Profiles list. 2. Click Properties to open the General Settings. 3. Click Next to open the Security Settings. Enterprise Security is selected. 4. Click Next. 5. On this screen, if you have selected Validate Server Certificate, then under the Certificate Issuer drop down menu, be sure you have selected the correct issuer. Or if you have selected to Specify Server or Certificate Name, be sure that a valid server of certificate name is entered. Or if you have selected Any trusted CA, be sure that the CA certificate is installed in the Trusted Root CA store. 6. Click OK to save the settings. Authentication failed due to invalid server credentials: Reenter server credentials This authentication error can be caused by an invalid server (domain) credential. Use the following steps to resolve this error:
1. Select the appropriate profile from the Profiles list. 2. Click Properties to open the General Settings. 3. Click Next to open the Security Settings. Enterprise Security is selected. 4. Select the appropriate 802.1X Authentication Type. l For TTLS, PEAP and EAP-FAST profiles: Select Use the following for User Credentials. l Verify the Domain information. l If Use Windows logon user name or password or Prompt for the user name and password is selected, verify that the correct domain credentials information is used when you connect to the wireless network. NOTE: This option is only available if you have the Single Sign On Pre-logon Connect component installed. l For LEAP profiles: Select Use the following user name and password and verify the domain is correct. If Prompt for the user name and password is selected, verify that the correct domain and password information is entered when you connect to the wireless network. (Must match what appears on the Security settings window.) 5. To save the settings, click OK. Authentication failed due to an invalid server certificate: Select another certificate This authentication error can be caused by an invalid server certificate. Use the following steps to resolve this error:
1. Select the appropriate profile from the profiles list. 2. Click Properties. 3. Click Next to open the Security Settings. Enterprise Security is selected. 4. Select the appropriate 802.1X Authentication Type. l For TTLS and PEAP profiles: Verify that the correct Authentication Type is selected from the list. Click Next to select another certificate from the list of installed certificates or specify another server or certificate name. Click OK. l For TLS profiles: Click Select and choose another certificate from the list of installed certificates and click OK. 6. To save the settings, click OK. Notes about certificates: The specified identity should match who the certificate is issued to and should be registered on the authentication server (for example, RADIUS server) that is used by the authenticator. Your certificate must be valid with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in with the same user name you used when the certificate was installed. Authentication failed because the AAA server is unavailable The wireless adapter is associated to the access point, but the 802.1X authentication cannot be completed because of a response from the authentication server. Use the following steps to resolve this error:
1. Select the profile 2. Click Connect and attempt to associate with the network and authenticate with the server. The AAA Server rejected the EAP method This error occurs when the AAA Server does not accept the configured authentication. Use the following steps to resolve this error:
1. Double-click the Taskbar icon to open the WiFi connection utility. 2. Click Profiles on the WiFi connection utility main window. 3. Select the associated or last-used profile from the Profiles list. 4. Click Properties to open the General Settings. 5. Click Next to open the Security Settings. 6. Verify that Enable 802.1X is selected. 7. Verify that the correct authentication type is selected. 8. Enter the required security information. 9. Click OK. The profile is now reapplied. The WiFi connection utility attempts to connect to the wireless network. Incorrect PIN for retrieving certificate: Reenter PIN The certificate retrieval failed because of an incorrect PIN. Recommended action: Enter the correct PIN. Error occurred because the GSM adapter was unexpectedly removed This error occurs when the GSM adapter is not fully inserted or is unexpectedly removed from the mobile station. Use the following steps to resolve this error:
1. Reinsert the GSM adapter. 2. Double-click the Intel PROSet/Wireless WiFi Software icon at the bottom right of the screen. 3. Select the associated or last-used profile from the profiles list. 4. Click Connect. The profile is now re-applied. The WiFi connection utility attempts to connect to the wireless network. Smart Card was unexpectedly removed This error occurred because the Smart Card was unexpectedly removed. Use the following steps to resolve this error:
1. Insert the Smart Card. 2. Select the 802.1X EAP-SIM authentication profile. 3. Click Connect to try to associate with the network. Authentication failed because timer expired Authentication failed because the authentication timer expired while this mobile station was authenticating. A Rogue access point or a problem with the RADIUS server could have been the reason for the problem. Recommended action:
l If a rogue access point is suspected, consider adding this access point to the excluded access point list to prevent the wireless adapter from connecting to this access point in the future. l If a rogue access point is not suspected, click the profile in the Profiles list. Click Connect to associate with the network and attempt to authenticate with the server. An administrator profile failed to authenticate This error occurs when the credentials in the profile are not accepted by the authenticator
(for example, an access point or AAA server). Please contact your Administrator to resolve this problem. Administrator profile did not receive an IP address The wireless adapter failed to get a valid IP address. The wireless security password or encryption key does not match the one used by the access point. Other causes are: the wireless network requires a static IP address; there is a problem with the DHCP server; or, a general network problem. To clear this message, contact your network administrator to help set up your wireless connection. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Manual Diagnostics Tool The Manual Diagnostics Tool lets you run a set of diagnostics tests that verify the functionality of your wireless adapter. There are two levels of diagnostics details represented in this tool: user level and technical support level. At the user level, the tool only shows a short description of the different diagnostics steps that are being taken and only shows a pass or fail indication for each step. The technical support level includes the creation of a log file which contains detailed information on all the executed tests. This log file can be saved to a text file and emailed to a technical support department to troubleshoot connection problems. Using the Manual Diagnostics Tool To open the Manual Diagnostics tool:
l For computers running Windows XP*, first open the Intel(R) PROSet/Wireless WiFi Connection Utility. Then under the Tools menu, click Manual Diagnostics tool. l For computers running Windows Vista*, click Start > All Programs > Intel PROSet Wireless > WiFi Manual Diagnostics. To set the log file location:
1. Inside the Manual Diagnostics tool, click File. 2. Click Settings. The log file named WirelessDiagLog.csv contains the results of the tests. It is saved as a text file and can be used to troubleshoot network connectivity issues. 3. Click Browse to specify where you want the log file to be saved. 4. Click OK to apply your changes and return to the Manual Diagnostics Tool. The next time you run the tests, the log file will be save to your specified location. To run the tests:
1. Click the check box next to each test to select the test to run. 2. Click Run Tests to run the selected tests. The test results will be saved to a file named WirelessDiagLog.csv. 3. Click Close to close the Manual Diagnostics Tool. Available Tests Name Hardware Test Description The test passes if the wireless adapter is present and accessible. The test fails if the adapter is not present or present but disabled. The test summary displays whether the wireless hardware is enabled or disabled. Troubleshooting l Verify that your adapter is listed under Network adapters in the Device Manager. l If the adapter is not listed, right-click Network adapters and select Scan for hardware changes. You can also reboot your system. l Verify that your adapter is enabled in the Device Manager. When the adapter is disabled, a red X is displayed on the device. Right-click the adapter and select Enable from the menu. l When the adapter displays a yellow exclamation point, right-
click the adapter and reinstall the driver. l Contact your computer manufacturer for other troubleshooting options. Driver Test The test summary displays the Intel(R) PRO/Wireless Network Connection driver supported by the wireless adapter. The test verifies if the driver binary version is compatible with the installed version of the WiFi connection utility. The test fails if the driver binary is not found or if the driver version does not match the WiFi connection utility software version (for example, version 11.1.x.x and driver version 9.0.x.x, 9.1.x.x, or 11.1.x.x). Troubleshooting l Reinstall the drivers using the WiFi connection utility. Radio Test The test summary displays Radio On or Radio Off. The test queries the current radio state. If the radio is switched on, the test passes. If the radio is off, the test fails. Troubleshooting Verify that your wireless adapter's radio is on. There are two methods to turn the radio on and off:
l The hardware switch l The WiFi On/WiFi Off button in the WiFi connection utility main window. See Turn On or Off the Wireless Radio for more information. Scan Test The test queries the wireless networks within range of your wireless adapter. The test passes if networks can be seen in the scan list. The Test Summary displays the number of networks available to connect to. Troubleshooting l Verify that you are within range of an access point. l Switch the wireless radio to off and back to on. l Verify that the wireless band setting matches the access point band setting. l Switch the access point to off and back to on. Association Test The test summary displays Associated or Not Associated. Association is the establishment and maintenance of the wireless link between devices. When security is enabled, the devices only exchange security credentials. The test checks for wireless connectivity. The test passes if the client is associated successfully. Troubleshooting l When the access point signal strength is low, use the signal test listed below. l Verify that a profile has been created. If created:
m Verify that the profile SSID matches the access point Network Name (SSID). m Remove the profile and create a new profile. l Verify that your wireless network is not included in the l Verify that the MAC address has not been excluded in the Exclude (profiles) List. access point. Authentication Test Describes the process after association, during which the identity of the wireless device or end-user is verified and then allowed network access. The test queries for authentication state information, including all Cisco Compatible Extensions and security-related information. The test passes if the client is authenticated successfully. The test fails if the WEP key or other credentials are not authenticated. The Test Summary displays whether authentication is required for the network connection. Troubleshooting l Edit your profile to ensure the correct credentials have been used for the WEP key, PSK, password or certificates. l Remove the existing profile and create a new profile. Signal Test The test summary displays the signal quality. If the signal quality is low, use the Troubleshoot button to diagnose and fix the problem. Troubleshooting l Move your computer 10 to 20 feet from the wireless access point or router. l Reduce interference by moving away from appliances
(microwaves, cell phones or 2.4 GHz phones) or access points using the same channel. l Try increasing the transmission power of the access point. Ping Test The test verifies whether the wireless adapter successfully sent messages to and received replies from the access point IP address, default gateway, DHCP server (if enabled) and DNS servers. The test summary displays whether replies from these entities were received. Example: Response: AP, default gateway. No Response: DHCP server NOTE: If the ping tests to this access point and default gateway are successful but the ping test to the DNS server fails this is not a wireless network issue but a general network issue. Troubleshooting l Disable the security firewall and try the ping test again. l Contact the access point manufacturer to troubleshoot your home network. l Enterprise users should contact their network administrator. Troubleshoot Run Tests Close Help?
Diagnose and fix problems displayed by each of the tests. The Troubleshoot button becomes active if the test fails. Executes the tests that you have selected. Closes the page. Provides help information for this page. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Adapter Settings (Advanced tab) The Adapter Settings, advanced tab, displays the device properties for the wireless adapter installed on your computer. It may be one of the following network connection adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) Wireless WiFi Link 4965AG_ l Intel(R) PRO/Wireless 3945ABG Network Connection l Intel(R) PRO/Wireless 2915ABG Network Connection l Intel(R) PRO/Wireless 2200BG Network Connection. For Windows XP* users, to see the adapter settings, on the Advanced Menu click Adapter Settings. Select the Advanced tab. Adapter Settings Description Name Description 802.11n Channel Width (2.4 GHz) 802.11n Channel Width (5.2 GHz) Set high throughput channel width to maximize performance. Set the channel width to Auto or 20Mhz. Auto is the default setting. Use 20MHz if 802.11n channels are restricted. NOTE: This setting is available only if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN Set high throughput channel width to maximize performance. Set the channel width to Auto or 20Mhz. Auto is the default setting. Use 20MHz if 802.11n channels are restricted. NOTE: This setting is available only if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN 802.11n Mode Ad Hoc Channel The 802.11n standard builds on previous 802.11 standards by adding multiple-input multiple-output
(MIMO). MIMO increases data throughput to improve transfer rate. Select Enabled or Disabled to set the 802.11n mode of the adapter. Enabled is the default setting. An administrator can enable or disable support for high throughput mode to reduce power-
consumption or conflicts with other bands or compatibility issues. NOTE: This setting is available only if the adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting. Unless the other computers in the ad hoc network use a different channel from the default channel, there is no need to change the channel. Value: Select the permitted operating channel from the list. l 802.11b/g: Select this option when 802.11b and 802.11g (2.4 GHz) ad hoc band frequency is used. l 802.11a: Select this option when 802.11a (5 GHz) ad hoc band frequency is used. NOTE: When an 802.11a channel is not displayed, initiating ad hoc networks is not supported for 802.11a channels. Ad Hoc Power Management Set power saving features for device to device (ad hoc) networks. l Disable: Select when connecting to ad hoc networks that contain stations that do not support ad hoc power management l Maximum Power Savings: Select to optimize battery life. l Noisy Environment: Select to optimize performance or connecting with multiple clients. Ad Hoc QoS Mode NOTE: This setting is only available if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) PRO/Wireless 3945ABG Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic from the access point over a wireless LAN based on traffic classification. WMM (Wi-Fi Multimedia) is the QoS certification of the Wi-Fi Alliance (WFA). When WMM is enabled, the adapter uses WMM to support priority tagging and queuing capabilities for Wi-Fi networks. l WMM Enabled (Default) l WMM Disabled NOTE: This setting is only available if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) PRO/Wireless 3945ABG Fat Channel Intolerant HD Mode Mixed mode protection This setting communicates to surrounding networks that this wireless adapter is not tolerant of 40MHz channels in the 2.4GHz band. The default setting is for this to be turned off (disabled), so that the adapter does not send this notification. NOTE: This setting is available only if the adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN NOTE: This setting is only available to the user and is not available for export in an administrator package. In a wireless network environment where several access points are nearby, this feature will reduce interference and improve your wireless connection. The default setting is for this to be turned off
(disabled). NOTE: This setting is available only if the adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN Use to avoid data collisions in a mixed 802.11b and 802.11g environment. Request to Send/Clear to Send (RTS/CTS) should be used in an environment where clients may not hear each other. CTS-to-self can be used to gain more throughput in an environment where clients are in close proximity and can hear each other. Power Management Lets you select a balance between power consumption and adapter performance. The wireless adapter power settings slider sets a balance between the computer's power source and the battery. l Use default value: (Default) Power settings are based on the computer's power source. l Manual: Adjust the slider for the desired setting. Use the lowest setting for maximum battery life. Use the highest setting for maximum performance. Preamble Mode NOTE: Power consumption savings vary based on Network (Infrastructure) settings. Changes the preamble length setting received by the access point during an initial connection. Always use Auto Tx Preamble to provide optimal network throughput. Auto Tx Preamble allows automatic preamble detection. If supported, short preamble should be used. If not, use Long Tx Preamble. NOTE: This setting is only available if the adapter is an Intel(R) PRO/Wireless 2915ABG Network Connection or an Intel(R) PRO/Wireless 2200BG Network Connection. Roaming Aggressiveness This setting lets you define how aggressively your wireless client roams to improve connection to an access point. l Default: Balanced setting between not roaming and performance. l Lowest: Your wireless client will not roam. Only significant link quality degradation causes it to roam to another access point. l Highest: Your wireless client continuously tracks the link quality. If any degradation occurs, it tries to find and roam to a better access point. Throughput Enhancement Changes the value of the Packet Burst Control. l Enable: Select to enable throughput enhancement. l Disable: (Default) Select to disable throughput enhancement. Transmit Power Default Setting: Highest power setting. Lowest: Minimum Coverage.: Set the adapter to the lowest transmit power. Enables you to expand the number of coverage areas or confine a coverage area. Reduces the coverage area in high traffic areas to improve overall transmission quality and avoids congestion and interference with other devices. Highest: Maximum Coverage.: Set the adapter to a maximum transmit power level. Select for maximum performance and range in environments with limited additional WiFi radio devices. NOTE: The optimal setting is for a user to always set the transmit power at the lowest possible level that is still compatible with the quality of their communication. This allows the maximum number of wireless devices to operate in dense areas and reduce interference with other devices that it shares the same radio spectrum with. NOTE: This setting takes effect when either Network (Infrastructure) or Device to Device (ad hoc) mode is used. Wireless Mode Select which mode to use for connection to a wireless network:
l 802.11a only: Connect the wireless adapter to 802.11a networks only. l 802.11b only: Connect the wireless adapter to 802.11b networks only. l 802.11g only: Connect the wireless adapter to 802.11g networks only. l 802.11a and 802.11g: Connect the wireless adapter to 802.11a and 802.11g networks only. l 802.11b and 802.11g: Connect the wireless adapter to 802.11b and 802.11g networks only. l 802.11a, 802.11b, and 802.11g: (Default)
- Connect to either 802.11a, 802.11b or 802.11g wireless networks. NOTE: These wireless modes (Modulation type) determine the discovered access points displayed in the WiFi Networks list OK Cancel Saves settings and returns to the previous page. Closes and cancels any changes. Microsoft Windows* Advanced Options (Adapter Settings) To access the Windows XP* Advanced options:
1. Start Windows and log on with administrative privileges. 2. From your desktop, right-click My Computer and click Properties. 3. Click the Hardware tab. 4. Click Device Manager. 5. Double-click Network adapters. 6. Right-click the name of the installed wireless adapter that is in use. 7. Click Properties. 8. Select the Advanced tab. 9. Select the Property you want (for example, Mixed Mode Protection, Power Management). 10. To select a new value or setting, click Use default value to clear the checkbox. Then select a new value or setting. To return to the default value, click the Use default value checkbox. (The Use default value box is not present for all properties, for example, Ad Hoc Channel. In this case, simply select the setting you want.) 11. To save your settings and exit the window, click OK. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Advanced Statistics (Advanced menu) The Advanced Statistics provides current adapter connection information. This information defines how the adapter communicates with an access point. At the Advanced menu, click Advanced Statistics to access. Advanced Statistics Description Name Statistics Description Advanced Statistics: This information pertains to how the adapter communicates with an access point. Association: If the adapter finds an access point to communicate with, the value is in range. Otherwise, the value is out of range. l AP MAC Address: The twelve-digit MAC address
(00:40:96:31:1C:05) of the access point. l Number of associations: The number of times the access point has found the adapter. l AP count: The number of available access points within range of the wireless adapter. l Number of full scans: The number of times the adapter has scanned all channels for receiving information. l Number of partial scans: The number of scans that have been terminated. Roaming: This information contains counters that are related to reasons for the adapter roaming. Roaming occurs when an adapter communicates with one access point and then communicates with another for better signal strength. l Roaming count: The number of times that roaming occurred. l AP did not transmit: The adapter did not receive radio transmission from the access point. You may need to reset the access point. l Poor beacon quality: The signal quality is too low to sustain communication with the access point. Either you have moved the adapter outside the coverage area of the access point or the access point's device address information has been changed. l AP load balancing: The access point ended its association with the adapter based on the access point's inability to maintain communication with all its associated adapters. Too many adapters are trying to communicate with one access point. l AP RSSI too low: The Receive Signal Strength Indicator
(RSSI) is too low to maintain an association with the adapter. You may have moved outside the coverage area of the access point or the access point could have increased its data rate. l Poor channel quality: The quality of the channel is low and caused the adapter to look for another access point. l AP dropped mobile unit: The access point dropped a computer from the list of recognizable mobile devices. The computer must re-associate with an access point. Miscellaneous: Use this information to determine if an association with a different access point increases performance and helps maintain the highest possible data rate. l Received beacons: Number of beacons received by the l Percent missed beacons: Percent value for missed adapter. beacons. l Percent transmit errors: The percentage of data transmissions that had errors. l Signal Strength: Signal strength of the access point that the adapter communicates with displayed in decibels
(dBm). Transmit/Receive
(Tx/Rx) Statistics Displays percent values for non-directed and directed packets. Total host packets: The total number of directed and non-
directed packets counts. l Transmit - (Mbps) l Receive - (Mbps) l Non-directed packets: The number of received packets broadcast to the wireless network. l Directed packets: The number of received packets sent specifically to the wireless adapter. l Total Bytes: The total number of bytes for packets received and sent by the wireless adapter. Logging Set the duration that you want to record statistical data for your wireless adapter. Configure logging settings: Click Settings to set how frequently you want to log the statistics. You can set the number of seconds and how many hours you want the statistics to be logged. To change the storage location of the log file. 1. Click Browse to specify a new log file location. The current path is displayed. The default location is in the Intel PROSet/Wireless WiFi program files directory. 2. Click Open to close and apply the new file path. 3. Click Close to exit Advanced Statistics. Start/Stop Logging: Click this button to start and stop logging. When you click Start logging, statistical information (described above) is accumulated. When you click Stop Logging, the accumulation ends and this information is saved to a file that you can open and view. View Log File...: Click this button to open the Wireless folder under Program Files/Intel (this is the default location). Log files are named using the month, day, and year, plus the number of the log created on that day. For example: 03122007_001.htm. The log file provides:
l Date and Time l Adapter Information l Connection Information l Transmit/Receive Statistics Reset Stats Close Help?
NOTE: An administrator can disable this feature. Resets the adapter statistical counters back to zero and begins making new data measurements. Closes and returns to the main window. Provides help information for this page. For information about importing/exporting user-created profiles, see Import or Export Profiles. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Exclude List Management The Exclude list is a list of networks that you will not automatically be connected to. This feature lets you restrict automatic access to a listed network or access point, even if you have created a profile for that network. Use Exclude List Management to exclude entire wireless networks (SSID). There are two ways to access the Exclude List Management screen:
l Click Manage Exclusions at the Profiles menu, or l At the main window, select a network and click the Properties button. Then click Manage Exclusions. NOTE: If an administrator has designated a network for exclusion, only an administrator using the Administrator Tool may remove the network from the Exclude List. NOTE: Administrators can exclude profiles from the Administrator Tool. See Administrator Tool. This icon following icon on the WiFi Networks list indicates that a network has been excluded. Description Name Network Name Name (SSID) of the wireless network. Radio MAC Address Displays the band if there is a DHCP error. The MAC address of the access point, or all access points or stations in the network. The source of the exclusion, the User. Reason Details Click Details to learn specific information on how the access point was excluded and how to remove it from exclusion. Following is an example:
This network has been excluded from automatic connection for the following reasons. l User has excluded this network manually. To make this network (or access points) eligible for automatic connection again, select it and click the Remove button. NOTES:
l The Reset list button removes all entries except rogue and administrator excluded access points from the list. l Rogue access points are removed from the list when a connection is made to this access point using valid credentials. l All excluded access points in a network (other than rogue and administrator excluded) are removed from the list when a profile for that network is applied manually. Add Entries that are dimmed are excluded rogue or administrator excluded access points. Rogue or administrator excluded access points cannot be removed from the list manually. Click the Add button to enter the network name (SSID) that you want to add to the Exclude List. 1. Network Name: Enter the network name. 2. Click OK. Remove Remove an entry from the list. 1. Select the entry from the list. 2. Click Remove. 3. You are asked: Do you want to remove the selected item from the Exclude List?
4. Click Yes to remove the profile from the list. Reset list Close Help?
Removes all of the networks and access points from the Exclude List. Closes and saves settings. Provides help information for this page. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Turn WiFi Radio On or Off To switch the wireless radio on or off, use one of the following methods:
l The optional hardware radio switch on your computer l Intel(R) PROSet/Wireless WiFi Connection Utility l Microsoft Windows NOTE: When your computer is switched on, the radio is constantly transmitting signals. In certain situations, as in an airplane, signals from the radio may cause interference. Use the following methods if you need to turn off the radio and use your notebook without emitting radio signals. Use the Optional Computer Radio on or off Switch If your computer has an external switch installed, use it to switch the radio on or off. See the computer manufacturer's documentation for more information about this switch. If you have Intel PROSet/Wireless WiFi software installed, the current state of the radio displays in the WiFi connection utility main window and on the Taskbar. Use Intel PROSet/Wireless WiFi to Switch the Radio on or off From Intel PROSet/Wireless WiFi software, the radio can be switched on or off. The status icon on Intel PROSet/Wireless WiFi displays the current state of the radio. From the Intel PROSet/Wireless WiFi main Window, click WiFi On / WiFi Off to toggle the radio on or off. Switch the radio on or off from the Taskbar Icon To switch the radio on or off, click the Taskbar icon and select WiFi On / WiFi Off. Use Windows to turn on or off the Radio The radio can be turned off using Windows. NOTE: If you turned off the radio from Microsoft Windows, then you must use Microsoft Windows to turn the radio on. You cannot use a hardware switch or the WiFi connection utility to enable the radio if the radio has been turned off using Windows. Windows XP 1. At the Start Menu, click Connect to. Right click Wireless Network Connection and select Disable. 2. Or if you have more than one wireless adapter, at the Start Menu, click Connect to >
Show all connections. Right click the desired adapter and select Disable. You can use the same method to turn the radio back on. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Application Settings (Administrator Tool) An administrator can configure the Intel(R) PROSet/Wireless WiFi Connection Utility software application settings to control how the application behaves on the user's computer, and to select what level of control users have over various aspects of their wireless connections. These settings are configured using the Administrator Tool, and are not the same as those listed under the Tools Menu. To configure Application Settings:
1. Click Include Application Settings in this package. 2. Select the settings that you want. Some settings require more information. Each setting is listed in the next table. Name 802.1X Authentication Description Enable a user to create or connect to profiles that support different 802.1X authentication EAP types. AAA In Control Adapter Switching Select which 802.1X authentication EAP types you want enabled on a users computer: EAP LEAP, EAP PEAP, EAP TLS, EAP SIM, EAP TTLS, EAP FAST, EAP AKA. Notify when another application uses the wireless adapter. If enabled, then whenever a valid wired Ethernet connection is detected, the WiFi connection utility will automatically close any wireless network connections and turn off the wireless radio. If the system looses its wired Ethernet connection, the WiFi connection utility will automatically turn on the wireless adapter radio and attempt to connect to the last connected profile. If the last connected network is not available, the WiFi connection utility will attempt to connect to the first available wireless network based on the preferred Profile List. NOTE: This behavior is for the system as a whole and is not specific to any user. Administrator Tool Application Auto Launch Application On Radio Toggle CCXv4 NOTE: If the user has manually turned off the wireless radio, the radio will not turn on again when an wired Ethernet connection is lost. The user must turn the radio back on for wireless connections to be established. Disable access to the Administrator Tool on a users computer. Select to start a batch file, executable file, or script automatically when a specific profile connects to the network. For example, start a Virtual Private Network (VPN) session automatically whenever a user connects to a wireless network. Enables a third-party application to disable the Intel
(R) PROSet/Wireless WiFi Connection Utility, WiFi On / WiFi Off button. Select Enable CCXv4 to Enable Cisco Compatible Extensions, version 4 (CCXv4) features for EAP-
FAST profiles. NOTE: The EAP-FAST Authority Identifier (A-ID) Groups feature in the Administrator Tool is unavailable if CCXv4 is not enabled. Select which of the following prompts to enable or disable on a user's computer for EAP-FAST PAC provisioning:
Turn off prompts and warnings for unauthenticated provisioning: Option to turn off prompts and warnings for PAC auto-provisioning if there is no PAC or there is no PAC that matches the A-ID sent by the server that it is connected to. Turn off prompts when switching default server (A-ID): Option to turn off prompts when a client encounters a server that has provisioned a PAC before but is not currently selected as the default server. Turn off unauthenticated provisioning after PAC is provisioned: Option to turn off auto-
provisioning automatically after a PAC for that A-ID has been provisioned. Cache Credentials Certificate Expiry Warning Device to Device
(ad hoc) NOTE: This feature is installed through an Administrator Package when a user's computer has one of the following adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) Wireless WiFi Link 4965AG_ l Intel(R) PRO/Wireless 3945ABG Network Connection Select to save credentials after a user logs on. If the wireless connection temporarily disconnects, the saved credentials are used upon reconnection. The credentials are cleared when the user logs off. NOTE: if cleared, the Prompt each time I connect option is unavailable when creating profiles If specified, the WiFi connection utility will warn users when the certificates are going to expire. The provided URL will allow them to update their certificates from a certificate server. Enable or disable whether a user is able to either create Device to Device (ad hoc) profiles or join Device to Device (ad hoc) networks. Select one of the following to enable or disable whether the user can connect to device to device networks:
l Enable device to device networking l Enable only secure device to device networking l Disable device to device networking Select to either allow a user to configure profiles with device to device (ad hoc) settings or prevent configuration of Device to Device (ad hoc) profiles. l Show device to device application settings l Hide device to device application settings To remove the Device to Device (ad hoc) operating mode from the Create Wireless Profile General Settings, select both Disable device to device networking and Hide device to device application settings. This prevents a user from creating profiles that support Device to Device (ad hoc) network. Select to import to or export profiles from a users computer. Enable permits auto import of user profiles when copied to an auto import folder. Select to hide the Maintain Connection option in the Create Wireless Profile Advanced Settings. This Maintain Connection option maintains the wireless connection with a user profile after log off. NOTE: The Maintain Connection option may be used with Nortel VPN client when it is configured to Logoff on Connect. Select to maintain the connection if the smart card is removed while the wireless device is connected to a network that uses smart card credentials. The default behavior for the WiFi connection utility is to close the connection that uses smart card credentials if the smart card is removed. Turning this feature On will cause the connection to remain connected (unless re-authentication is required for another reason). Select to maintain a connection if the smart card is removed while the wireless device is connected to a network using smart card/SIM credentials. NOTE: This setting is not available for Windows Vista* client profiles. Enables a third-party application to notify a user that the WiFi connection utility radio is either on or off. Import and Export Maintain Connection Maintain SmartCard Connection Message On Radio Toggle Microsoft Windows XP Coexistence Select Enable Microsoft Wireless Zero Configuration and Intel PROSet/Wireless WiFi to coexist on this system. Persistent Connection Pre-logon Cisco Mode Profile Connectivity Enable this option to allow Microsoft Wireless Zero Configuration and the WiFi connection utility to exist together on this system. When you select this option, you prevent Microsoft Windows XP Wireless Zero Configuration Service from being disabled when the WiFi connection utility is enabled. Select Ensure that persistent connection and computer policies are updated prior to user log on. NOTE: Updating policies may delay the log on screen for up to two minutes. Enable Cisco Mode during a Pre-logon connection. Cisco access points have the capability to support multiple wireless network names (SSIDs) but only broadcast one. In order to connect to such an access point, an attempt is made to connect with each profile. This is referred to as Cisco Mode. NOTE: The Pre-logon connection may increase the connection time. Control profile connection by the user. Disable user-profile switching. Leaving this setting Off lets the user connect to both user and administrator profiles. By turning this setting On, the user can only connect to administrator profiles. The administrator also chooses which administrator profiles are available to the user, as follows:
l Allow the user to connect to All administrator profiles. l Allow the user to only connect to the First administrator profile. Security Level Select the security level on a user's computer. Users are able to connect to profiles only with this security level. l Allow the user to connect to networks with Personal Security only. Shared Folder Notification Select the shared folder notification setting on a user's computer. l Unshare shared folders automatically when connected to an unsecured network. l Disable this notification. l Notify when connected to an unsecured network (default). Single Sign On Select which Administrator Profile types are enabled on a user computer. l Persistent Connection : Profiles are active during start up and when no user is logged onto the computer. l Pre-logon or Common Connection: Profiles are active immediately once a user logs onto the computer. Common profiles are enabled if Pre-logon or Common features are not installed on a users computer. Common profiles are active after a user has logged on and the session becomes active. Persistent and Pre-logon or Common profiles are placed at the top of the users profiles list. They cannot be changed or deleted by a user. Support Information Specify the support information displayed in the About box of the WiFi connection utility. Voice over IP Wi-Fi Manager l Support URL: Enter the support center web site that you want your customers to access for technical support. l Support Phone Number: Enter the telephone number that you want your customers to call for technical support. Enables third-party software to use the VoIP application on a user's computer. The default setting enables this feature. NOTE: This feature is installed through an Administrator Package when a user's computer has one of the following adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) Wireless WiFi Link 4965AG_ l Intel(R) PRO/Wireless 3945ABG Network Connection Select which Wi-Fi manager controls a user's wireless connections. Use either the previous logged on user's Wi-Fi manager or allow each user to select their preferred Wi-Fi manager. l Allow all users to switch between the WiFi connection utility and Microsoft Windows XP Wireless Zero Configuration after log on. l The Wi-Fi manager at log on is determined by the active Wi-Fi manager when the last user logged off. Wi-Fi Protected Setup*
The WiFi connection utility can be configured to operate as a registrar for a Wi-Fi Protected Setup supported access points. The registrar securely transfers the access point key or password automatically or manually with a USB flash drive or other external device. l Enable registering other devices (default). l Hide Enable Device Registration application setting. Select to enable the WiFi connection utility to register other devices. Also select to hide the Enable Device Registration setting in the WiFi connection utility application settings to block user to change the settings. NOTE: This feature is installed through an Administrator Package when a user's computer has one of the following adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) Wireless WiFi Link 4965AG_ l Intel(R) PRO/Wireless 3945ABG Network Connection WiFi On/Off Control the wireless radio. l No change: The radio is not turned on or off. l Turn WiFi Off: The profile turns the radio off. l Turn WiFi On: The profile turns the radio on. l Turn off 802.11a radio only: This becomes selectable if Turn WiFi On is enabled. l Disable WiFi On/Off selection: Select to prevent a user from accessing the WiFi On/
Off control on the WiFi connection utility main window or Taskbar menu. A user is notified that The feature is disabled by the administrator if they attempt to turn on or off the radio control. l Add 802.11a Radio On/Off selection:
Select to allow the user to turn on/off the 802.11a radio separately from the 802.11b/g radio. If you select this, the Disable 802.11a Radio On/Off selection becomes available. Select this to show the 802.11a radio On/Off control, but disable it. This lets you give the user individual control over the radios. Once this feature is installed on a user's computer, follow the instructions below to turn on or off the 802.11a radio control. To turn off the 802.11a radio:
1. On the WiFi connection utility main window, click the WiFi On button. The list of radio options is displayed. 2. Select 802.11a Radio Off. The 802.11a radio is now inactive. To turn on the 802.11a radio:
1. On the WiFi connection utility main window, click the 802.11a Radio Off button. The list of radio options is displayed. 2. Select WiFi On. The 802.11a radio is now active. NOTE: The option Add 802.11a Radio On/Off selection is available only for wireless adapters that support 802.11a, 802.11b and 802.11g. This feature is not installed through an Administrator Package when a user's computer has an Intel(R) PRO/
Wireless 2200BG Network Connection. Closes the Administrator Tool. Provides help information for this page. Close Help?
Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Advanced Settings Use the Advanced Settings to password protect a profile, select a specific access point on a network to connect to, start an application or auto import a profile. Click the Advanced button on the Create Wireless Profile General Settings to access. Name Auto Connect Description Automatic (Default): Select to have the Intel(R) PROSet/
Wireless WiFi Connection Utility connect automatically to this profile when it is in range. On Demand: Select to prevent automatic connection of a profile when the network is in range. For example, if there is a cost for a wireless connection and you did not want to connect automatically when in range. In the WiFi Networks list and in the Profiles list, the network will be noted with this icon, indicating On Demand connection (also called manual connection). To connect to the network:
1. Select the network from the WiFi Networks list. 2. Click Connect. Allows a network administrator to easily move the selected profile to other computers. When the exported file is placed in the Wireless\AutoImport directory on another computer, the WiFi connection utility automatically imports the profile. NOTE: This feature is only available when configuring a user profile. It is not available when configuring Administrator Profiles. Auto Import Band Selection Here you can select the band to use for this connection profile:
l Mixed Band: Select this to the have WiFi connection utility attempt to connect this profile to an available network with either of the two bands. l 2.4 GHz band: Select this to have the WiFi connection utility attempt to connect this profile to an available network using only the 2.4 GHz band. l 5.2 GHz band: Select this to have the WiFi connection utility attempt to connect this profile to an available network using only the 5.2 GHz band. Mandatory Access Point Forces the wireless adapter to connect to an access point that uses a specific MAC address. Enter the MAC address of the access point (BSSID); 48-bit, 12 hexadecimal digits. For example, 00:06:25:0E:9D:84. Clear: Clear current address. NOTE: This feature is not available when ad hoc operating mode is used. Password Protection 1. Password protect this profile (maximum 10 characters): Select to enable a password for the profile. The default setting is cleared for no profile password. 2. Password: Enter a password. The entered password characters display as asterisks. 3. Confirm Password: Reenter the password. Start Application NOTE: Be sure to keep this password written down. If it is forgotten, it cannot be reset. Automatically starts a batch file, executable file, or script whenever you connect to the profile. For example, start a Virtual Private Network (VPN) session automatically whenever you connect to a wireless network. 1. Click Enable Application Auto Launch. 2. Enter the name of the program that you want to start or click Browse to locate the file on your hard disk. 3. Click OK to close the Advanced Settings. Maintain Connection The Maintain Connection option maintains the wireless connection with a user profile after log off. User Name Format If the Maintain Connection option is selected and a Persistent profile exists, the Persistent profile will not be applied at logoff. It will be applied only if the connection with this profile is lost. NOTE: This option may be used with Nortel VPN client when it is configured to Logoff on Connect. NOTE: This feature is only available when configuring a user profile. It is not available when configuring Administrator Profiles. User Name Format: An administrator can select the user name format for the authentication server. The choices are:
l user (default) l user@domain l user@domain.com l DOMAIN\user PLC Domain Check NOTE: This feature is available only when configuring Administrator Profiles. It is not available when creating a profile from the Create Wireless Profile page. Pre-logon Domain Check: This setting is visible only when using the Administrator Tool, and only if you select to create a Pre-logon/Common profile. The choices are:
l Check for Domain Server Presence: When using a Pre-
logon Connect profile while joined to a domain, this setting will verify the domain server's presence before the user login process is finished. If the server is not found, login may be delayed for a minute or more. l Just continue with login: Login proceeds normally. Server presence is not checked. OK Cancel Help?
NOTE: This feature is available only when configuring Administrator Profiles. It is not available when creating a profile from the Create Wireless Profile page. Close and save the settings. Close and cancel any changes. Help information for this page. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Adapter Settings (Administrator) The Adapter Settings screen controls and displays the device properties for the wireless adapter installed on a computer. The adapter may be any one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) Wireless WiFi Link 4965AG_ l Intel(R) PRO/Wireless 3945ABG Network Connection l Intel(R) PRO/Wireless 2915ABG Network Connection l Intel(R) PRO/Wireless 2200BG Network Connection. To configure Adapter Settings:
1. From within the Administrator tool, click Include Adapter Settings in this package. 2. For each setting listed in the table below, select one of the following options:
m Use default value: Resets the setting on the user machine to the default value. m No change: (For Windows XP* users only.) Maintains the user selected value. The administrator decides not to enforce all the settings on a user's computer. The user can change the adapter setting values from the WiFi connection utility Advanced menu. m No change: (For Windows Vista* users only.) Maintains the user selected value. The administrator decides not to enforce all the settings on a user's computer. The user can change the adapter setting values at the Device Manager . m Select the value: The administrator selects the value that is to be used on the user's computer. Adapter Settings Description Following are descriptions of the adapter settings. Name Description 802.11n Channel Width (2.4 GHz) 802.11n Channel Width (5.2 GHz) 802.11n Mode Set high throughput channel width to maximize performance. Set the channel width to Auto or 20Mhz. Auto is the default setting. Use 20MHz if 802.11n channels are restricted. NOTE: This setting is available only if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 Set high throughput channel width to maximize performance. Set the channel width to Auto or 20Mhz. Auto is the default setting. Use 20MHz if 802.11n channels are restricted. NOTE: This setting is available only if the wireless adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN The 802.11n standard builds upon previous 802.11 standards by adding multiple-input multiple-output
(MIMO). MIMO increases data throughput to improve transfer rate. Select Enabled or Disabled to set the 802.11n mode of the adapter. Enabled is the default setting. NOTE: This setting is available only if the adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2*-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting. An administrator can enable or disable support for high throughput mode to reduce power-consumption or conflicts with other bands or compatibility issues. Unless the other computers in the ad hoc network use a different channel from the default channel, there is no need to change the channel. Value: Select the allowed operating channel from the list. l 802.11b/g: Select this option when 802.11b and 802.11g (2.4 GHz) ad hoc band frequency is used. For this band, the default channel is 11. l 802.11a: Select this option when 802.11a (5 GHz) ad hoc band frequency is used. For this band, the default channel is 36. NOTE: When an 802.11a channel is not displayed, initiating ad hoc networks is not supported for 802.11a channels. Set power saving features for Device to Device (ad hoc) networks. Ad Hoc Channel Ad Hoc Power Management l Disable: Select when connecting to ad hoc networks that contain stations that do not support ad hoc power management. l Maximum Power Savings: Select to optimize battery life. l Noisy Environment: Select to optimize performance or connecting with multiple clients. NOTE: This feature is only installed through an Administrator Package when a user's computer has one of the following adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) PRO/Wireless 3945ABG Ad Hoc QoS Mode HD Mode Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic from the access point over a wireless network based on traffic classification. WMM* (Wi-Fi Multimedia*) is the QoS certification of the Wi-Fi Alliance* (WFA). When WMM* is enabled, the adapter uses WMM to support priority tagging and queuing capabilities for Wi-Fi*
networks. l WMM Enabled (Default) l WMM Disabled NOTE: This feature is only installed through an Administrator Package when a user's computer has one of the following adapters:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN l Intel(R) PRO/Wireless 3945ABG In a wireless network environment where several access points are nearby, this feature will reduce interference and improve your wireless connection. The default setting is for this to be turned off
(disabled). NOTE: This setting is available only if the adapter is one of the following:
l Intel(R) WiMAX/WiFi Link 5350 l Intel(R) WiMAX/WiFi Link 5150 l Intel(R) WiFi Link 5300 l Intel(R) WiFi Link 5100 l Intel(R) Wireless WiFi Link 4965AGN Mixed Mode Protection Power Management
(Administrator View) Preamble Mode Use to avoid data collisions in a mixed 802.11b/11g/11a/11n environment. Request to Send/
Clear to Send (RTS/CTS) should be used in an environment where clients may not hear each other. CTS-to-self can be used to gain more throughput in an environment where clients are in close proximity and can hear each other. (CTS-to-self is not supported for 802.11n.) When creating an administrator package, Power Management lets you select a balance between power consumption and adapter performance. PSP - Power Saving Mode CAM - Constantly Awake Mode Select one of the Power Saving Mode levels:
PSP CAM: The client adapter is powered up continuously. PSP Level 1: PSP set at maximum power. PSP Levels 2-4: PSP set to maximize power. PSP Level 5: PSP set to maximize battery life. PSP Auto: Default in PSP Level 6:
Balances between power consumption and battery life. NOTE: Power consumption savings vary based on infrastructure settings. Changes the preamble length setting received by the access point during an initial connection. Always use Auto Tx Preamble to provide optimal network throughput. Auto Tx Preamble allows automatic preamble detection. If supported, short preamble should be used. If not, use Long Tx Preamble. NOTE: This setting is only available if the client adapter is an Intel(R) PRO/Wireless 2915ABG Network Connection or an Intel(R) PRO/Wireless 2200BG Network Connection. Roaming Aggressiveness This setting lets you define how aggressively a wireless client roams to improve connection to an access point. Click Use default value to balance between not roaming and performance or select a value from the list. Values:
0: No Roaming: Your wireless client does not roam. Only significant link quality degradation causes it to roam to another access point. 1-3: Allow Roaming 2: Default: Balances between not roaming and performance. 4: Maximum Roaming Throughput Enhancement Changes the value of the Packet Burst Control. l Enable: Select to enable throughput l Disable: (Default) Select to disable throughput enhancement. enhancement. Transmit Power If you decrease the transmit power, you reduce the WiFi radio coverage. Default Setting: Highest power setting Values:
Tx Minimum: Lowest Minimum Coverage: Set the adapter to the lowest transmit power. Enables you to expand the number of coverage areas or confine a coverage area. Reduce the coverage area in high traffic areas to improve overall transmission quality and avoid congestion and interference with other devices. Tx Level 1, Tx Level 2, Tx Level 3:
Set by country requirements. Tx Maximum: Highest Maximum Coverage: Set the adapter to the maximum transmit power level. Select for maximum performance and range in environments with limited additional radio devices. If you select No change, then this setting will not be changed at the user's computer. NOTE: The optimal setting is for a user to always set the transmit power at the lowest possible level still compatible with the quality of their communication. This allows the maximum number of wireless devices to operate in dense areas and reduce interference with other devices that this radio shares radio spectrum with. NOTE: This setting takes effect when either Network
(Infrastructure) or Device to Device (ad hoc) mode is used. Select which mode to use for connection to a wireless network:
l 802.11a (only): Connect the wireless adapter to 802.11a networks only. l 802.11b (only): Connect the wireless adapter to 802.11b networks only. l 802.11g (only): Connect the wireless adapter to 802.11g networks only. l 802.11a and 802.11g: Connect the wireless adapter to 802.11a and 802.11g networks only. l 802.11b and 802.11g: Connect the wireless adapter to 802.11b and 802.11g networks only. l 802.11a, 802.11b, and 802.11g: (Default) -
Connect to either 802.11a, 802.11b or 802.11g wireless networks. NOTE: These wireless modes (Modulation types) determine the discovered access points displayed in the WiFi Networks list. Wireless Mode Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Set Administrator Password A user cannot modify Administrator settings or profiles unless they have the password for this tool. When you first access the Administrator Tool, you are required to enter a password. The password must not exceed 100 characters (although the field will only display up to 56 characters). Null passwords are not allowed. 1. Password: Create a password (maximum 100 characters). 2. Confirm Password: Reenter the password. 3. Click OK. The Open Administrator Package displays. To change or unlock the existing password:
1. On the Tools menu, click Administrator Tool. 2. Click Change Password on the password entry form. 3. Old Password: Enter the existing password. 4. New Password: Enter the new password. 5. Confirm Password: Reenter the new password again. 6. Click OK to save the new password and enter the Administrator Tool. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Enterprise Security From the Security Settings page you can enter the required security settings for the selected wireless network. See Personal Security to set basic WEP or WPA security in a non-
enterprise environment (home, small business). See Enterprise Security Settings to set up 802.1X security authentication options. l Use Enterprise Security if your network environment requires 802.1X authentication. l 802.1X authentication methods include passwords, certificates and smart cards. l 802.1X authentication types are: EAP-SIM, EAP-AKA, LEAP, TLS, TTLS, PEAP, EAP-
FAST. l See Profile Management for a description of when the Profile Wizard is launched. l See Security Overview for more information about the different security options for wireless networks. Enterprise Security Settings Enterprise Security Settings Description Name Enterprise Security Setting Select to open the Enterprise Security settings. The security settings that are available are dependent on the Operating Mode selected: Device to Device (ad hoc) or Network
(Infrastructure). Network Authentication If you configure a profile for Device to Device (ad hoc) networking, the default setting is Open authentication. If you configure a profile for an infrastructure network, select:
l Open: Any wireless station can request authentication. l Shared: Uses an encryption key known only to the receiver and sender of data. l WPA-Personal or WPA2-Personal: Uses a password also called a pre-shared key (PSK). l WPA-Enterprise or WPA2-Enterprise: Use on enterprise networks with an 802.1X RADIUS server. Data Encryption NOTE: WPA-Enterprise and WPA2-Enterprise are interoperable. Click to open the following data encryption types:
l None: No encryption. l WEP: WEP encryption provides two levels of security that use a 64-bit key (sometimes referred to as 40-bit) or a 128-bit key (also known as 104-bit). If you use encryption, all wireless devices on your wireless network must use the same encryption keys. l CKIP: Cisco Key Integrity Protocol is a Cisco proprietary security protocol for encryption in 802.11 media. CKIP uses Key Permutation (KP) and Message Sequence Number to improve 802.11 security in infrastructure mode. l TKIP: Provides per-packet key mixing, a message integrity check and a rekeying mechanism. l AES-CCMP: (Advanced Encryption Standard - Counter CBC-MAC Protocol) Used as the data encryption method whenever strong data protection is important. Enable 802.1X
(Authentication Type) Click to open the following 802.1X authentication types:
l TLS l TTLS l PEAP l LEAP l EAP-FAST l EAP-SIM: If in administrator mode, this only available for Pre-logon/Common profiles, not Persistent. l EAP-AKA: If in administrator mode, this only available for Pre-logo/Common profiles, not Persistent. Certain Authentication Types require that you obtain and install a client certificate. See Set up a Client with TLS authentication or consult your administrator. Authentication Protocols apply only when Network Authentication is set to WPA-Enterprise or WPA2-Enterprise and Authentication Type is set to TTLS or PEAP. l PAP l CHAP l MS-CHAP l MS-CHAP-V2 l GTC l TLS Authentication Protocols Cisco Options Click to view the Cisco Compatible Extensions Options. Advanced NOTE: Cisco Compatible Extensions are automatically enabled for CKIP and LEAP profiles. Click to access the Advanced Settings and configure the following options listed. l Auto Connect: Select to automatically or manually connect to a profile. l Auto Import: Allows a network administrator to move this profile to other computers. (Visible on user profiles only.) l Band Selection: Select the band to use for this connection profile. l Mandatory Access Point: Select to associate the wireless adapter with a specific access point. l Password Protection: Select to password protect a profile. l Start Application: Specify a program to be started when a wireless connection is made. l Maintain Connection: Select to remain connected to a user profile after log off. (Visible on user profiles only.) l User Name Format: Select the user name format for the authentication server. (Visible on administrator profiles only.) l PLC Domain Check: Select to verify the domain server's presence before the user login process is finished.
(Visible on administrator profiles only.) User Credentials A profile configured for TTLS, PEAP, or EAP-FAST authentication requires one of the following log on authentication methods:
l Use Windows logon: The 802.1X credentials match your Windows user name and password. Before connection, you are prompted for your Windows logon credentials. NOTE: For LEAP profiles, this option is listed as Use Windows logon user name and password. l Prompt each time I connect: Prompt for your user name and password every time you log onto the wireless network. NOTE: For LEAP profiles, this option is listed as Prompt for the user name and password. l Use the following: Use your saved credentials to log onto the network. m User Name: This user name must match the user name that is set in the authentication server by the administrator prior to client authentication. The user name is case-sensitive. This name specifies the identity supplied to the authenticator by the authentication protocol operating over the TLS tunnel. This identity is securely transmitted to the server only after an encrypted channel has been established. m Domain: Name of the domain on the authentication server. The server name identifies a domain or one of its sub-domains (for example, zeelans.com, where the server is blueberry. zeelans.com). m Password: Specifies the user password. The password characters appear as asterisks. This password must match the password that is set in the authentication server. m Confirm Password: Reenter the user password. m Roaming Identity: A Roaming Identity may be populated in this field or you can use %domain%\
%username% as the default format for entering a roaming identity. When 802.1X Microsoft IAS RADIUS is used as an authentication server, the server authenticates the device using the Roaming Identity from Intel PROSet/Wireless WiFi software, and ignores the Authentication Protocol MS-CHAP-V2 user name. Microsoft IAS RADIUS accepts only a valid user name
(dotNet user) for the Roaming Identity. For all other authentication servers, the Roaming Identity is optional. Therefore, it is recommended to use the desired realm (for example, anonymous@myrealm) for the Roaming Identity rather than a true identity. NOTE: Contact your administrator to obtain the domain name. Server Options NOTE: For LEAP profiles, this option is listed as Use the following user name and password. Select one of the following credential retrieval methods:
l Validate Server Certificate: Select to verify the server certificate. Certificate Issuer: The server certificate received during TLS message exchange must be issued by this certificate authority
(CA). Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection. If Any Trusted CA is selected, any CA in the list is acceptable. Click Any Trusted CA as the default or select a certificate issuer from the list. l Specify Server or Certificate Name: Enter the server name. The server name or domain to which the server belongs, depends on which of the following options has been selected. l Server name must match the specified entry exactly: When selected, the server name must match exactly the server name found on the certificate. The server name should include the complete domain name
(for example, Servername.Domain name). l Domain name must end with the specified entry:
When selected, the server name identifies a domain, and the certificate must have a server name that belongs to this domain or to one of its subdomains (for example, zeelans.com, where the server is blueberry. zeelans.com). Certificate Options NOTE: These parameters should be obtained from the administrator. To obtain a certificate for TLS authentication, select one of the following:
l Use my smart card: Select if the certificate resides on a smart card. l Use the certificate issued to this computer: Selects a certificate that resides in the machine store. l Use a user certificate on this computer: Click Select to choose a certificate that resides on this computer. NOTE: The Intel(R) PROSet/Wireless WiFi Connection Utility supports machine certificates. However, they are not displayed in the certificate listings. Notes about Certificates: The specified identity should match the Issued to identity in the certificate and should be registered on the authentication server (for example, RADIUS server) that is used by the authenticator. Your certificate must be valid with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. Use the same user name you used to log in when the certificate was installed. View the prior page in the Profile Wizard. View the next page in the Profile Wizard. If more security information is required then the next step of the Security Settings is displayed. Closes the Profile Wizard and saves the profile. Back Next OK Cancel Help?
Closes the Profile Wizard and cancels any changes made. Provides the help information for the current page. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Profile Wizard General Settings The General Settings page is the first page in the Create Wireless Profile Wizard. From this page you can specify the profile name, the wireless network name (SSID), and choose the operating mode. See Profile Management for a description of when the Create Wireless Profile General Settings is launched. While you configure a profile, you can use the left pane to navigate to the General and Security Settings pages. The Back and Next buttons located at the bottom of the Profile Wizard can also be used for the same functions. General Settings Page Description Name Profile Name Description Name of the wireless network profile. When you configure a wireless network that was selected from the WiFi Networks list, the profile name is the same as the Wireless Network Name SSID). This name can be changed to be more descriptive or customized for your personal use. Examples: My Office Network, Bob's Home Network, ABC Company Network Wireless Network Name (SSID) Name of the wireless network access point used by the wireless adapter for connection. The network name must match exactly the name of the wireless access point. It is case sensitive. When you configure a wireless network that was selected from the WiFi Networks list, the network name is taken from the wireless network list. You cannot and should not change it.
<SSID not broadcast>: If an access point does not broadcast its network name (SSID) or the wireless adapter receives a hidden network name from a Operating Mode Administrator Profile Type
(Visible only in Administrator Tool) Advanced stealth access point, it is displayed in the WiFi Networks list. To associate with an <SSID not broadcast> network entry, a new profile must be created before connection. Provide the actual SSID for the access point. After connection, the <SSID not broadcast> is still displayed in the WiFi Networks list. The associated SSID profile is viewed in the Profiles list. Network (Infrastructure): Connect to an access point. A Network (Infrastructure) network consists of one or more access points and one or more computers with wireless adapters. This connection is the type used in home networks, corporate networks, hotels, and other areas that provide access to the network and/or the internet. NOTE: Only Network (Infrastructure) is available for administrator profiles (Pre-logon/Common and Persistent profiles). See the Administrator Tool for more information. Device to Device (ad hoc): Connect directly to other computers in an ad hoc wireless network. This type of connection is useful for connections between two or more computers only. It does not provide access to network resources or the internet. Persistent: Persistent profiles are applied at boot time or whenever no one is logged on the computer. After a user logs off, a Persistent profile maintains a wireless connection either until the computer is turned off, or a different user logs on. Pre-logon/Common: These profiles are only available using the Administrator Tool. Pre-logon/
Common profiles are applied once a user logs on. The connection is made as part of the Windows log-on sequence (Pre-logon/Common). This profile is shared by all users. Click Advanced to access the Advanced Settings. Use the Advanced Settings to set Maintain Connection, User Name Format, Auto Connect or Auto Import options, launch an application (Start Application), set a profile password (Password Protection), specify a certain access point address for adapter connection
(Mandatory Access Point), and set Pre-logon Connect options. Proceeds to the Security Settings page. Finishes creation of the new profile with the current settings. Closes the Create Wireless Profile Wizard and cancel any changes. Provides help information for this page. Next OK Cancel Help?
Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Personal Security Use Personal Security if you are a home or small business user who can use a variety of simple security procedures to protect your wireless connection. You may want to select from the list of security settings that are easy to configure, for your wireless network. See Personal Security Settings for a description of each of the options. A RADIUS or AAA server is not required. l Review the Set up Data Encryption and Authentication information to learn about the different security types. l To add or change the required security settings, click Security Settings for information to set security for the selected wireless network. l See Profile Management for a description of when to use the Profile Wizard. l See Security Overview for more information about the different security options for wireless networks. l If you want to verify the security settings, select a wireless network in the WiFi Networks list. See Network Properties to review the operating mode, authentication level, and data encryption. l See Enterprise Security to set 802.1X authentication security. Personal Security Settings Personal Security Settings Description Name Setting General Settings Select to open the Personal Security Settings. The security settings that are available are dependent on the Operating Mode selected in the Create Wireless Profile Security Settings. Device to Device (ad hoc): In device to device mode, also called ad hoc mode, wireless computers send information directly to other wireless computers. You can use ad hoc mode to network multiple computers in a home or small office, or to set up a temporary wireless network for a meeting. NOTE: Device to Device (ad hoc) networks are identified with a notebook image (
and Profiles list.
) in the Wireless Networks Network (Infrastructure): An infrastructure network consists of one or more access points and one or more computers with wireless adapters installed. At least one access point should also have a wired connection. For home users, this is usually a broadband or cable network. NOTE: Infrastructure networks are identified with an
) in the Wireless Networks and access point image (
Profiles list. Security Settings If you are configuring a Device to Device (ad hoc) profile, select one of the following data encryption settings:
l None: No authentication required. l WEP-64 bit or WEP-128 bit: A network key or password is used for encryption. If you are configuring a Network (Infrastructure) profile, select:
l WPA*-Personal (TKIP) or WPA2*-Personal (TKIP): WPA-Personal uses the Temporal Key Integrity Protocol (TKIP) for data encryption. l WPA-Personal (AES-CCMP) or WPA2-Personal (AES-CCMP):
WPA-Personal uses a new method for privacy protection of wireless transmissions specified in the IEEE 802.11i standard. Advanced button Click to access the Advanced Settings and configure the following options:
l Auto Connect: Select to automatically or manually connect to a profile. l Auto Import: Network administrator can export a profile on another computer. l Band Selection: Select the band to use for this connection profile. l Mandatory Access Point: Select to associate the wireless adapter with a specific access point. l Password Protection: Select to password protect a profile. l Start Application: Specify a program to be started when a wireless connection is made. l Maintain Connection: Select to remain connected to a user profile after log off. Back OK Cancel Help?
View the prior page in the Profile Wizard. Closes the Profile Wizard and saves the profile. Closes the Profile Wizard and cancels any changes made. Provides the help information for the current page. Set up Data Encryption and Authentication In a home wireless network you can use a variety of simple security procedures to protect your wireless connection. These include:
l Enable Wi-Fi Protected Access (WPA*). l Change your password. l Change the network name (SSID). Wi-Fi Protected Access (WPA) encryption provides protection for your data on the network. WPA uses an encryption key called a Pre-Shared Key (PSK) to encrypt data before transmission. Enter the same password in all of the computers and access point in your home or small business network. Only devices that use the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. The password automatically initiates the Temporal Key Integrity Protocol (TKIP) or AES-CCMP protocol for the data encryption process. Network Keys WEP encryption provides two levels of security:
l 64-bit key (sometimes referred to as 40-bit) l 128-bit key (also known as 104-bit) For improved security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network must use the same encryption keys. You can create the key yourself and specify the key length (64-bit or 128-bit) and key index
(the location that a specific key is stored). The greater the key length, the more secure the key. When the length of a key is increased by one character, the number of possible keys doubles. Key Length: 64-bit Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z or A-Z. Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F. Key Length: 128-bit Pass phrase (128-bit): Enter 13 alphanumeric characters, 0-9, a-z or A-Z. Hex key (128-bit): Enter 26 hexadecimal characters, 0-9, A-F. With WEP data encryption, wireless station can be configured with up to four keys (the key index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an encrypted message that uses a key stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body. Set up a Client with Open Authentication and No Data Encryption
(None) CAUTION: Networks using no authentication or encryption are highly vulnerable to access by unauthorized users. On the Intel(R) PROSet/Wireless WiFi main window, use one of the following methods to connect to a device to device network:
l Double-click a Device to Device (ad hoc) network in the WiFi Networks list. l Select a Device to Device (ad hoc) network in the WiFi Networks list. Click Connect. The Intel(R) PROSet/Wireless WiFi Connection Utility automatically detects the security settings for the wireless adapter. To create a profile for a wireless network connection with no encryption perform these steps:
1. Click Profiles on the WiFi connection utility main window. 2. On the Profiles list, click Add to open the Create Wireless Profile General Settings. 3. Profile Name: Enter a descriptive profile name. 4. Wireless Network Name (SSID): Enter the name of your wireless network. 5. Operating Mode: Click Device to Device (ad hoc). 6. Click Next to open the Security Settings. Personal Security is selected by default. 7. Security Settings: The default setting is None, which indicates that there is no security on this wireless network. 8. Click OK. The profile is added to the Profiles list and connects to the wireless network. Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption When WEP data encryption is enabled, a network key or password is used for encryption. A network key is provided for you automatically (for example, it might be provided by your wireless network adapter manufacturer), or you can enter it yourself and specify the key length (64-bit or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The greater the key length, the more secure the key. To add a network key for an infrastructure network connection:
1. On the WiFi connection utility main window, double-click an infrastructure network in the WiFi Networks list or select the network and click Connect. 2. Click Profiles to access the Profiles list. 3. Click Properties to open the Create Wireless Profile General Settings. The Profile name and Wireless Network Name (SSID) display. Network (Infrastructure) should be selected as the Operating Mode. 4. Click Next to open the Security Settings. Personal Security is selected by default. 5. Security Settings: The default data encryption setting is None, which indicates that there is no security on this wireless network. To add a password or network key:
1. Security Settings: Select either WEP 64-bit or WEP 128-bit to configure WEP data encryption with a 64-bit or 128-bit key. When WEP encryption is enabled on an access point, the WEP key is used to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point. Name Password Description Enter the Wireless Security Password (Pass phrase) or Encryption Key (WEP key). Pass phrase (64-bit ) Enter five (5) alphanumeric characters, 0-9, a-z or A-Z. Enter 10 hexadecimal characters, 0-9, A-F. WEP key (64-bit) Pass phrase (128-bit) Enter 13 alphanumeric characters, 0-9, a-z or A-Z. WEP key (128-bit) Enter 26 hexadecimal characters, 0-9, A-F. 2. Key Index: Change the Key Index to set up to four passwords. 3. Click OK to return to the Profiles list. To add more than one password:
1. Select the Key Index number: 1, 2, 3, or 4. 2. Enter the Wireless Security Password. 3. Select another Key Index number. 4. Enter another Wireless Security Password. 5. Click OK to return to the Profiles list. Set up a Client with WPA*-Personal (TKIP) or WPA2*-Personal
(TKIP) Security Settings WPA* Personal Mode requires manual configuration of a pre-shared key (PSK) on the access point and clients. This PSK authenticates a user's password or identifying code, on both the client station and the access point. The access point performs the authentication. WPA Personal Mode is targeted to home and small business environments. WPA2* is the second generation of WPA security that provides enterprise and consumer wireless users with a high level of assurance that only authorized users can access their wireless networks. WPA2 provides a stronger encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some corporate and government users. NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting. To configure a profile with WPA-Personal network authentication and TKIP data encryption:
1. On the WiFi connection utility main window, double-click an infrastructure network in the WiFi Networks list or select the network and click Connect. 2. Click Profiles to access the Profiles list. 3. Click Properties to open the Wireless Profile Properties General Settings. The Profile name and Wireless Network Name (SSID) display. Network (Infrastructure) should be selected as the Operating Mode. 4. Click Next to open the Security Settings. 5. Select Personal Security. 6. Security Settings: Select WPA-Personal (TKIP) to provide security to a small business network or home environment. A password, called a pre-shared key (PSK), is used. The longer the password, the stronger the security of the wireless network. If your wireless access point or router supports WPA2-Personal, then you should enable it on the access point and provide a long, strong password. The longer the password, the stronger the security of the wireless network. The same password entered in the access point needs to be used on this computer and all other wireless devices that access the wireless network. NOTE: WPA-Personal and WPA2-Personal are interoperable. 7. Wireless Security Password (Encryption Key): Enter a text phrase with eight to 63 characters. Verify that the network key matches the password in the wireless access point. 8. Click OK to return to the Profiles list. Set up a Client with WPA*-Personal (AES-CCMP) or WPA2*-Personal
(AES-CCMP) Security Settings Wi-Fi Protected Access (WPA*) is a security enhancement that strongly increases the level of data protection and access control to a wireless network. WPA enforces 802.1X authentication and key-exchange and only works with dynamic encryption keys. For a home user or small business, WPA-Personal uses either Advanced Encryption Standard - Counter CBC-MAC Protocol (AES-CCMP) or Temporal Key Integrity Protocol (TKIP). NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting. To create a profile with WPA2*-Personal network authentication and AES-CCMP data encryption:
1. On the WiFi connection utility main window, double-click an infrastructure network from the WiFi Networks list or select the network and click Connect. 2. If these are being transmitted, the Profile name and Wireless Network Name (SSID) should display on the General Settings screen. Network (Infrastructure) should be selected as the Operating Mode. Click Next to open the Security Settings. 3. Select Personal Security. 4. Security Settings: Select WPA2-Personal (AES-CCMP) to provide this level of security in the small network or home environment. It uses a password, also called a pre-shared key (PSK). The longer the password, the stronger the security of the wireless network. AES-CCMP (Advanced Encryption Standard - Counter CBC-MAC Protocol) is a newer method for privacy protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-CCMP as the data encryption method whenever strong data protection is important. If your Wireless access point or router supports WPA2-Personal, then you should enable it on the access point and provide a long, strong password. The same password entered into the access point needs to be used on this computer and all other wireless devices that access the wireless network. NOTE: WPA-Personal and WPA2-Personal are interoperable. Some security solutions may not be supported by your computer's operating system. You may require additional software or hardware as well as wireless LAN infrastructure support. Contact your computer manufacturer for details. 5. Password: Wireless Security Password (Encryption Key): Enter a text phrase
(length is between eight and 63 characters). Verify that the network key used matches the wireless access point key. 6. Click OK to return to the Profiles list. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Administrator Tool Settings These settings allow the administrator to control where profiles are placed in the Administrator's Profiles list. Name Profile Insertion: Select one of the following to place Administrator profiles within a Administrator's Profiles list. Description Insert on top Select to place Administrator profiles at the top of the Administrator's Profiles list
(Persistent, Pre-logon/Common or Voice over IP profiles) Insert on bottom Select to place Administrator profiles at the end of the Administrator's Profiles list.
(Persistent, Pre-logon/Common or Voice over IP profiles) Save settings and close the page. Cancel settings and close the page. Provides help information for this page. OK Cancel Help?
How to Use 1. Open the Administrator Tool. 2. Click Tools > Settings to open the Administrator Tool Settings. m Select Insert on top to always place Administrator profiles at the top of the Administrator Tool's Profiles list. m Select Insert on bottom to always place Administrator profiles at the bottom the Administrator Tool's Profiles list. 3. Click OK to close and return to the Administrator Tool. Back to Top Back to Contents Trademarks and Disclaimers Back to Contents Wireless Event Viewer The Wireless Event Viewer program displays a list of error log records. You can save all available log records to a binary format file for sending to customer support. To launch Wireless Event Viewer:
1. At the Tools menu, click Intel Wireless Troubleshooter. 2. Click Wireless Event Viewer. Wireless Event Viewer Description Name File Description Settings:
To change the storage location of the log file. 1. Click File > Settings to open the Wireless Event Viewer Settings. 2. Specify the default folder for saved log files:
The default location is My Documents. Click Browse to locate a new folder location. 3. File Name: The file name is the default machine name. in kilobytes (KB). 4. Maximum file size (KB): Enter the size of the file 5. Click OK to close and apply the new changes. Click Cancel to close without applying any changes. If you want the log file copied to an archive site after a specific number of days:
1. Click Copy the log file to another location. 2. Destination Folder: Enter where to store the files or click Browse to select a folder location. 3. Frequency (days): Select how often you want the files moved to the destination folder. 4. Click OK to close and apply the new changes. Click Cancel to close without applying any changes. Exit: Click to exit Wireless Event Viewer and return to the Intel Wireless Troubleshooter. NOTE: An administrator can use the Administrator Tool Application Settings, Wireless Event Viewer Settings to set the default log file location. Select to view current or previously saved event records:
Mode l Real time Event Viewing: Select this to view error events as they occur in real time. l Log File Viewing: Select this to open an error log file that has been previously saved, or to save the current error event log to a file. Help?
Provides help information for this page. About: Displays version information for the Intel Wireless Troubleshooter. Wireless Event Viewer Information Level: The severity level of the connection issue is indicated by an icon. The severity levels are:
l Information l Error l Warning Description: Brief description of the connection issue. Date and Time: Date and time of the detected connection issue. This column can be sorted in ascending or descending order. Click the column header to sort the displayed events. Opens log files archived from previous sessions with Intel
(R) Wireless Troubleshooter. Removes the information in the Wireless Event Viewer. Saves the available log. Use the suggested name or change it. Open Clear Save As Back to Top Back to Contents Trademarks and Disclaimers l l Support & Downloads Browse By Product n n Intel.com Worldwide l Intel Wireless WiFi Link Intel Wireless WiFi Link 4965AGN n About Intel n Press Room n Contact Us 4965AGN Home m l Software & Drivers l Installation & Use m l l m l m l m l Product Documentation l l Email Support l adapter l Search Support & Downloads Intel PRO/Wireless Network connection ID tool Other methods to identify your adapter All of Support This Category This Product l
& solutions l back to top Security information Identify your Identify your adapter m Need to know what adapter you have?
Known issues m m m m m m m Intel PRO/Wireless network connection ID tool Download adapter software Download center Other resources Product change notifications?
Windows Vista information Hotspot information Intel Centrino mobile technology Other methods to identify your adapter IMPORTANT NOTICE: Ensure the wireless capability of your system functions in accordance with Intel's product specification Wireless connection may drop with Microsoft* games for Windows LIVE Reduced battery run time when using wireless on Windows Vista*
Interference from 2.4 GHz cordless telephones Wireless client adapter connection and roaming behavior Wireless radio remains inactive and cannot be enabled from software More l drivers l back to top Software &
Intel Wireless LAN software support for Windows Vista* OS Download center l use l back to top Installation &
View available wireless networks on Windows Vista Connect to secure wireless networks on Windows Vista Create a secure wireless network profile on Windows Vista Create a secure ad hoc wireless network on Windows Vista Set up a secure wireless connection to the internet on Windows Vista More l asked questions l back to top Frequently What do I need in order to connect to a wireless network?
Could you briefly define the various wireless protocols (802.11a,b,g,n)?
Why am I not able to connect, or stay connected, to my wireless network?
Wireless Security - 802.1x and EAP Types What is MIMO?
More l documentation l back to top User guide Supported 802.11n APs Product brief [PDF]
Currently supported 802.11 wireless LAN products More Product l l m Site Map m RSS Feeds m Jobs at Intel m Investor Relations m *Legal Information m Privacy Policy m Intel Corporation
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2009-03-18 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | Class II permissive change or modification of presently authorized equipment |
2 | 5755 ~ 5795 | DTS - Digital Transmission System | ||
3 | 2008-11-17 | 5755 ~ 5795 | DTS - Digital Transmission System | |
4 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | ||
5 | 2008-09-22 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | |
6 | 5755 ~ 5795 | DTS - Digital Transmission System | ||
7 | 2008-09-19 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | |
8 | 5755 ~ 5795 | DTS - Digital Transmission System | ||
9 | 2008-07-23 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | |
10 | 2008-07-07 | JBP - Part 15 Class B Computing Device Peripheral | Original Equipment | |
11 | 5510 ~ 5670 | NII - Unlicensed National Information Infrastructure TX | ||
12 | 5755 ~ 5795 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
various | Effective |
2009-03-18
|
||||
various |
2008-11-17
|
|||||
various |
2008-09-22
|
|||||
various |
2008-09-19
|
|||||
various |
2008-07-23
|
|||||
various |
2008-07-07
|
|||||
various | Applicant's complete, legal business name |
Intel Corporation
|
||||
various | FCC Registration Number (FRN) |
0008035131
|
||||
various | Physical Address |
100 Center Point Circle
|
||||
various |
Columbia, South Carolina 29210
|
|||||
various |
United States
|
|||||
app s | TCB Information | |||||
various | TCB Application Email Address |
H******@atcb.com
|
||||
various | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
various |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
various | Grantee Code |
PD9
|
||||
various | Equipment Product Code |
533ANMU
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
various | Name |
S****** C****** H********
|
||||
various | Title |
Product Regulations Engineer
|
||||
various | Telephone Number |
803-3********
|
||||
various | Fax Number |
803-2********
|
||||
various |
s******@intel.com
|
|||||
app s | Technical Contact | |||||
various | Firm Name |
Compliance Certification Services
|
||||
various |
Elliott Labs
|
|||||
various | Name |
M****** H********
|
||||
various |
M****** B******
|
|||||
various | Physical Address |
47173 Benicia St.
|
||||
various |
684 West Maude Ave
|
|||||
various |
Fremont, California 94538
|
|||||
various |
Fremont, 94538
|
|||||
various |
Sunnyvale, California 94085
|
|||||
various |
United States
|
|||||
various | Telephone Number |
510 7********
|
||||
various |
408-2********
|
|||||
various | Fax Number |
510 7********
|
||||
various |
408-2********
|
|||||
various |
M******@ccsemc.com
|
|||||
various |
d******@elliottlabs.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
various | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
various | No | |||||
various | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
various | Yes | |||||
various | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 11/06/2008 | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
various | Is this application for software defined/cognitive radio authorization? | No | ||||
various | Equipment Class | NII - Unlicensed National Information Infrastructure TX | ||||
various | DTS - Digital Transmission System | |||||
various | JBP - Part 15 Class B Computing Device Peripheral | |||||
various | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Intel Wi-Fi Link 5300 Series | ||||
various | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
various | Modular Equipment Type | Single Modular Approval | ||||
various | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
various | Original Equipment | |||||
various | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
various | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
various | Grant Comments | Power Output listed is Conducted. Modular approval. This module is approved for use in mobile configurations. Only those antenna(s) tested with the device or similar antenna(s)with equal or lesser gain may be used with this transmitter. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. The final host device must utilize the Bios Locking feature as documented in this filing. This transmitter is restricted to indoor use only within the 5.15-5.25 GHz band. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Device is a client only device containing a 3 x 3 MIMO configuration, enabled for either 2.4 or 5 GHz band operations as described in this filing. Highest reported SAR value is: 0.665 W/kg. | ||||
various | Power Output listed is Conducted. Modular approval. This module is approved for use in mobile configurations. The final host device must utilize the Bios Locking feature as documented in this filing. Only those antenna(s) tested with the device or similar antenna(s)with equal or lesser gain maybe used with this transmitter. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located with any other transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. This transmitter is restricted to indoor use only within the 5.15-5.25 GHz band. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Device is a client only device containing a 3 x 3 MIMO configuration, enabled for either 2.4 or 5 GHz band operations as described in this filing. Highest reported SAR value is: 0.665 W/kg. | |||||
various | Single Modular | |||||
various | Power Output listed is Conducted. Modular approval. This module is approved for use in mobile configurations. Only those antenna(s) tested with the device or similar antenna(s) with equal or lesser gain may be used with this transmitter. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons . The final host device must utilize the Bios Locking feature as documented in this filing. This transmitter is restricted to indoor use only within the 5.15-5.25 GHz band. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Device is a client only device containing a 3x3 MIMO configuration, enabled for either 2.4 or 5 GHz band operations as described in this filing. | |||||
various | Power Output listed is Conducted. Modular approval. This module is approved for use in mobile configurations. The final host device must utilize the Bios Locking feature as documented in this filing.Only those antenna(s) tested with the device or similar antenna(s) with equal or lesser gain maybe used with this transmitter. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located with any other transmitters. This transmitter is restricted to indoor use only within the 5.15-5.25 GHz band. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Device is a client only device containing a 3x3 MIMO configuration, enabled for either 2.4 or 5 GHz band operations as described in this filing. | |||||
various | Power Output listed is Conducted. Modular approval. This module is approved for use in mobile configurations. Only those antenna(s) tested with the device or similar antenna(s) with equal or lesser gain may be used with this transmitter. The antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons . The final host device must utilize the Bios Locking feature as documented in this filing.This transmitter is restricted to indoor use only within the 5.15-5.25 GHz band. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. Device is a client only device containing a 3x3 MIMO configuration, enabled for either 2.4 or 5 GHz band operations as described in this filing. This device complies with the Dynamic Frequency Selection (DFS) requirements of Report and Order FCC 03-287 as a Client only without Radar Detection. | |||||
various | Is there an equipment authorization waiver associated with this application? | No | ||||
various | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
various | Firm Name |
Compliance Certification Services
|
||||
various |
National Technical Systems
|
|||||
various | Name |
T****** C****
|
||||
various |
D****** B****
|
|||||
various | Telephone Number |
510-7********
|
||||
various |
510-5********
|
|||||
various | Fax Number |
510-6********
|
||||
various |
510 5********
|
|||||
various |
t******@ccsemc.com
|
|||||
various |
d******@nts.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15E | CC MO ND | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
1 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
1 | 4 | 15E | CC MO ND | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
1 | 5 | 15E | CC MO ND | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
1 | 6 | 15E | CC MO ND | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC MO | 2412 | 2462 | 0.07 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15C | CC MO | 2422 | 2452 | 0.13 | |||||||||||||||||||||||||||||||||||
2 | 3 | 15C | CC MO | 5745 | 5825 | 0.063 | |||||||||||||||||||||||||||||||||||
2 | 4 | 15C | CC MO | 5755 | 5795 | 0.068 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | CC MO | 2412 | 2462 | 0.07 | |||||||||||||||||||||||||||||||||||
3 | 2 | 15C | CC MO | 2422 | 2452 | 0.13 | |||||||||||||||||||||||||||||||||||
3 | 3 | 15C | CC MO | 5745 | 5825 | 0.063 | |||||||||||||||||||||||||||||||||||
3 | 4 | 15C | CC MO | 5755 | 5795 | 0.068 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15E | CC MO ND | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
4 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
4 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
4 | 4 | 15E | CC MO ND | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
4 | 5 | 15E | CC MO ND | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
4 | 6 | 15E | CC MO ND | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
5 | 1 | 15E | CC MO ND | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
5 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
5 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
5 | 4 | 15E | CC MO ND | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
5 | 5 | 15E | CC MO ND | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
5 | 6 | 15E | CC MO ND | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
6 | 1 | 15C | CC MO | 2412 | 2462 | 0.07 | |||||||||||||||||||||||||||||||||||
6 | 2 | 15C | CC MO | 2422 | 2452 | 0.13 | |||||||||||||||||||||||||||||||||||
6 | 3 | 15C | CC MO | 5745 | 5825 | 0.063 | |||||||||||||||||||||||||||||||||||
6 | 4 | 15C | CC MO | 5755 | 5795 | 0.068 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
7 | 1 | 15E | CC MO ND | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
7 | 2 | 15E | CC MO ND | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
7 | 3 | 15E | CC MO ND | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
7 | 4 | 15E | CC MO ND | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
7 | 5 | 15E | CC MO ND | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
7 | 6 | 15E | CC MO ND | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
8 | 1 | 15C | CC MO | 2412 | 2462 | 0.07 | |||||||||||||||||||||||||||||||||||
8 | 2 | 15C | CC MO | 2422 | 2452 | 0.13 | |||||||||||||||||||||||||||||||||||
8 | 3 | 15C | CC MO | 5745 | 5825 | 0.063 | |||||||||||||||||||||||||||||||||||
8 | 4 | 15C | CC MO | 5755 | 5795 | 0.068 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
9 | 1 | 15E | CC MO | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
9 | 2 | 15E | CC MO | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
9 | 3 | 15E | CC MO | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
9 | 4 | 15E | CC MO | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
9 | 5 | 15E | CC MO | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
9 | 6 | 15E | CC MO | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
10 | 1 | 15B | CC | ||||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
11 | 1 | 15E | CC MO | 5180 | 5240 | 0.045 | |||||||||||||||||||||||||||||||||||
11 | 2 | 15E | CC MO | 5260 | 5320 | 0.11 | |||||||||||||||||||||||||||||||||||
11 | 3 | 15E | CC MO | 5500 | 5700 | 0.11 | |||||||||||||||||||||||||||||||||||
11 | 4 | 15E | CC MO | 5190 | 5230 | 0.045 | |||||||||||||||||||||||||||||||||||
11 | 5 | 15E | CC MO | 5270 | 5310 | 0.087 | |||||||||||||||||||||||||||||||||||
11 | 6 | 15E | CC MO | 5510 | 5670 | 0.081 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
12 | 1 | 15C | CC MO | 2412 | 2462 | 0.07 | |||||||||||||||||||||||||||||||||||
12 | 2 | 15C | CC MO | 2422 | 2452 | 0.13 | |||||||||||||||||||||||||||||||||||
12 | 3 | 15C | CC MO | 5745 | 5825 | 0.063 | |||||||||||||||||||||||||||||||||||
12 | 4 | 15C | CC MO | 5755 | 5795 | 0.068 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC