all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 4 5 6 7 8 9 |
|
Manual | Users Manual | 886.45 KiB | ||||
1 2 3 4 5 6 7 8 9 |
|
OEM Instructions | Users Manual | 529.80 KiB | October 12 2009 / July 01 2010 | |||
1 2 3 4 5 6 7 8 9 |
|
User Manual Addendum | Users Manual | 25.67 KiB | ||||
1 2 3 4 5 6 7 8 9 |
|
User manual | Users Manual | 3.45 MiB | / November 09 2012 | |||
1 2 3 4 5 6 7 8 9 |
|
Users Manual | Users Manual | 797.87 KiB | December 12 2008 | |||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | External Photos | / November 09 2012 | ||||||
1 2 3 4 5 6 7 8 9 | Internal Photos | / November 09 2012 | ||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Parts List/Tune Up Info | |||||||
1 2 3 4 5 6 7 8 9 | Parts List/Tune Up Info | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Test Report | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | |||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Test Report | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | External Photos | / December 06 2012 | ||||||
1 2 3 4 5 6 7 8 9 | Internal Photos | / December 06 2012 | ||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | / December 06 2012 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | Internal Photos | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | |||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | Operational Description | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | External Photos | October 12 2009 / July 01 2010 | ||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | October 12 2009 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Test Setup Photos | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | |||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | RF Exposure Info | |||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | December 12 2008 | ||||||
1 2 3 4 5 6 7 8 9 | ID Label/Location Info | December 12 2008 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | December 12 2008 | ||||||
1 2 3 4 5 6 7 8 9 | Cover Letter(s) | December 12 2008 | ||||||
1 2 3 4 5 6 7 8 9 | Test Report | December 12 2008 |
1 2 3 4 5 6 7 8 9 | Manual | Users Manual | 886.45 KiB |
INSPIRON SETUP GUIDE INSPIRON SETUP GUIDE Regulatory Model P04T series Regulatory Type P04T001 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. If you purchased a Dell n Series computer, any references in this document to Microsoft Windows operating systems are not applicable. __________________ Information in this document is subject to change without notice. 2009 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, YOURS IS HERE, Dell On Call, and DellConnect are trademarks of Dell Inc.; Intel is a registered trademark, Core and Atom are the trademarks of Intel Corporation in the U.S. and other countries; Microsoft, Windows, and Windows start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; Ubuntu is a registered trademark of Canonical Ltd. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. September 2009 P/N CMH9R Rev. A00 Contents Setting Up Your Inspiron Laptop. 5 Before Setting Up Your Computer . 5 Connect the AC Adapter . 6 Connect the Network Cable (Optional) . 7 Press the Power Button . 8 Set Up the Operating System . 9 Install the SIM Card (Optional). 10 Enable or Disable Wireless (Optional). 12 Connect to the Internet (Optional) . 14 Set Up the TV Tuner. 17 Using Your Inspiron Laptop. 18 Right Side Features . 18 Left Side Features . 20 Back Side Features . 22 Computer Base Features. 24 Touch Pad Gestures. 27 Display Features . 28 Removing and Replacing the Battery . 30 Software Features . 32 Dell DataSafe Online Backup . 35 Dell Dock . 36 Solving Problems . 37 Beep Codes . 37 Network Problems . 38 Power Problems. 39 Memory Problems . 40 Lockups and Software Problems . 41 Using Support Tools. 43 Dell Support Center . 43 System Messages . 44 Hardware Troubleshooter . 45 Dell Diagnostics . 46 3 Appendix . 73 Macrovision Product Notice. 73 Information for NOM, or Official Mexican Standard (Only for Mexico). 74 Index . 75 Contents Restoring Your Operating System . 50 System Restore . 51 Dell Factory Image Restore . 52 Operating System Reinstallation . 54 Getting Help . 57 Technical Support and Customer Service . 58 DellConnect . 58 Online Services . 59 Automated Order-Status Service . 60 Product Information. 60 Returning Items for Repair Under Warranty or for Credit . 61 Before You Call. 63 Contacting Dell. 65 Finding More Information and Resources . 66 Basic Specifications . 68 4 Setting Up Your Inspiron Laptop WARNING: Do not block, push objects into, or allow dust to accumulate in the air vents. Do not store your Dell computer in a low-airflow environment, such as a closed briefcase, while it is powered on. Restricting the airflow can damage the computer or cause a fire. CAUTION: Placing or stacking heavy or sharp objects on the computer may result in permanent damage to the computer. This section provides information about setting up your Inspiron laptop. Before Setting Up Your Computer When positioning your computer, ensure that you allow easy access to a power source, adequate ventilation, and a level surface to place your computer. Restricting airflow around your Inspiron laptop may cause it to overheat. To prevent overheating ensure that you leave at least 10.2 cm (4 inches) at the back of the computer and a minimum of 5.1 cm (2 inches) on all other sides. You should never place your computer in an enclosed space, such as a cabinet or drawer when it is powered on. I N S P I R O N 5 Setting Up Your Inspiron Laptop Connect the AC Adapter Connect the AC adapter to the computer and then plug it into an electrical outlet or surge protector. WARNING: The AC adapter works with electrical outlets worldwide. However, power connectors and power strips vary among countries. Using an incompatible cable or improperly connecting the cable to a power strip or electrical outlet may cause fire or permanent damage to your computer. 6 Connect the Network Cable (Optional) To use a wired network connection, connect the network cable. Setting Up Your Inspiron Laptop 7 Setting Up Your Inspiron Laptop Press the Power Button 8 Setting Up Your Inspiron Laptop Set Up the Operating System Your Dell computer is preconfigured with the operating system you selected at the time of purchase. Microsoft Windows To set up Windows for the first time, follow the instructions on the screen. These steps are mandatory and may take some time to complete. The Windows setup screens will take you through several procedures including accepting license agreements, setting preferences, and setting up an Internet connection. CAUTION: Do not interrupt the operating systems setup process. Doing so may render your computer unusable and you will need to reinstall the operating system. Ubuntu To set up Ubuntu for the first time, follow the instructions on the screen. See the Ubuntu documentation that shipped with your computer for more operating system specific information. NOTE: For optimal performance of your computer, it is recommended that you download and install the latest BIOS and drivers for your computer available at support.dell.com. 9 Setting Up Your Inspiron Laptop Install the SIM Card (Optional) Installing a Subscriber Identity Module (SIM) card allows you to browse the Internet, check e-mail, and connect to a Virtual Private Network. To access these features, you must be within the network of your cellular service provider. 1 battery bay 2 SIM card 3 SIM card slot 1 10 3 2 Setting Up Your Inspiron Laptop To install the SIM card:
1. 2. 3. 4. 5. To remove the SIM card, press and eject the SIM card. Turn off your computer. Remove the battery (see Removing and Replacing the Battery on page XX). In the battery bay, slide the SIM card into the SIM card slot. Replace the battery (see Removing and Replacing the Battery on page XX). Turn on your computer. 11 Setting Up Your Inspiron Laptop Enable or Disable Wireless (Optional) 12 icon on the system tray To enable wireless:
1. 2. Turn on your computer. Double-click the or press <F2>. The Wireless Enable/Disable dialog box appears. Select the option(s) you want to enable:
Click Enable Bluetooth Enable Wireless LAN Enable Wireless WAN/GPS OK. 3. 4. Setting Up Your Inspiron Laptop icon on the system tray To disable wireless:
Double-click the 1. or press <F2>. The Wireless Enable/Disable dialog box appears. Clear the option(s) you want to disable:
Enable Bluetooth Enable Wireless LAN Enable Wireless WAN/GPS 2. 3. Click OK. 13 Setting Up Your Inspiron Laptop Connect to the Internet
(Optional) To connect to the Internet, you need an external modem or network connection and an Internet service provider (ISP). If an external USB modem or WLAN adapter is not a part of your original order, you can purchase one at www.dell.com. Setting Up a Wired Connection If you are using a dial-up connection, connect the telephone line to the external USB modem (optional) and to the telephone wall jack before you set up your Internet connection. If you are using a DSL or cable/satellite modem connection, contact your ISP or cellular telephone service for setup instructions. 14 Setting Up a Wireless Connection Before you can use your wireless Internet connection, you need to connect to your wireless router. To set up your connection to a wireless router:
Windows XP NOTE: The following steps were written for the Windows default view, so they may not apply if you set your Dell computer to the Windows Classic view. Ensure that wireless is enabled on your computer (see Enable or Disable Wireless on page XX). Save and close any open files, and exit any open programs. Start Control Panel Network and Click Internet Connections Wireless Network Setup. Follow the instructions on the screen to complete the setup. 1. 2. 3. 4. Windows 7 1. Ensure that wireless is enabled on your computer (see Enable or Disable Wireless on page XX). Save and close any open files, and exit any open programs. Start Control Panel Network Click and Sharing Center Connect to a network. Follow the instructions on the screen to complete the setup. 2. 3. 4. Setting Up Your Inspiron Laptop Setting Up Your Internet Connection ISPs and ISP offerings vary by country. Contact your ISP for offerings available in your country. If you cannot connect to the Internet but have successfully connected in the past, the ISP might have a service outage. Contact your ISP to check the service status, or try connecting again later. Have your ISP information ready. If you do not have an ISP, the Connect to the Internet wizard can help you get one. 15 Setting Up Your Inspiron Laptop To setup your Internet connection:
Windows XP 6. Start Control Panel. Network and Internet Connections, NOTE: The following steps were written for the Windows default view, so they may not apply if you set your Dell computer to the Windows Classic view. Save and close any open files, and exit any open programs. Click Under select Setup or Change Your Internet Connection. Click Setup. The New Connection Wizard appears. Click NOTE: Your computer does not have an internal optical drive. Use an external optical drive or any external storage device for the procedures that involve discs. Connect to the Internet. 1. 2. 3. 4. 5. 16 In the next window, click the appropriate option:
If you do not have an ISP, click Choose from a list of Internet service providers (ISPs). If you have already obtained setup information from your ISP but you did not receive a setup CD, click Set up my connection manually. If you have a setup CD, click I got from an ISP. Use the CD 7. 8. Next. Click If you selected Set up my connection manually in step 6, continue to step 8. Otherwise, follow the instructions on the screen to complete the setup. NOTE: If you do not know which type of connection to select, contact your ISP. Click the appropriate option under How do you want to connect to the Internet?, and click Next. 9. Use the setup information provided by your ISP to complete the setup. Windows 7 1. 2. 3. Save and close any open files, and exit any open programs. Start Control Panel. Click Network and Sharing Center Set up Click a new connection or network Connect to the Internet. The Connect to the Internet window appears. NOTE: If you do not know which type of connection to select, click Help me choose or contact your ISP. Follow the instructions on the screen and use the setup information provided by your ISP to complete the setup. 4. Setting Up Your Inspiron Laptop Set Up the TV Tuner NOTE: Availability of the TV tuner may vary by region. To set up the TV tuner for the first time:
1. 2. Start All Programs. Click Dell Digital TV Dell Digital TV Click and follow the instructions on the screen. Click Click Click Start All Programs. Dell Digital TV Dell Digital TV. Scan To re-configure your TV tuner settings:
1. 2. 3. The scan wizard will scan for the channels available in your region. 17 N O R I P S N I Using Your Inspiron Laptop This section provides information about the features available on your Inspiron laptop. Right Side Features 1 2 3 4 18 Using Your Inspiron Laptop 1 2 3 4 Audio out/Headphone connector Connects to a pair of headphones or to a powered speaker or sound system. Audio in/Microphone connector Connects to a microphone or inputs signal for use with audio programs. USB 2.0 connector Connects to USB devices, such as a mouse, keyboard, printer, external drive, or MP3 player. Network connector Connects your computer to a network or a broadband device if you are using a wired network. 19 Using Your Inspiron Laptop Left Side Features 1 2 3 4 20 Using Your Inspiron Laptop 1 2 VGA connector Connects to a monitor or projector. USB 2.0 connectors (2) Connect to USB devices, such as a mouse, keyboard, printer, external drive, or MP3 player. 3 Antenna in connector (on supported models) Connects to an external antenna, through a MCX connector, to view programs using the TV tuner card (optional). For more information on TV tuner card setup, see Setting up the TV Tuner on page XX. 4 3-in-1 Media Card Reader Provides a fast and convenient way to view and share digital photos, music, videos, and documents stored on the following digital memory cards:
Secure Digital (SD) memory card Secure Digital High Capacity
(SDHC) card Multimedia Card (MMC) Memory Stick Memory Stick PRO 21 Using Your Inspiron Laptop Back Side Features 1 2 22 Using Your Inspiron Laptop 1 Security cable slot Attaches a commercially available security cable to the computer. NOTE: Before you buy an security cable, ensure that it works with the security cable slot on your computer. 2 AC adapter connector Connects to an AC adapter to power the computer and charge the battery. 23 Using Your Inspiron Laptop Computer Base Features 1 2 3 4 5 6 24 Using Your Inspiron Laptop 1 2 3 Power button Turns the computer on or off when pressed. Power/Battery indicator light The light indicates the following states when the computer is powered using either the AC adapter or the battery. AC Adapter Indicator light status Solid white Battery Breathing white off Solid white Breathing white Solid amber off Computer state(s) on off/hibernate standby off/hibernate on standby on/standby off/hibernate Battery charge level charging
<90%
charging
>90%
>10%
>=10%
<10%
n/a NOTE: The battery is charging when the computer is powered using an AC adapter. Hard drive activity light Turns on when the computer reads or writes data. A blinking light indicates hard drive activity. 25 Using Your Inspiron Laptop 4 Keyboard For more information on keyboard, see the Dell Technology Guide available on your hard drive or at support.dell.com/manuals. 5 Touch pad Provides the functionality of a mouse to move the cursor, drag or move selected items, and left-click by tapping the surface. It supports the Scroll feature. For more information, see Touch Pad Gestures on page xx. 6 Touch pad buttons (2) Provide left- and right-click functions like those on a mouse. 26 Touch Pad Gestures Scroll Allows you to scroll through content. The scroll feature includes:
Traditional Scroll Allows you to scroll up and down, or right and left. To scroll up and down:
Move a finger up or down in the vertical scroll zone (extreme right of the touch pad). To scroll right and left:
Move a finger right or left in the horizontal scroll zone (extreme bottom of the touch pad). Using Your Inspiron Laptop Circular Scroll Allows you to scroll up and down, or right and left. To scroll up and down:
Move a finger in the vertical scroll zone (extreme right of the touch pad), in a clockwise circular motion to scroll up or counterclockwise circular motion to scroll down. To scroll right and left:
Move a finger in the horizontal scroll zone (extreme bottom of the touch pad), in a clockwise circular motion to scroll right or counterclockwise circular motion to scroll left. 27 Using Your Inspiron Laptop Display Features The display panel holds a camera and accompanying dual digital microphones. 1 2 3 4 28 Using Your Inspiron Laptop 1 Left digital array microphone Combines with the right digital array microphone to provide high quality sound for video conferencing and voice recording. 2 Camera Built-in camera for video capture, conferencing, and chat. 3 Right digital array microphone Combines with the left digital array microphone to provide high quality sound for video conferencing and voice recording. 4 Display Your display can vary based on selections you made when purchasing your computer. For more information about displays, see the Dell Technology Guide available on your hard drive or at support.dell.com/manuals. 29 Using Your Inspiron Laptop Removing and Replacing the Battery WARNING: Before you begin any of the procedures in this section, follow the safety instructions that shipped with your computer. WARNING: Using an incompatible battery may increase the risk of fire or explosion. This computer should only use a battery purchased from Dell. Do not use batteries from other computers. WARNING: Before removing the battery, shut down the computer, and remove external cables
(including the AC adapter). To remove the battery:
1. 2. Slide the battery release latches to unlock position. Rotate and lift the battery out of the battery bay. To replace the battery:
1. Align the tabs on the battery with the slots in the battery bay and gently press the battery until it clicks into place. 30 2 3 1 4 Using Your Inspiron Laptop 1 battery release latches (2) 2 battery 3 battery bay 4 battery bay slots (3) 31 Using Your Inspiron Laptop Software Features NOTE: For more information about the features described in this section, see the Dell Technology Guide available on your hard drive or at support.dell.com/manuals. Productivity and Communication You can use your computer to create presentations, brochures, greeting cards, fliers, and spreadsheets. You can also edit and view digital photographs and images. Check your purchase order for software installed on your computer. After connecting to the Internet, you can access websites, setup an e-mail account, upload and download files. Entertainment and Multimedia You can use your computer to watch videos, play games, create your own CDs/DVDs, and listen to music and Internet radio stations. You can download or copy pictures and video files from portable devices, such as digital cameras and cell phones. Optional software applications enable you to organize and create music and video files that can be recorded to disc, saved on portable products such as MP3 players and handheld entertainment devices, or played and viewed directly on connected TVs, projectors, and home theater equipment. Customizing the Desktop You can customize your desktop to change the appearance, resolution, wallpaper, screensaver, or other features of your desktop. 32 Windows XP 1. 2. Properties, to open the Display Right-click an open area of the desktop. Click Properties window and learn more about your customization options. Windows 7 1. 2. Right-click an open area of the desktop. Click Personalize, to open the Change the visuals and sounds on your computer window and learn more about your customization options. Customizing Your Energy Settings You can use the power options in your operating system to configure the power settings on your computer. The Microsoft Windows operating system installed on your Dell computer provides the following options:
Automatically balances the Balanced performance of your computer by consuming energy on capable hardware. Using Your Inspiron Laptop Saves power on your Power saver computer by reducing system performance to maximize the life of the computer and by reducing the amount of energy consumed by your computer over its lifetime. High Performance level of system performance on your computer by adapting processor speed to your activity and by maximizing system performance. Provides the highest 33 Using Your Inspiron Laptop Transferring Information to a New Computer To transfer information to a new computer:
Windows XP NOTE: The following instructions are applicable for the Windows default view, and may not apply if you set your computer to the Windows Classic view. Start All Programs Accessories Click System Tools Files and Settings Transfer Wizard. Follow the instructions in the Settings Transfer Wizard wizard. Files and 1. 2. Windows 7 1. 2. Start Control Panel. Click In the search box, type click Transfer files from another computer. Follow the instructions in the Transfer wizard. Transfer and then Windows Easy 3. 34 Backing Up Your Data It is recommended that you periodically back up files and folders on your computer. To back up files:
Windows XP 1. Start All Programs Accessories Click System Tools Backup. Follow the instructions in the Restore wizard. 2. Backup or Windows 7 1. Start Control Panel System Click and Security Backup and Restore. Click Follow the instructions on the Backup wizard. Set up backup.... Configure 2. 3. Using Your Inspiron Laptop Dell DataSafe Online Backup NOTE: Dell DataSafe Online Backup may not be available in all regions. NOTE: A broadband connection is recommended for fast upload/download speeds. Dell DataSafe Online is an automated backup and recovery service that helps protect your photos, music, and other important files. DataSafe Online safely backs up your important files to online storage, and protects your files from catastrophic incidents like theft, fire, or natural disasters. The user name and password setup on your DataSafe Online account protects your data from unauthorized access. For more information, go to delldatasafe.com. To schedule backups:
1. Double click the Dell DataSafe Online icon on the taskbar 2. Follow the instructions that appear on the screen. 35 Using Your Inspiron Laptop Dell Dock The Dell Dock is a group of icons that provides easy access to frequently-used applications, files, and folders. You can personalize the Dock by:
Adding or removing icons Grouping related icons into categories Changing the color and location of the Dock Changing the behavior of the icons Add a Category 1. 2. 3. Add Category. Right-click the Dock, click The Add/Edit Category window is displayed. Enter a title for the category in the Title field. Select an icon for the category from the Select an image: box. Click Save. 4. Add an Icon Drag and drop the icon to the Dock or a category. 36 Remove a Category or Icon 1. Right-click the category or icon on the Dock and click Delete shortcut or Delete category. Follow the instructions on the screen. 2. Personalize the Dock 1. Right-click the Dock and click Setting.... Choose the desired option to personalize the Dock. Advanced 2. Solving Problems This section provides troubleshooting information for your computer. If you cannot solve your problem using the following guidelines, see Using Support Tools on page XX or Contacting Dell on page XX. Beep Codes Your computer might emit a series of beeps during start-up if there are errors or problems. This series of beeps, called a beep code, identifies a problem. Write down the beep code and contact Dell (see Contacting Dell on page XX). NOTE: To replace parts, see the Service Manual at support.dell.com/manuals. Beep Code One Two Three Four Five Six Seven Eight Possible Problem Possible motherboard failure - BIOS ROM checksum failure No RAM detected Possible motherboard failure - Chipset error RAM read/write failure Real Time Clock failure Video card or chip failure Processor failure Display failure I N S P I R O N 37 Solving Problems Network Problems Wireless Connections If the wireless network connection is lost The wireless router is offline or wireless has been disabled on the computer. Check your wireless router to ensure it is powered on and connected to your data source (cable modem or network hub). Interference may be blocking or interrupting your wireless connection. Try moving the computer closer to your wireless router. Re-establish your connection to the wireless router (see Setting Up a Wireless Connection on page XX). 38 Wired Connections If the network connection is lost The cable is loose or damaged. Check the cable to ensure it is plugged in and not damaged. The link integrity light on the integrated network connector lets you verify that your connection is working and provides information on the status:
Green A good connection exists between a 10-Mbps network and the computer. Amber A good connection exists between a 100-Mbps network and the computer. Off The computer is not detecting a physical connection to the network. For assistance, contact your network administrator or ISP. NOTE: The link integrity light on the network connector is only for the wired cable connection. The link integrity light does not provide status for wireless connections. Power Problems If the power light is off The computer is either turned off, in hibernate state or is not receiving power. Press the power button. The computer resumes normal operation if it is off or in hibernate mode. Reseat the AC adapter cable into the power connector on the computer and the electrical outlet. If the computer is plugged into a power strip, ensure that the power strip is plugged into an electrical outlet and that the power strip is turned on. Temporarily bypass power protection devices, power strips, and power extension Solving Problems cables to verify that the computer turns on properly. Ensure that the electrical outlet is working by testing it with another device, such as a lamp. Check the AC adapter cable connections. If the AC adapter has a light, ensure that the light on the AC adapter is on. If the power light is solid white and the computer is not responding The display may not be responding. Press the power button until the computer turns off and then turn it back on. If the problem persists, contact Dell (see Contacting Dell on page xx.) 39 Solving Problems If the power light is blinking white The computer is in standby state or the display may not be responding. Press a key on the keyboard, move the connected mouse or a finger on the touch pad, or press the power button to resume normal operation. If the display is not responding, press the power button until the computer turns off and then turn it back on. If the problem persists, contact Dell (see Contacting Dell on page xx). If you encounter interference that hinders reception on your computer An unwanted signal is creating interference by interrupting or blocking other signals. Some possible causes of interference are:
Power, keyboard, and mouse extension cables. Too many devices connected to a power strip. 40 Multiple power strips connected to the same electrical outlet. Memory Problems If you receive an insufficient memory message Save and close any open files and exit any open programs you are not using to see if that resolves the problem. See the software documentation for minimum memory requirements. Reseat the memory module(s) into the connector(s) (see the Service Manual at support.dell.com/manuals for instructions.) If the problem persists, contact Dell (see Contacting Dell on page xx.) If you experience other memory problems Run the Dell Diagnostics (see Dell Diagnostics on page XX). If the problem persists, contact Dell (see Contacting Dell on page XX). Lockups and Software Problems If the computer does not start up Ensure that the power cable is firmly connected to the computer and to the electrical outlet. If a program stops responding End the program:
1. 2. 3. Press <Ctrl><Shift><Esc> simultaneously. Click Click the program that is no longer responding Click 4. If a program crashes repeatedly Check the software documentation. If necessary, uninstall and then reinstall the program. Applications. End Task. NOTE: Software usually includes installation instructions in its documentation or on the disc (CD or DVD). NOTE: Your computer does not have an internal optical drive. Use an external Solving Problems optical drive or any external storage device for the procedures that involve discs. If the computer stops responding or a solid blue screen appears CAUTION: You might lose data if you are unable to perform an operating system shutdown. If you are unable to get a response by pressing a key on your keyboard or moving your mouse, press the power button until the computer turns off and then restart your computer. If a program is designed for an earlier Microsoft Windows operating system Run the Program Compatibility Wizard. The Program Compatibility Wizard configures a program so that it runs in an environment similar to an earlier version of Microsoft Windows operating system environments. 41 Solving Problems Windows XP 1. Fix a Problem click Getting older Start Help and Support Fixing Click a Problem Application and Software Problems Under programs to run on Windows XP. Read the instructions and then click the Program Compatibility Wizard. Follow the instructions on the screen. 2. 3. 4. Windows 7 1. Start 2. Click Use an older In the search box, type program with this version of Windows and press <Enter>. Follow the instructions on the Compatibility wizard. Program 3. If you have other software problems Back up your files immediately. Use a virus-scanning program to check the hard drive or CDs. 42 menu. Save and close any open files or programs and shut down your computer through the Start Check the software documentation or contact the software manufacturer for troubleshooting information:
Ensure that the program is compatible with the operating system installed on your computer. Ensure that your computer meets the minimum hardware requirements needed to run the software. See the software documentation for information. Ensure that the program is installed and configured properly. Verify that the device drivers do not conflict with the program. If necessary, uninstall and then reinstall the program. Write down any error message that is displayed to help in troubleshooting when Contacting Dell. Using Support Tools Dell Support Center The Dell Support Center is an easy-to-use application that provides information about your computer, personalized service and support resources. To launch the application, click the taskbar. The Dell Support Center home page displays your computers model number, service tag, express service code, and service contact information. icon in the The home page also provides links to access:
Self Help (Troubleshooting, Security, System Performance, Network/Internet, Backup/
Recovery, and Windows operating system) I N S P I R O N Alerts (technical support alerts relevant to your computer) Assistance from Dell (Technical Support with DellConnect, Customer Service, Training and Tutorials, How-To Help with Dell on Call, and Online Scan with PC CheckUp) About Your System (System Documentation, Warranty Information, System Information, Upgrades & Accessories) For more information about Dell Support Center and available support tools, click the Services tab at support.dell.com. 43 Using Support Tools System Messages If your computer has an issue or an error, it may display a System Message that will help you identify the cause and action needed to resolve the issue. NOTE: If the message you received is not listed in the following examples, see the documentation for either the operating system or the program that was running when the message appeared. Alternatively you could see the Dell Technology Guide available on your hard drive or at support.dell.com/manuals or contact Dell (see Contacting Dell on page XX for assistance). Alert! Previous attempts at booting this system have failed at checkpoint [nnnn]. For help in resolving this problem, please note this checkpoint and contact Dell Technical Support The computer failed to complete the boot routine three consecutive times for the 44 same error (see Contacting Dell on page XX for assistance). CMOS checksum error Possible motherboard failure or RTC battery low. Replace the battery
(see the Service Manual at support.dell.com/manuals or see Contacting Dell on page XX for assistance). Hard-disk drive failure Possible hard disk drive failure during POST (see Contacting Dell on page XX for assistance). Hard-disk drive read failure Possible hard disk drive failure during HDD boot test (see Contacting Dell on page XX for assistance). Keyboard failure Keyboard failure or loose cable. Replace the keyboard, (see the Service Manual at support.dell.com/manuals). No boot device available No bootable partition on hard drive, the hard disk drive cable is loose, or no bootable device exists. If the hard drive is your boot device, ensure that the cables are connected and that the drive is installed properly and partitioned as a boot device. Enter system setup and ensure that the boot sequence information is correct (see the Dell Technology Guide available on your hard drive or at support.dell.com/manuals). No timer tick interrupt A chip on the system board might be malfunctioning or motherboard failure (see Contacting Dell on page XX for assistance). Using Support Tools Hardware Troubleshooter If a device is either not detected during the operating system setup or is detected but incorrectly configured, you can use the Hardware Troubleshooter to resolve the incompatibility. To start the Hardware Troubleshooter:
1. 2. Start Help and Support. Click hardware troubleshooter in Type the search field and press <Enter> to start the search. In the search results, select the option that best describes the problem and follow the remaining troubleshooting steps. 3. 45 Using Support Tools Dell Diagnostics If you experience a problem with your computer, perform the checks in Lockups and Software Problems on page XX and run the Dell Diagnostics before you contact Dell for technical assistance. NOTE: Dell Diagnostics works only on Dell computers. NOTE: The Drivers and Utilities disc is optional and may not ship with your computer. See the System Setup section in the Service Manual at support.dell.com/manuals to review your computers configuration information, and ensure that the device that you want to test displays in the system setup program and is active. Start the Dell Diagnostics from your hard drive or from the Drivers and Utilities disc. 46 1. Starting Dell Diagnostics From Your Hard Drive The Dell Diagnostics is located on a hidden diagnostic utility partition on your hard drive. NOTE: If your computer cannot display a screen image, contact Dell (see Contacting Dell on page XX). Ensure that the computer is connected to an electrical outlet that is known to be working properly. Turn on (or restart) your computer. When the DELL immediately. Select Diagnostics from the boot menu and press <Enter>. This will invoke the Pre-Boot System Assessment (PSA) in some computers. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop;
then, shut down your computer and try again. logo appears, press <F12>
2. 3. NOTE: If you see a message stating that no diagnostics utility partition has been found, run the Dell Diagnostics from the Drivers and Utilities disc. If PSA is invoked:
a. b. c. The PSA will start running the tests. If the PSA completes successfully, you will receive the following message:
No problems have been found with this system so far. Do you want to run the remaining memory tests? This will take about 30 minutes or more. Do you want to continue? (Recommended). If you are experiencing memory issues, press <y>, otherwise press <n>. Using Support Tools The following message is displayed Booting Dell Diagnostic Utility Partition. Press any key to continue. Press any key to continue. The Option window appears. Choose An d. If PSA is not invoked:
Press any key to start the Dell Diagnostics from the diagnostics utility partition on your hard drive and to go to the Choose An Option window. 4. 5. Select the test you want to run. If you encounter a problem during a test, a message with the error code and a description of the problem will appear on your screen. Write down the error code and problem description and contact Dell (see Contacting Dell on page XX). 47 Using Support Tools NOTE: The Service Tag for your computer is displayed at the top of each test screen. The Service Tag helps you identify your computer when you contact Dell. When the tests complete, close the test screen to return to the Choose An Option window. To exit the Dell Diagnostics and to restart the computer, click Exit. 6. 7. Starting Dell Diagnostics From the Drivers and Utilities Disc NOTE: Your computer does not have an internal optical drive. Use an external optical drive or any external storage device for the procedures that involve discs. Insert the Shut down and restart the computer. When the DELL logo appears, press <F12>
immediately. NOTE: If you wait too long and the Drivers and Utilities disc. 1. 2. 48 operating system logo appears, continue to wait until you see the Microsoft Windows desktop; then, shut down your computer and try again. NOTE: The next steps change the boot sequence for one time only. On the next start-up, the computer boots according to the devices specified in the system setup program. When the boot device list appears, highlight CD/DVD/CD-RW and press <Enter>. Select the Boot from CD-ROM option from the menu that appears and press <Enter>. Type
<Enter> to proceed. Select the test you want to run. If you encounter a problem during a test, a message with the error code and a description of the problem will appear on your screen. Write down the error code and 1 to start the CD menu and press 3. 4. 5. 6. 7. problem description and contact Dell (see Contacting Dell on page XX). NOTE: The Service Tag for your computer is displayed at the top of each test screen. The Service Tag helps you identify your computer when you contact Dell. When the tests complete, close the test screen to return to the Choose An Option window. To exit the Dell Diagnostics and to restart the computer, click Exit. Remove the Drivers and Utilities disc. 8. 9. 10. Using Support Tools 49 N O R I P S N I Restoring Your Operating System Operating System disc Restore did not resolve your operating system problem. If you received an with your computer, you can use it to restore your operating system. However, using the Operating System disc also deletes all data on the hard drive. Use the disc only if System Restore did not resolve your operating system problem. You can restore your operating system in the following ways:
Restore returns your computer to an System earlier operating state without affecting data files. Use System Restore as the first solution for restoring your operating system and preserving data files. Dell DataSafe Local Backup restores your hard drive to the operating state it was in when you purchased your computer, without erasing the data files. Use this option if System Restore did not resolve your problem. Dell Factory Image Restore returns your hard drive to the operating state it was in when you purchased the computer. This procedure permanently deletes all data on the hard drive and removes any programs installed after you received the computer. Use Dell Factory Image Restore only if System 50 System Restore The Windows operating systems provide a System Restore option which allows you to return your computer to an earlier operating state (without affecting data files) if changes to the hardware, software, or other system settings have left the computer in an undesirable operating state. Any changes that System Restore makes to your computer are completely reversible. CAUTION: Make regular backups of your data files. System Restore does not monitor your data files or recover them. NOTE: The procedures in this document were written for the Windows default view, so they may not apply if you set your Dell computer to the Windows Classic view. Restoring Your Operating System Starting System Restore To restore your computer:
Windows XP 1. 2. Next and follow the instructions on the Start All Programs Acessories Click System Tools System Restore. NOTE: The User Account Control window may appear. If you are an administrator on the computer, click Continue; otherwise, contact your administrator to continue the desired action. Click screen. Windows 7 1. 2. Start. Start Search box, type System Click In the Restore and press <Enter>. NOTE: The User Account Control window may appear. If you are an administrator on the computer, click Continue; otherwise, contact your administrator to continue the 51 Restoring Your Operating System desired action. Click screen. Next and follow the instructions on the 3. In the event that System Restore did not resolve the issue, you may undo the last system restore. Undoing the Last System Restore NOTE: Before you undo the last system restore, save and close all open files and exit any open programs. Do not alter, open, or delete any files or programs until the system restoration is complete. Click In the Restore and press <Enter>. Click Next. Start. Start Search box, type System Undo my last restoration and click 1. 2. 3. 52 Dell Factory Image Restore CAUTION: Using Dell Factory Image Restore permanently deletes all data on the hard drive and removes any programs or drivers installed after you received your computer. If possible, back up the data before using this option. Use Dell Factory Image Restore only if System Restore did not resolve your operating system problem. NOTE: Dell Factory Image Restore may not be available in certain countries or on certain computers. Use Dell Factory Image Restore only as the last method to restore your operating system. This option restores your hard drive to the operating state it was in when you purchased the computer. Any programs or files added since you received your computerincluding data filesare permanently deleted from the hard drive. Data files include documents, spreadsheets, e-mail messages, digital photos, music files, and so on. If possible, back up all data before using Dell Factory Image Restore. Performing Dell Factory Image Restore Turn on the computer. When the Dell logo 1. appears, press <F8> several times to access the Advanced Boot Options window. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop; then, restart your computer and try again. Select The appears. Select a keyboard layout and click To access the recovery options, log on as a local user. To access the command prompt, type administrator in the User name field, then click OK. System Recovery Options window Repair Your Computer. Next. 2. 3. 4. 5. Restoring Your Operating System 6. 7. 8. 9. Next. The Confirm Data Deletion Dell Factory Image Restore. The Dell Click Factory Image Restore welcome screen appears. NOTE: Depending upon your configuration, you may need to select Dell Factory Tools, then Dell Factory Image Restore. Click screen appears. NOTE: If you do not want to proceed with Factory Image Restore, click Cancel. Select the check box to confirm that you want to continue reformatting the hard drive and restoring the system software to the factory condition, then click Next. The restore process begins and may take five or more minutes to complete. A message appears when the operating system and factory-installed applications have been restored to factory condition. Click Finish to reboot the system. 53 Restoring Your Operating System Operating System Reinstallation Before You Begin If you are considering reinstalling the Microsoft Windows operating system to correct a problem with a newly installed driver, first try using Windows Device Driver Rollback. To roll back a device driver:
Windows XP 1. 2. 3. 4. Click Double-click On the RIght-click the device for which the new driver is installed and click Properties. Click the Hardware tab, click Device Manager. Drivers tab Roll Back Driver. Start Control Panel. System. 5. 54 Windows 7 1. 2. 3. 4. Computer. Properties Device Manager. Click Start Right-click Click Right-click the device for which the new driver is installed, and click Properties. Drivers tab Roll Back Driver. Click the 5. If Device Driver Rollback does not resolve the problem, then use System Restore to return your operating system to the operating state it was in before you installed the new device driver. See System Restore on page XX. CAUTION: Before performing the installation, back up all data files on your primary hard drive. For conventional hard drive configurations, the primary hard drive is the first drive detected by the computer. Operating System disc Drivers and Utilities disc To reinstall Windows, you need the following:
NOTE: Your computer does not have an internal optical drive. Use an external optical drive or any external storage device for the procedures that involve discs. Dell Dell NOTE: The Drivers and Utilities disc contains drivers that were installed during the assembly of the computer. Use the Dell Drivers and Utilities disc to load any required drivers. Depending on the region from which you ordered your computer, or whether you requested the disc, the Dell Drivers and Utilities disc and Operating System disc may not ship with your computer. Restoring Your Operating System Reinstalling Microsoft Windows The reinstallation process can take 1 to 2 hours to complete. After you reinstall the operating system, you must also reinstall the device drivers, virus protection program, and other software. 1. Operating System disc. Exit if the Install Windows Save and close any open files and exit any open programs. Insert the Click message appears. Restart the computer. When the DELL logo appears, press <F12>
immediately. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop; then, shut down your computer and try again. 2. 3. 4. 5. 55 Restoring Your Operating System NOTE: The next steps change the boot sequence for one time only. On the next start-up, the computer boots according to the devices specified in the system setup program. When the boot device list appears, highlight CD/DVD/CD-RW Drive and press <Enter>. Press any key to Follow the instructions on the screen to complete the installation. Boot from CD-ROM. 6. 7. 56 Getting Help If you experience a problem with your computer, you can complete the following steps to diagnose and troubleshoot the problem:
1. Dell Technology Guide See Solving Problems on page XX for information and procedures that pertain to the problem your computer is experiencing. See the available on your hard drive or at support.dell.com/manuals for more troubleshooting information. See Dell Diagnostics on page XX for procedures on how to run Dell Diagnostics. Fill out the Diagnostic Checklist on page XX. 2. 3. 4. I N S P I R O N 5. 6. Use Dells extensive suite of online services available at Dell Support (support.dell.com) for help with installation and troubleshooting procedures. See Online Services on page XX for a more extensive list of Dell Support online. If the preceding steps have not resolved the problem, see Before You Call on page XX. NOTE: Call Dell Support from a telephone near or at the computer so that the support staff can assist you with any necessary procedures. NOTE: Dells Express Service Code system may not be available in all countries. 57 Getting Help When prompted by Dells automated telephone system, enter your Express Service Code to route the call directly to the proper support personnel. If you do not have an Express Service Code, open the Dell Accessories folder, double-click the Express Service Code icon, and follow the directions. NOTE: Some of the services are not always available in all locations outside the continental U.S. Call your local Dell representative for information on availability. Technical Support and Customer Service Dells support service is available to answer your questions about Dell hardware. Our support staff use computer-based diagnostics to provide fast, accurate answers. To contact Dells support service, see Before You Call on page XX and then see the contact information for your region or go to support.dell.com. DellConnect DellConnect is a simple online access tool that allows a Dell service and support associate to access your computer through a broadband connection, diagnose your problem and repair it all under your supervision. For more information, go to www.dell.com/dellconnect. 58 Online Services You can learn about Dell products and services on the following websites:
www.dell.com www.dell.com/ap only) www.dell.com/jp www.euro.dell.com www.dell.com/la Caribbean countries) www.dell.ca
(Asian/Pacific countries
(Japan only)
(Europe only)
(Latin American and
(Canada only) You can access Dell Support through the following websites and e-mail addresses:
Dell Support websites support.dell.com support.jp.dell.com support.euro.dell.com
(Japan only)
(Europe only) Getting Help Dell Support e-mail addresses mobile_support@us.dell.com support@us.dell.com la-techsupport@dell.com Caribbean countries only) apsupport@dell.com countries only)
(Asian/Pacific
(Latin America and Dell Marketing and Sales e-mail addresses apmarketing@dell.com countries only) sales_canada@dell.com
(Asian/Pacific
(Canada only) Anonymous file transfer protocol (FTP) ftp.dell.com Log in as user: anonymous, and use your e-mail address as your password. 59 Product Information If you need information about additional products available from Dell, or if you would like to place an order, visit www.dell.com. For the telephone number to call your region or to speak to a sales specialist, see Contacting Dell on page XX. Getting Help Automated Order-Status Service To check on the status of any Dell products that you have ordered, you can go to support.dell.com, or you can call the automated order-status service. A recording prompts you for the information needed to locate and report on your order. For the telephone number to call your region, see Contacting Dell on page XX. If you have a problem with your order, such as missing parts, wrong parts, or incorrect billing, contact Dell for customer assistance. Have your invoice or packing slip handy when you call. For the telephone number to call your region, see Contacting Dell on page XX. 60 Returning Items for Repair Under Warranty or for Credit NOTE: Before you return the product to Dell, make sure to back up any data on the hard drive(s) and on any other storage device in the product. Remove any and all confidential, proprietary and personal information, as well as removable media, such as CDs and PC Cards. Dell is not responsible for any of your confidential, proprietary or personal information; lost or corrupted data; or damaged or lost removable media that may be included with your return. Getting Help Prepare all items being returned, whether for repair or credit, as follows:
1. Call Dell to obtain a Return Material Authorization Number, and write it clearly and prominently on the outside of the box. For the telephone number to call your region, see Contacting Dell on page XX. Include a copy of the invoice and a letter describing the reason for the return. Include a copy of the Diagnostics Checklist
(see Diagnostic Checklist on page XX), indicating the tests that you have run and any error messages reported by the Dell Diagnostics
(see Dell Diagnostics on page XX). Include any accessories that belong with the item(s) being returned (power cables, software, guides, and so on) if the return is for credit. 2. 3. 4. 61 Getting Help 5. Pack the equipment to be returned in the original (or equivalent) packing materials. NOTE: You are responsible for paying shipping expenses. You are also responsible for insuring any product returned, and you assume the risk of loss during shipment to Dell. Collect On Delivery
(C.O.D.) packages are not accepted. NOTE: Returns that are missing any of the preceding requirements will be refused at Dells receiving dock and returned to you. 62 Getting Help Before You Call NOTE: Have your Express Service Code ready when you call. The code helps Dells automated-
support telephone system direct your call more efficiently. You may also be asked for your Service Tag. Locating Your Service Tag The Service Tag is located at the bottom of your computer. 1 1 Service Tag 63 Devices:
Expansion cards:
Are you connected to a network? Yes /No Network, version, and network adapter:
Programs and versions:
See your operating system documentation to determine the contents of the computers start-up files. If the computer is connected to a printer, print each file. Otherwise, record the contents of each file before calling Dell. Error message, beep code, or diagnostic code:
Description of problem and troubleshooting procedures you performed:
Getting Help Remember to fill out the following Diagnostic Checklist. If possible, turn on your computer before you call Dell for assistance and call from a telephone at or near the computer. You may be asked to type some commands at the keyboard, relay detailed information during operations, or try other troubleshooting steps possible only at the computer itself. Ensure that the computer documentation is available. Diagnostic Checklist Name:
Date:
Address:
Phone number:
Service Tag (bar code on the back or bottom of the computer):
Express Service Code:
Return Material Authorization Number
(if provided by Dell support technician):
Operating system and version:
64 Contacting Dell For customers in the United States, call 800-WWW-DELL (800-999-3355). NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-
based support and service options. Availability varies by country and product, and some services may not be available in your area. To contact Dell for sales, technical support, or customer service issues:
1. 2. 3. Visit Select your country or region. Select the appropriate service or support link based on your requirement. Choose the method of contacting Dell that is convenient for you. www.dell.com/contactdell. 4. Getting Help 65 N O R I P S N I Finding More Information and Resources If you need to:
reinstall your operating system. run a diagnostic program for your computer, reinstall notebook system software, or update drivers for your computer, and readme files See:
the Operating System disc the Drivers and Utilities disc NOTE: Drivers and documentation updates can be found at support.dell.com learn more about your operating system, maintaining peripherals, Internet, Bluetooth, networking, and e-mail upgrade your computer with new or additional memory, or a new hard drive reinstall or replace a worn or defective part the Dell Technology Guide available on your hard drive or at support.dell.com/manuals the Service Manual at support.dell.com/manuals NOTE: In some countries, opening and replacing parts of your computer may void your warranty. Check your warranty and return policies before working inside your computer. 66 If you need to:
find safety best practices information for your computer review Warranty information, Terms and Conditions (U.S. only), Safety instructions, Regulatory information, Ergonomics information, and End User License Agreement find your Service tag/Express Service Code You must use the service tag to identify your computer on support.dell.com or to contact technical support find drivers and downloads access technical support and product help check on your order status for new purchases find solutions and answers to common questions locate information for last-minute updates about technical changes to your computer or advanced technical-reference material for technicians or experienced users Finding More Information and Resources See:
the safety and regulatory documents that shipped with your computer and also see the Regulatory Compliance Homepage at www.dell.com/regulatory_compliance the bottom of your computer the Dell Support Center. To launch the Dell Support Center, click the bar support.dell.com icon in the task 67 N O R I P S N I Basic Specifications This section provides information that you may need when setting up, updating drivers for, and upgrading your computer. For more detailed specifications, see the Comprehensive Specifications at support.dell.com/manuals. NOTE: Offerings may vary by region. For more information regarding the configuration of your computer, click Start Help and Support and select the option to view information about your computer. Computer Model Dell Inspiron 1012 Computer Information Processor types Intel Atom Single Core System chipset Intel NM10 Express Memory Memory module connector one user accessible SODIMM connector 68 Memory Memory module capacities Memory configurations possible Memory type 1 GB and 2 GB 1 GB and 2 GB 667/800 MHz DDR2 SODIMM Connectors Audio Mini-Card Network adapter USB VGA one microphone-in connector, one stereo headphone/speaker connector one full Mini-Card slot and two half Mini-Card slots RJ45 connector three 4-pin USB 2.0-compliant connectors 15-hole connector Communications Network adapter 10/100 Ethernet LAN on system board Basic Specifications Communications Wireless Camera Camera resolution Video resolution Display Type Bluetooth wireless technology, WLAN, WWAN/GPS, TV/CMMB (in china only) 1.3 megapixel 640 x 480 at 30 fps
(maximum) 10.1 WSVGA Truelife 1024 x 600 WLED 10.1 HD Truelife 1366 x 768 WLED 69 Basic Specifications Display Dimensions:
Height Width Diagonal 222.72 mm (8.77 inches) 125.28 mm (4.93 inches) 255.52 mm (10.1 inches) Battery Types and dimensions:
6-cell smart lithium ion Depth Height Width Weight 3-cell smart lithium ion 58.23 mm (2.30 inches) 21.5 mm (0.8 inches) 140.6 mm (5. 54 inches) 0.41 kg (0.90 lbs) Depth Height 70 23.1 mm (0.91 inches) 39.04 mm (1.54 inches) Battery Width Weight Voltage Charge time
(approximate):
Operating time 204.14 mm (8.04 inches) 0.165 kg (0.36 lbs) 11.1 VDC (3/6-cell) 3.0 hours (3-cell)/4.0 hours
(6-cell)
(when the computer is turned off) varies depending on operating conditions Coin-cell battery CR-2032 AC Adapter NOTE: Use only AC adapters specified for use with your computer. See the safety information that shipped with your computer. AC Adapter Input voltage Input current 100240 VAC 0.8 A or 1.0 A Input frequency 5060 Hz Output power Output current Rated output voltage Temperature range:
Operating Storage 30 W 1.58 A 19.0 VDC 0 to 40C (32 to 104F) 40 to 70C (40 to 158F) Basic Specifications Physical Height Width Depth Weight (with 6-cell battery):
35.75 mm to 29.25 mm
(1.41 inches to 1.15 inches) 268 mm (10.6 inches) 196.6 mm (7.74 inches) Configurable to less than 1.35 kg (2.98 lbs) Computer Environment Temperature range:
Operating Storage 0 to 35C
(32 to 95F) 40 to 65C
(40 to 149F) 71 Basic Specifications Computer Environment Relative humidity (maximum):
Operating Storage 10% to 90%
(noncondensing) 5% to 95%
(noncondensing) Maximum vibration (using a random vibration spectrum that simulates user environment):
Operating 0.66 GRMS Non-Operating 1.30 GRMS Maximum shock (for operating measured with Dell Diagnostics running on the hard drive and a 2-ms half-sine pulse; for non-operating measured with hard drive in head-parked position and a 2-ms half-sine pulse):
Operating Non-Operating 110 G 160 G 72 Appendix Macrovision Product Notice This product incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation, and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation. Reverse engineering or disassembly is prohibited. I N S P I R O N 73 Appendix Information for NOM, or Official Mexican Standard (Only for Mexico) The following information is provided in the device(s) described in this document in accordance with the requirements of the Official Mexican Standard (NOM):
Importer:
Dell Mxico S.A. de C.V. Paseo de la Reforma 2620 Flat 11 Col. Lomas Altas 11950 Mxico, D.F. Regulatory model number P04T Voltage 100-240 VAC Frequency 50-60 Hz Electricity consumption 0.8 A or 1.0 A Output voltage 19.0 VDC Output intensity 1.58 A For details, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at www.dell.com/regulatory_compliance. 74 Index A airflow, allowing 5 B backups creating 34 Basic specifications 68 before you call 63 C calling Dell 63 CDs, playing and creating 32 computer capabilities 32 computer, setting up 5 conserving energy 33 customer service 58 customizing your desktop 32 your energy settings 33 D damage, avoiding 5 DataSafe Online Backup 35 DellConnect 58 Dell Diagnostics 46 dell dock 36 Dell Factory Image Restore 52 Dell Support Center 43 Dell Technology Guide for further information 66 Diagnostic Checklist 64 drivers and downloads 67 I N S P I R O N 75 Index DVDs, playing and creating 32 E email addresses for technical support 59 energy conserving 33 F finding more information 66 FTP login, anonymous 59 H hardware problems diagnosing 45 Hardware Troubleshooter 45 help getting assistance and support 57 76 I Internet connection 14 ISP Internet Service Provider 14 M memory problems solving 40 N network connection fixing 38 P power problems, solving 39 power strips, using 6 products information and purchasing 60 R reinstalling Windows 54 resources, finding more 66 restoring factory image 52 S setting up internet connection internet connection 15 shipping products for return or repair 61 software features 32 software problems 41 support email addresses 59 support sites worldwide 59 System Messages 44 System Reinstallation 54 System Restore 50 V ventilation, ensuring 5 W warranty returns 61 Windows program compatibility wizard 41 reinstallation 54 wired network connection 7 wireless network connection 38 Index 77 Printed in the U.S.A. www.dell.com | support.dell.com 0CMH9RA00
1 2 3 4 5 6 7 8 9 | OEM Instructions | Users Manual | 529.80 KiB | October 12 2009 / July 01 2010 |
Atheros 802.11n Adapter Model AR5B95 802.11n Adapter Dec 2008 20002009 by Atheros Communications, Inc. All rights reserved. ATHEROS, the Atheros logo, 5-UP, Driving the Wireless Future, Atheros Driven, Atheros Turbo Mode, and the Air is Cleaner at 5-GHz are trademarks of Atheros Communications, Inc. All other trademarks are the property of their respective holders. Notice The information in this document has been carefully reviewed and is believed to be accurate. Nonetheless, this document is subject to change without notice, and Atheros Communications, Inc. (Atheros) assumes no responsibility for any inaccuracies that may be contained in this document, and makes no commitment to update or to keep current the contained information, or to notify a person or organization of any updates. Atheros reserves the right to make changes, at any time, in order to improve reliability, function or design and to attempt to supply the best product possible. Atheros does not represent that products described herein are free from patent infringement or from any other third party right. No part of this document may be reproduced, adapted or transmitted in any form or by any means, electronic or mechanical, for any purpose, except as expressly set forth in a written agreement signed by Atheros. Atheros or its affiliates may have patents or pending patent applications, trademarks, copyrights, maskwork rights or other intellectual property rights that apply to the ideas, material and information expressed herein. No license to such rights is provided except as expressly set forth in a written agreement signed by Atheros. ATHEROS MAKES NO WARRANTIES OF ANY KIND WITH REGARD TO THE CONTENT OF THIS DOCUMENT. IN NO EVENT SHALL ATHEROS BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL SPECULATORY OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBLITY OF SUCH DAMAGES. IN PARTICULAR, ATHEROS SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA TRANSMITTED OR OTHERWISE USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE OR DATA. ATHEROS SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE AS THEY MIGHT OTHERWISE APPLY TO THIS DOCUMENT AND TO THE IDEAS, MATERIAL AND INFORMATION EXPRESSED HEREIN. Document Conventions Text Conventions bold Bold type within paragraph text indicates commands, file names, directory names, paths, output, or returned values. Example: The DK_Client package will not function unless you use the wdreg_install batch file. italic Within commands, italics indicate a variable that the user must specify. Example: mem_alloc size_in_bytes Titles of manuals or other published documents are also set in italics. Courier The Courier font indicates output or display. Example:
Menu Error:Unable to allocate memory for transfer!
The Menu character tag is used for menu items. Example: Choose Edit > Copy.
Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit. Within commands, items enclosed in braces are options from which the user must choose. Within commands, the vertical bar separates options. An ellipsis indicates a repetition of the preceding parameter. The right angle bracket separates successive menu selections. Example: Start > Programs > DK > wdreg_install. Notices NOTE: This message denotes neutral or positive information that calls out important points to the text. A note provides information that may apply only in special cases. Atheros Communications, Inc. COMPANY CONFIDENTIAL December 2009 iii Revision History Revision Dec 2008 Description of Changes Initial Release iv Dec 2008 COMPANY CONFIDENTIAL Atheros Communications, Inc. Contents Introduction ............................................................................................................... 7 System Requirements ........................................................................................ 7 Profile Management ................................................................................................. 7 Create or Modify a Configuration Profile ....................................................... 7 Remove a Configuration Profile ....................................................................... 8 Auto Profile Selection Management ....................................................................... 8 Switching to a Different Configuration Profile ..................................................... 9 Import and Export Profiles ...................................................................................... 9 Importing a Profile .................................................................................................... 9 Exporting a Profile .................................................................................................... 9 TCP/IP Configuration .............................................................................................. 9 Configuring the TCP/IP Address for the network device: ................................. 9 General Tab .............................................................................................................. 10 Advanced Tab .......................................................................................................... 10 Security Tab ............................................................................................................. 11 Using EAP-TLS Security ................................................................................. 12 Using EAP-TTLS Security ............................................................................... 12 Using PEAP (EAP-GTC) Security .................................................................. 13 Using PEAP-MSCHAP V2 Security ............................................................... 14 Using LEAP Security ....................................................................................... 15 Configuring LEAP .................................................................................................. 15 Pre-Shared Encryption Keys .................................................................................. 16 Defining pre-shared encryption keys: .................................................................. 16 Overwriting an Existing Static WEP Key ............................................................ 16 Disabling Static WEP .............................................................................................. 16 Using WPA Passphrase Security .......................................................................... 17 Zero Configuration ................................................................................................. 17 Wireless Network Configuration .......................................................................... 17 Check the Status Information or Diagnostics ...................................................... 18 Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 v Current Status ................................................................................................... 18 Adapter Information Button ................................................................................. 19 Diagnostics Tab ....................................................................................................... 19 Transmitted Frames ................................................................................................ 20 Received Frames ..................................................................................................... 20 Scan Available Networks ....................................................................................... 20 Connecting to a different network ....................................................................... 20 Display Settings ....................................................................................................... 22 ACU Tools ................................................................................................................ 22 Tray Icon .................................................................................................................. 23 Color ......................................................................................................................... 24 Quality ...................................................................................................................... 24 RSSI* ......................................................................................................................... 24 Ad Hoc Mode .......................................................................................................... 24 Ad Hoc Mode Profile Configuration ............................................................. 24 Infrastructure (Access Point) Mode ...................................................................... 25 Infrastructure (Access Point) Mode Profile Configuration ........................ 25 Uninstall an Old Driver ......................................................................................... 26 Additional Security Features ................................................................................. 26 Message Integrity Check (MIC) ............................................................................ 26 Advanced Status Information ............................................................................... 27 Compliance .............................................................................................................. 28 Industry Canada Notice: ....................................... Error! Bookmark not defined. Avis de Conformit la Rglementation dIndustrie Canada: .................. Error!
Bookmark not defined. European Community CE Notice: ................................................................... 28 vi Dec 2008 COMPANY CONFIDENTIAL Atheros Communications, Inc. Introduction The Atheros 802.11n Adapter supports 802.11bg operation. The card uses the Atheros Client Utility (ACU) which is a user-mode utility designed to edit and add profiles for selected Atheros network interface adapters. System Requirements Laptop/ PC containing:
32-bit PCI Express Bus 32 MB memory or greater 300 MHz processor or higher Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6) Profile Management Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility. Add a profile Edit a profile Import a Profile Export a Profile Order profiles Switch to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode (which uses an access point) or ad hoc mode (a group of stations participating in the wireless LAN). Create or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab. To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab. Note that the ACU only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the New button displays an error message. Remove an old profile or modify an existing profile for a new use. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 7 Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button. 2. The Auto Profile Selection Management window appears, with a list of all created profiles in the Available Profiles box. 3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto Selected Profiles box. Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box. 2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority. 3. Click OK. 4. Check the Auto Select Profiles box. 5. Save the modified configuration file. When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the adapter tries the next highest priority profile that matches the SSID, and so on. With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the adapter tries with the next highest priority profile. 8 COMPANY CONFIDENTIAL Atheros Communications, Inc. Switching to a Different Configuration Profile 1. To switch to a different profile, go to the Profile Management tab. 2. Click on the profile name in the Profile List. 3. Click the Activate button. The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength for that profile. Import and Export Profiles Importing a Profile 1. From the Profile Management tab, click the Import button. The Import Profile window appears. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open. The imported profile appears in the profiles list. Exporting a Profile 1. From the Profile Management tab, highlight the profile to export. 2. Click the Export button. The Export Profile window appears. 3. Browse to the directory to export the profile to. 4. Click Save. The profile is exported to the specified location. TCP/IP Configuration Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections. 2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties. 3. Select Internet Protocol (TCP/IP) and click Properties. 4. Click the radio button Use the following IP address, then enter an IP address and Subnet mask. Assigning an IP address and Subnet mask allows stations to operate in access point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click OK to finish. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 9 General Tab In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile. This name must be unique. Profile names are not case sensitive. Client Name Identifies the client machine. Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Configure up to three SSIDs (SSID1, SSID2, and SSID3). Advanced Tab In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. Edit the fields in the Advanced tab of Profile Management to configure the profile. Transmit Power Level Power Save Mode Selects the transmit power level in mW. Actual transmit power may be limited by hardware. Specify:
Maximum mode causes the access point to buffer incoming messages for the wireless adapter. The adapter periodically polls the access point to see if any messages are waiting. Normal uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. Off turns power saving off, thus powering up the wireless adapter continuously for a short message response time. Network Type Specifies the network as either infrastructure or ad hoc. 802.11b Preamble Authentication Mode Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in the 802.11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. Open enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. Shared only allows the adapter to associate with access points that have the same WEP key. 10 COMPANY CONFIDENTIAL Atheros Communications, Inc. For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the adapter should attempt to associate. Security Tab In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window. Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the General and Advanced tabs. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP WPA/WPA2 Passphrase Enables WPA/WPA2 Passphrase security. Click on the Configure button and fill in the WPA/WPA2 Passphrase. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP Pre-Shared Key
(Static WEP) If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Note: If the Lock checkbox is checked, you cannot change any values in this profile. See your system administrator. Enables the use of pre-shared keys that are defined on both the access point and the station. To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-
Shared Keys window. If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 11 allow association. None No security (not recommended). Using EAP-TLS Security To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list. The server/domain name and the login name are filled in automatically from the certificate information. Click OK. 3. Click OK. 4. Activate the profile. Using EAP-TTLS Security To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA/WPA2 radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TTLS from the drop-down menu. Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user name. 4. Click Advanced and:
OR: Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) 12 COMPANY CONFIDENTIAL Atheros Communications, Inc. Enter the domain name of the server from which the client will accept a certificate. Change the login name if needed. 5. Click OK. 6. Enable the profile. Using PEAP (EAP-GTC) Security To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-GTC) from the drop-down menu. To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. To avoid the need to log on again after resuming operation (for example, after your computer goes into standby or hibernate mode), check Always Resume the Secure Session. 3. Select the appropriate network certificate authority from the drop-down list. 4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 5. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication. 6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 13 Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu. To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 5. Click OK. 6. Enable the profile. 14 COMPANY CONFIDENTIAL Atheros Communications, Inc. Using LEAP Security To use security In the Atheros Client Utility, access the Security tab in the Profile Management window. LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager. Configuring LEAP On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. drop-down menu. 1. Click the Configure button. 2. Specify a user name and password. Select to Use Temporary User Name and Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP user name. OR: Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process. Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use. 3. Enter the user name and password. 4. Confirm the password. 5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server. (default) OR: Enter a specific domain name. 6. If desired, check No Network Connection Unless User Is Logged In to force the wireless adapter to disassociate after logging off. 7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 15 Pre-Shared Encryption Keys Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces). Encryption Keys WEP Keys
(1-4) Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the key as the default encryption key. WEP Key Size Defines the size for each encryption key. The options include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII) 4. Click OK for the changes to take effect. Overwriting an Existing Static WEP Key 1. Click the Pre-Shared Key radio button on the Security tab. 2. Click on Configure. 3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click in the field of the existing static WEP key to overwrite. 4. Delete the asterisks in that field. 5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP To disable static WEP for a particular profile, Select any other security option on the Profile Management tab to automatically disable static WEP OR: choose None on the Security tab to disable security, and click OK (not recommended). 16 COMPANY CONFIDENTIAL Atheros Communications, Inc. Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. Zero Configuration This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS). Wireless Network Configuration The Windows WZCS is a service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured. To set Zero Configuration on Windows XP, take the following steps:
1. 2. Select the check box Use Windows to configure my wireless network settings to set In Windows XP, open the Wireless Network Configuration Properties dialog box. Zero Configuration. When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles, thus users can not ( create new profiles with different settings while using Windows Zero Configuration. The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Profile Management tab of the ACU. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 17 In Windows XP, open the Wireless Network Configuration Properties dialog box. To turn Zero Configuration off on Windows XP, take the following steps:
1. 2. Clear the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the ACU Profile Management tab. Check the Status Information or Diagnostics The Atheros client utility includes a number of tools to display current diagnostics and status information. Check current status Check driver information Check receive and transmit diagnostics Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Current Status screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the General tab. Link Status Shows whether the station is associated to the wireless network. Wireless Mode Displays the wireless mode. Configure the wireless mode on the Advanced tab. IP Address Displays the computer's IP address. Network Type The type of network the station is connected to. Options include:
Infrastructure (access point) Ad Hoc Configure the network type on the Advanced tab. Current Channel Shows the currently connected channel. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Signal Strength Shows the strength of the signal. Click the Advanced button to see the advanced status diagnostics. 18 COMPANY CONFIDENTIAL Atheros Communications, Inc. Adapter Information Button The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name Name of the wireless network adapter. MAC Address MAC address of the wireless network adapter. Driver Driver name and path of the wireless network adapter driver. Driver Version Version of the wireless network adapter driver. Driver Date Creation date of the wireless network adapter driver. Client Name Name of the client computer. Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The Diagnostics tab does not require any configuration. It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received Broadcast packets transmitted and received Unicast packets transmitted and received Total bytes transmitted and received The Adapter Information button has general information about the wireless network adapter and NDIS driver. The Advanced Statistics button to shows statistics for diagnostics for frames received by or transmitted to the wireless network adapter:
Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 19 Transmitted Frames Frames transmitted OK Frames retried Frames dropped No ACK frames ACK frames RTS frames Clear-to-send (CTS) frames No CTS frames Retried RTS frames Retried data frames Received Frames Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile for that network. Infrastructure
(AP) Network Connected Infrastructure
(AP) Network 20 COMPANY CONFIDENTIAL Atheros Communications, Inc. Ad Hoc Network Connected Ad Hoc Network Encryption Active Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 21 Display Settings To change the display settings, choose Options > Display Settings from the menu. The display settings dialog box contains tools to set the:
Signal Strength Display Units Sets the units used when displaying signal strength: percentage (%) or dBm. Refresh Interval Use the up/down arrows to set the display refresh interval in seconds. Data Display Sets the display to cumulative or relative:
Relative displays the change in statistical data since the last update. Cumulative displays statistical data collected since opening the profile. ACU Tools Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio Enable or disable the RF Signal on all Atheros station reference designs. Enable/Disable Tray Icon Enable or disable the tray icon. Troubleshooting Run the optional Troubleshooting Utility. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Atheros Client Utility application. 22 COMPANY CONFIDENTIAL Atheros Communications, Inc. Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address. Right-click on the tray icon to:
Help Open the online help. Open Atheros Client Utility Launch the Atheros Client Utility (ACU). Use the ACU to configure a profile or view status and statistics information. Troubleshooting Run the Troubleshooting Utility. Preferences Set the ACU startup and menu options. Check to start the program automatically when Windows starts, and check menu items that should appear on the popup menu. Enable/Disable Radio Enable or disable the RF signal. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to the access point. Select Profile Click a configuration profile name to switch to. If no Show Connection Status Shows whether auto profile selection is enabled. configuration profile exists for a connection, add a profile. This window displays connection information:
Active Profile Displays the active configuration profile name. Auto Profile Selection Connection Status Link Quality SSID Access Point Name Access Point IP Address Link Speed Adapter IP Address Displays whether the adapter is connected to a wireless network. Lists the quality of the link connection. Displays the SSID of the associated network. Shows the name of the AP the wireless adapter is connected to. Shows the IP address of the access point the wireless adapter is connected to. Lists the speed of the link connection. Displays the IP address of the wireless adapter. Exit Exit the Atheros Client Utility application. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 23 The colors are defined as follows:
Color Green Green Yellow Red Gray Quality Excellent Good Poor Poor RSSI*
20 dB +
10-20 dB +
5-10 dB
< 5 dB No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage. Enable or disable the tray icon in the Action menu. Ad Hoc Mode In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP). To connect to an ad hoc network, configure the profile for ad hoc mode. Ad Hoc operation may be limited by Hardware to meet regulatory requirements. Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab) Transmit Power Level 802.11b Preamble (if using 802.11b) Wireless Mode When Starting an Ad Hoc Network 24 COMPANY CONFIDENTIAL Atheros Communications, Inc. Make sure to also edit the General and Security tabs. Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here. To connect to an access point network, configure the profile for access point mode. Infrastructure (Access Point) Mode Profile Configuration To configure a profile in infrastructure (access point) mode, change the Network Type in the Advanced tab. For access point mode, modify the settings:
Power Save Mode 802.11b Preamble (if using 802.11b) Wireless Mode 802.11 Authentication Mode Make sure to also edit the General and Security tabs. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 25 Uninstall an Old Driver Uninstall an old driver before upgrading to a new NDIS driver release. To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4. 1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros AR500x Wireless Network Adapter, and choose Uninstall. 2. Click OK to uninstall the device. 3. When the device is uninstalled from Device Manager, search for and delete the driver files that reside in the system. a. Go to the Start menu and choose Search > For Files or Folders. b. Enter oem*.inf in the Search for files or folders named: field, and enter Atheros in the Containing text: field. c. Click Search Now. A few files matching these criteria are possible, if previous drivers have not been removed properly. d. Choose the files that have been found and delete them from the system. 4. To complete the uninstallation, remove the file ar5211.sys from the folder
\WINNT\system32\drivers. Additional Security Features These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point. Message Integrity Check (MIC) MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering. Temporal Key Integrity Protocol (TKIP) This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys. Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. 26 COMPANY CONFIDENTIAL Atheros Communications, Inc. Advanced Status Information Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen. Network Name (SSID) Displays the wireless network name. Configure the network name on the General tab. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Authentication Type Displays the authentication mode. Message Integrity Check Configure the authentication mode on the General tab. Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets. Associated AP Name Displays the name of the access point the wireless adapter is Associated AP IP Address Associated AP MAC Address associated to. Shows the IP address of the access point the wireless adapter is associated to. Displays the MAC address of the access point the wireless adapter is associated to. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. Configure the power save mode on the Advanced tab. Current Power Level Displays the transmit power level rate in mW. Current Signal Strength Shows the current signal strength in dBm. Current Noise Level Displays the current noise level in dBm. Up Time Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds. 802.11b Preamble Displays the 802.11b preamble format. Configure the preamble format on the Advanced tab. Current Receive Rate Shows the current receive rate in Mbps. Current Transmit Rate Displays the current transmit rate in Mbps. Channel Shows the currently connected channel. Frequency Displays frequency the station is using. Channel Set Shows the current channel set. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 27 Regulatory Compliance Notices USA-Federal Communications Commission (FCC) FCC Radio-Frequency Exposure & Approval Conditions:
FCC ID: PPD-AR5B95 1. Antennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of user during normal operating condition. 2. Only those antennas filed under FCC ID:PPD-AR5B95 with same type and lesser gain can be used with this device. 3. When the Minicard is installed in a netbook/notebook/laptop PC where the antenna location is less than 20 cm separation distance to the body of the user, additional equipment authorization is required except the conditions listed below:
1. Antenna must be installed at the position to provide at least 6.5 cm to the body of user. Antenna-to-user distance is measured by positioning display screen open 90 degree to the keyboard.. 4. The regulatory label on the final system must include the statement: Contains FCC ID:PPD-AR5B95 or using electronic labeling method as documented in KDB 784748. 5. The final system integrator must ensure there is no instruction provided in the user manual or customer documentation indicating how to install or remove the transmitter module except such device has implemented two-ways authentication between module and the host system.. 6. Simultaneous Transmission Requirements 1. When multiple transmitters and antennas transmit simultaneously in a laptop/notebook/netbook, the following may be used to determine simultaneous transmission SAR evaluation reduction or exclusion requirements.
(a) Identify all possible combinations of simultaneous transmission configurations for all transmitters and antennas installed in the display screen and keyboard of the intended host computer configurations
(b) Drawingsshowingantennalocationsandseparationdistancesbetweeneachof simultaneoustransmittingantenna(s)andantennatouser.
(c) FCCIDofalltransmitters,maximumaverageconductedoutputpowerineach transmissionmodeandfrequencyband,operatingconfigurationsandexposure conditionsapprovedfortheindividualtransmitters.
(d) Thetypeandphysicaldimensionsofantennasincorporatedintheintendedhost configurations
(e) Antennagainspecifiedbytheantennamanufacturerforantennasqualifiedfor mobileexposureconditions
(f) otherrelevantinformationandrestrictionsrequiredbytheequipment certificationsofindividualtransmitters,includingantennachanges 28 COMPANY CONFIDENTIAL Atheros Communications, Inc. 2. For each simultaneous transmission configuration identified in 6.1, if the conditions in a) or b) below are satisfied and fully documented in the SAR report or Class I permissive change documentation, simultaneous transmission SAR evaluation is not required for that configuration a) when the [( of the highest measured 1-g SAR for each portable transmitter/antenna included in the simultaneous transmission configuration ) / 1.6 W/kg] + of [(the highest MPE for each mobile transmitter/antenna included in the simultaneous transmission configuration) / (the corresponding MPE limit)] <
1; or b) for antennas included in the simultaneous transmission configuration that require SAR evaluation, when the separation distance between each antenna pair is i) greater than 5 [(SAR1 + SAR2) / 1.6]1.5 cm, rounded to the nearest cm, and ii) the of [(the highest MPE for each mobile transmitter/antenna included in the simultaneous transmission configuration) / (the corresponding MPE limit)]
< 1 where: in a) excludes antennas that do not require SAR evaluation, and MPE does not apply to displays < 10 diagonal for both a) and b) 3. If simultaneous transmission condition does not meet requirements described above, please contact the grantee who is responsible for product compliance to determine the applicable simultaneous transmission SAR evaluation procedures and applicable equipment authorization procedure. 7. AR5B95 must be installed and used in strict accordance with the manufacturers instructions as described in the user documentation that comes with the product. The following regulatory compliance information and information to the user must be included in the user manual of final system. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna
-Increase the distance between the equipment and the receiver.
-Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. Caution: Exposure to Radio Frequency Radiation. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 29 To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. The antenna(s) used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. 30 COMPANY CONFIDENTIAL Atheros Communications, Inc. Canada Industry Canada (IC) This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. L utilisation de ce dispositif est autorise seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l utilisateur du dispositif doit tre prt accepter tout brouillage radiolectrique reu, mme si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. The term "IC" before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Pour empecher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit etre utilize a l'interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal. Si le matriel (ou son antenne d'emission) est installe a l'exterieur, il doit faire l'objet d'une licence. Caution: Exposure to Radio Frequency Radiation. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canadas website www.hc-sc.gc.ca/rpb. European Community CE Notice:
The CE! mark indicates compliance with the essential requirements of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
EN 300 328 EN 301 489-17 EN 60950 Marking by the symbol: ! indicates that usage restrictions apply in countries listed on this products packaging. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 31 Taiwan DGT Radio Compliance:
2.4GHz Operation 32 COMPANY CONFIDENTIAL Atheros Communications, Inc. Atheros Communications, Incorporated 5480 Great America Parkway Santa Clara, CA 95054 t: 408/773-5200 f: 408/773-9940 www.atheros.com Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2008 33
1 2 3 4 5 6 7 8 9 | User Manual Addendum | Users Manual | 25.67 KiB |
FCC Radiation Exposure Statement WARNING: The radiated output power of the Dell Wireless WLAN Card devices is far below the FCC radio frequency exposure limits. Nevertheless, the Dell Wireless WLAN Card devices should be used in such a manner that the potential for human contact during normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequency exposure limits, you should keep a distance of at least 20 cm between you (or any other person in the vicinity) and the antenna that is built into the printer. To determine the location of the antenna within your printer, check the information posted on the general Dell support site at http://support.dell.com. This device has also been evaluated for and shown compliant with the FCC RF exposure limits under portable exposure conditions (antennas are within 20 cm of a person's body) when installed in certain specific OEM configurations. Details of the authorized configurations can be found at http://www.fcc.gov/oet/fccid/help.html by entering the FCC ID number on the device. Interference Statement This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the manufacturer's instruction manual, may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1) This device may not cause harmful interference. 2) This device must accept any interference received, including interference that may cause undesired operation. Notice: The FCC regulations provide that changes or modifications not expressly approved by Dell Inc. could void your authority to operate this equipment. These limits are designed to provide reasonable protection against harmful interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference with radio or television reception, which can be determined by turning the equipment off and on, you are encouraged to try to correct the interference by one or more of the following measures:
Reorient the receiving antenna. Relocate the system with respect to the receiver. Move the system away from the receiver. Plug the system into a different outlet so that the system and the receiver are on different branch circuits. If necessary, consult a representative of Dell Inc. or an experienced radio/television technician for additional suggestions. NOTE: This Dell Wireless WLAN Card must be installed and used in strict accordance with the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. Modifications not expressly approved by Dell could void your authority to operate the equipment. instructions as described the manufacturer's in This device must not be co-located or operating in conjunction with any other antenna or transmitter.
1 2 3 4 5 6 7 8 9 | User manual | Users Manual | 3.45 MiB | / November 09 2012 |
Lenovo IdeaPad Y480/ Y580 User Guide V1.0 L e n o v o C h n a i New World. New Thinking.TM www.lenovo.com 2 0 1 2 V1.0_en-US Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General Information Guide first. Some instructions in this guide may assume that you are using Windows 7. If you are using other Windows operating system, some operations may be slightly different. If you are using other operating systems, some operations may not apply to you. The features described in this guide are common to most models. Some features may not be available on your computer and/or your computer may include features that are not described in this user guide. The illustrations used in this manual are for Lenovo IdeaPad Y580 unless otherwise stated. The illustrations in this manual may differ from the actual product. Please refer to the actual product. Regulatory Notice To refer to it, go to http://consumersupport.lenovo.com/ and click User guides and manuals. First Edition (February 2012) Copyright Lenovo 2012. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant a General Services Administration GSA contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Contents Chapter 1. Getting to know your computer .......................................................1 Top view .........................................................1 Left-side view ................................................4 Right-side view..............................................5 Front view ......................................................6 Bottom view ...................................................7 Chapter 2. Learning the basics ...................9 First use...........................................................9 Using AC adapter and battery ..................11 Using the touchpad.....................................12 Using the keyboard.....................................13 Connecting external devices......................16 Special keys and buttons............................19 System status indicators.............................21 Securing your computer.............................22 Chapter 3. Connecting to the Internet ..... 23 Wired connection ........................................ 23 Wireless connection .................................... 24 Chapter 4. OneKey Rescue system ......... 25 OneKey Rescue system .............................. 25 Chapter 5. Troubleshooting...................... 27 Frequently asked questions....................... 27 Troubleshooting .......................................... 29 Appendix. CRU instructions..................... 33 Replacing the battery.................................. 33 Replacing the hard disk drive................... 34 Replacing memory...................................... 37 Removing the optical drive ....................... 40 Trademarks ................................................ 41 i Chapter 1. Getting to know your computer Top view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Y480 f g h i ab b c d e j Note: The illustrations in this manual may differ from the actual product. Please refer to the actual product.
Attention:
Do NOT open the display panel beyond 130 degrees. When closing the display panel, be careful NOT to leave pens or any other objects in between the display panel and the keyboard. Otherwise, the display panel may be damaged. 1 Chapter 1. Getting to know your computer
Y580 f g h i ab b c d e j k Integrated camera Use the camera for video communication. Built-in microphone The built-in microphone (with noise reduction) can be used for video conferencing, voice narration, or simple audio recordings. Wireless module antennas The built-in antennas ensure optimal reception of wireless radio. Computer display The LCD display provides brilliant visual output. JBL speakers The stereo speakers provide rich and powerful sound. a b c d e 2 Chapter 1. Getting to know your computer f g Power button Press this button to turn on the computer. OneKey Rescue system button Press this button to start OneKey Rescue system when the computer is powered off. Note: For details, see OneKey Rescue system on page 25. h OneKey Theater button Touch this button to select a preferred scenario mode. Note: For details, see OneKey Theater button on page 20. i Volume button Mute/Unmute. j Touchpad The touchpad functions as a conventional mouse. Note: For details, see Using the touchpad on page 12. k Numeric keypad
(Y580) For details, see Using the keyboard on page 13. 3 Chapter 1. Getting to know your computer Left-side view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b c ed f a Kensington slot Attach a security lock (not supplied) here. Note: For details, see Attaching a security lock (not supplied) on page 22. b Fan louvers Dissipate internal heat. Note: Make sure that none of the fan louvers are blocked or else overheating of the computer may occur. VGA port RJ-45 port Connects to external display devices. This port connects the computer to an Ethernet network. Note: For details, see Wired connection on page 23. HDMI port USB port Connects to devices with HDMI input such as a TV or a display. Connects to USB devices. Notes:
The blue port supports USB 3.0. For details, see Connecting USB devices on page 17. c d e f 4 Chapter 1. Getting to know your computer Right-side view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Y480
Y580 a b c e c f dcba e c f a Headphone jack Connects to external headphones.
Attention:
Listening to music at high volume over extended periods of time may damage your hearing. b c Microphone jack Connects to external microphones. USB port Connects to USB devices. Notes:
The blue port supports USB 3.0. For details, see Connecting USB devices on page 17. d TV-in jack
(on select models) Attach an external TV antenna here. e Optical drive Reads/Burns optical disks. f AC power adapter jack Connect the AC adapter here. Note: For details, see Using AC adapter and battery on page 11. 5 Chapter 1. Getting to know your computer Front view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b a System status indicators For details, see System status indicators on page 21. b Memory card slot Insert memory cards (not supplied) here. Note: For details, see Using memory cards (not supplied) on page 16. 6 Chapter 1. Getting to know your computer Bottom view - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Y480 a b c d 7 Chapter 1. Getting to know your computer
Y580 a b c d Battery latch - spring loaded The spring-loaded battery latch keeps the battery pack secured in place. Battery pack For details, see Using AC adapter and battery on page 11. Battery latch - manual The manual battery latch is used to keep the battery pack secured in place. Hard disk drive
(HDD) / Memory / Mini PCI Express Card slot compartment a b c d 8 Chapter 2. Learning the basics First use - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Reading the manuals Read the supplied manuals before using your computer.
Connecting to the power The supplied battery pack is not fully charged at purchase. To charge the battery and begin using your computer, insert the battery pack and connect the computer to an electrical outlet. The battery is automatically charged while the computer is running on AC power. Installing the battery pack Refer to the supplied Setup Poster to install the battery pack. Connecting the computer to an electrical outlet 1 Connect the power cord to the AC adapter. 2 Connect the AC adapter to the AC power adapter jack of the computer firmly. 3 Plug the power cord into an electrical outlet.
Turning on the computer Press the power button to turn on the computer.
Configuring the operating system You may need to configure the operating system when it is first used. The configuration process may include the procedures below.
Accepting the end user license agreement
Configuring the Internet connection
Registering the operating system
Creating a user account 9 Chapter 2. Learning the basics
Putting your computer into sleep state or shutting it down When you finish working with your computer, you can put it into sleep state or shut it down. Putting your computer into sleep state If you will be away from your computer for only a short time, put the computer into sleep state. When the computer is in sleep state, you can quickly wake it to resume use, and bypass the startup process. To put the computer into sleep state, do one of the following.
Click
Press Fn + F1. and select Sleep from the Start menu. Note: Wait until the power indicator light starts blinking (indicating that the computer is in sleep state) before you move your computer. Moving your computer while the hard disk is spinning can damage the hard disk, causing loss of data. To wake the computer, do one of the following.
Press the power button.
Press any key on the keyboard. Shutting down your computer If you are not going to use your computer for a day or two, shut it down. To shut down your computer, click and select Shut down from the Start menu. 10 Chapter 2. Learning the basics Using AC adapter and battery - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Checking battery status You can determine the percentage of battery power remaining by checking the battery icon in the notification area. Note: As each computer user has different habits and needs, it is difficult to predict how long a battery charge will last. There are two main factors:
The amount of energy stored in the battery when you commence work. The way you use your computer: for example, how often you access the hard disk drive and how bright you make the computer display.
Charging the battery When you find that the battery power is low, you need to charge the battery or replace it with a fully charged one. You need to charge the battery in any of the following situations:
When you purchase a new battery
If the battery status indicator starts blinking
If the battery has not been used for a long time Notes:
You are advised to insert the battery pack when using your computer to prevent small particles from
entering the inside of your computer. To increase the life of the battery pack, the computer does not start recharging the battery immediately after it drops from fully charged.
Charge the battery at a temperature between 50 F and 86 F (10 C-30 C).
Full charge or discharge is not required.
Removing the battery pack If you are not going to use the computer for an extended period of time, or if you need to send your computer to Lenovo for service, etc. remove the battery pack from the computer. Before removing the battery pack, make sure the computer has been shut down.
Handling the battery If the rechargeable battery pack is replaced with an incorrect type, there may be danger of an explosion. The battery pack contains a small amount of harmful substances. To avoid possible injury and detriment to the environment, pay attention to the following points:
Replace only with a battery of the type recommended by Lenovo.
Keep the battery pack away from fire.
Do not expose the battery pack to water or rain.
Do not attempt to disassemble the battery pack.
Do not short-circuit the battery pack.
Keep the battery pack away from children.
Do not put the battery pack in trash that is disposed of in landfills. When disposing of the battery, comply with local ordinances or regulations and your companys safety standards. 11 Chapter 2. Learning the basics Using the touchpad - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
a b a Touchpad b Touchpad button To move the cursor on the screen, slide your fingertip over the pad in the direction in which you want the cursor to move. The function of the left/right side corresponds to that of the left/right mouse button on a conventional mouse. Notes:
You can enable/disable the touchpad using Fn + F6.
When the touchpad indicator is lit, the touchpad is disabled. 12 Chapter 2. Learning the basics Using the keyboard - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer has a numeric keypad and function keys incorporated in its standard keyboard.
Numeric keypad Y480 The keyboard has keys that, when enabled, work as a 10-key numeric keypad. To enable or disable the numeric keypad, press Fn + F8. Y580 The keyboard has a separate numeric keypad. To enable or disable the numeric keypad, press the Num Lock key. Note: The Num lock indicator will light on if the numeric keypad is enabled. 13 Chapter 2. Learning the basics
Function key combinations Through the use of the function keys, you can change operational features instantly. To use this function, press and hold Fn
; then press one of the function keys a b
. b a 14 Chapter 2. Learning the basics The following describes the features of each function key. Fn + Esc:
Turn on/off the integrated camera. Fn + F1:
Fn + F2:
Fn + F3:
Fn + F4:
Fn + F5:
Fn + F6:
Enter sleep mode. Turn on/off the backlight of the LCD screen. Open the interface for the display device switch to select this notebook or an external display. Open the interface for display resolution settings. Open the interface for integrated wireless devices settings (on/off). Enable/Disable the touchpad. Fn + F8 (Y480):
Enable/Disable the numeric keypad. Fn + F9:
Fn + F10:
Fn + F11:
Fn + F12:
Start/Pause playback of Windows Media Player. Stop playback of Windows Media Player. Skip to the previous track. Skip to the next track. Fn + Insert (Y580):
Fn + PgUp (Y480):
Enable/Disable the scroll lock. Fn + PrtSc:
Fn + Home:
Fn + End:
Activate the system request. Activate the pause function. Activate the break function. Fn + PgDn (Y480):
Activate the insert function. Fn + / :
Fn + / :
Fn + Space
(on select models):
Increase/Decrease display brightness. Increase/Decrease sound volume. Enable/Disable the keyboard backlight. 15 Chapter 2. Learning the basics Connecting external devices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Your computer has a wide range of built-in features and connection capabilities.
Using memory cards (not supplied) Your computer supports the following types of memory cards:
Secure Digital (SD) card
Secure Digital PRO (SD PRO) card
MultiMediaCard (MMC)
Memory Stick (MS)
Memory Stick PRO (MS PRO)
xD-Picture (xD) card Notes:
Insert ONLY one card in the slot at a time. This card reader does not support SDIO devices (e.g., SDIO Bluetooth, etc.). Inserting a memory card 1 Push the dummy card until you hear a click. Gently pull the dummy card out of the memory card slot. Note: The dummy card is used for preventing dust and small particles from entering the inside of your computer when the memory card slot is not in use. Retain the dummy card for future use. 2 Slide the memory card in until it clicks into place. Removing a memory card 1 Push the memory card until you hear a click. 2 Gently pull the memory card out of the memory card slot. Note: Before removing the memory card, disable it via Windows safely remove hardware and eject media utility to avoid data corruption. 16 Chapter 2. Learning the basics
Connecting USB devices You can connect a USB device to your computer by inserting its USB plug (Type A) into the USB port on your computer. The first time you plug a USB device into a particular USB port on your computer, Windows automatically installs a driver for that device. After the driver is installed, you can disconnect and reconnect the device without performing any additional steps. Note: Typically, Windows detects a new device after connecting it, and then installs the driver automatically. However, some devices may require you to install the driver before connecting. Check the documentation provided by the devices manufacturer before connecting the device. Before disconnecting a USB storage device, make sure your computer has finished transferring data by that device. Click the Safely Remove Hardware icon in the notification area of Windows to remove the device before disconnecting. Note: If your USB device uses a power cord, connect the device to a power source before connecting it. Otherwise, the device may not be recognized. 17 Chapter 2. Learning the basics
Connecting a Bluetooth device If your computer has an integrated Bluetooth adapter card, it can connect to and transfer data wirelessly to other Bluetooth enabled devices, such as notebook computers, PDAs and cell phones. You can transfer data between these devices without cables and up to 10 meters range in open space. Note: The actual maximum range may vary due to interference and transmission barriers. To get the best possible connection speed, place the device as near your computer as possible. Enabling Bluetooth communications on your computer Press Fn + F5 to make configuration. Notes:
When you do not need to use the Bluetooth function, turn it off to save battery power.
You need to pair the Bluetooth enabled device with your computer before you can transfer data between them. Read the documentation supplied with the Bluetooth enabled device for details on how to pair the device with your computer. 18 Chapter 2. Learning the basics Special keys and buttons - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
b c a
OneKey Rescue system button a
When the computer is powered-off, press this button to start Lenovo OneKey Rescue system.
In Windows operating system, press this button to start Lenovo OneKey Recovery system. Note: For details, see OneKey Rescue system on page 25. 19 Chapter 2. Learning the basics
OneKey Theater button b Lenovo OneKey Theater provides three scenario modes for using your computer in different ways: normal mode, movie mode, music mode, picture mode, and intelligent mode. These modes are preset enhancements by Lenovo to improve visual and aural experiences via your computer in different usage scenarios. You can manually choose between normal, movie and intelligent mode. Picture or music mode is automatically selected if your computer is in intelligent mode. To manually select a desired mode:
1 Press and release the OneKey Theater button to display the on-screen menu. 2 Keep pressing and releasing the button until the icon of your desired mode is highlighted. The computer switches to the selected mode after 2 seconds. Normal mode The default mode. Movie mode Provides enhanced visual and audio output. Intelligent mode Lenovo OneKey Theater switches intelligently between movie mode, music mode, and picture mode according to the application you are using. Notes:
You can enable or disable the OneKey Theater feature via the Start menu.
Some applications may not be compatible with intelligent mode.
Volume button c Mute/Unmute 20 Chapter 2. Learning the basics System status indicators - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
These indicators inform you of the computer status. a b c d e a b c d e Touchpad indicator Battery status indicator Power status indicator Caps lock indicator Num lock indicator 21 Chapter 2. Learning the basics Securing your computer - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This section provides information about how to help protect your computer from theft and unauthorized use.
Attaching a security lock (not supplied) You can attach a security lock to your computer to help prevent it from being removed without your permission. For details on installing the security lock, please refer to the instructions shipped with the security lock that you have purchased. Refer to the Right-side view on page 5 for the location of the Kensington slot. Notes:
You are responsible for evaluating, selecting, and implementing the locking devices and security Before purchasing any security product, verify that it is compatible with this type of security keyhole. features. Lenovo offers no comment judgement or warranty regarding the function, quality or performance of locking devices and security features.
Using VeriFace VeriFace is a face recognition software which takes a digital snapshot, extracts key features of your face, and creates a digital map that becomes the systems password. If you want to activate VeriFace for the first time, click the VeriFace icon on the desktop to register your facial image. Notes:
You can determine whether to use this function when you log on the system. The face registration and verification works best in an environment with steady and even light. For more details on VeriFace, see the software help.
Using passwords Using passwords helps prevent your computer from being used by others. Once you set a password and enable it, a prompt appears on the screen each time you power on the computer. Enter your password at the prompt. The computer cannot be used unless you enter the correct password. Note: This password can be from one to seven alphanumeric characters in any combination. For details about how to set the password, see the Help to the right of the screen in BIOS setup utility. Note: To enter BIOS setup utility, press F2 when the Lenovo logo appears on the screen while the computer is starting up. 22 Chapter 3. Connecting to the Internet As a global network, the Internet connects computers worldwide, providing services such as e-mailing, information searching, electronic commerce, Web browsing and entertainment. You can connect the computer to the Internet in the following ways:
Wired connection: use physical wiring to connect. Wireless network technology: connect without wiring. Wired connection - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Wired connections are a reliable and safe way to connect the computer to the Internet. Cable DSL Cable Internet services use a cable modem connected to the residential cable TV line. DSL is a family of related technologies that bring high-speed network access to homes and small businesses over ordinary telephone lines.
Hardware connection Cable DSL TV cable Telephone line Splitter *
Splitter *
Cable modem *
DSL modem *
* Not supplied. Note: The above diagrams are for reference only. Actual connection method may vary.
Software configuration Consult your Internet Service Provider (ISP) for details on how to configure your computer.
23 Chapter 3. Connecting to the Internet Wireless connection - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Wireless connections provide mobile access to the Internet, allowing you to stay online anywhere the wireless signal covers. Divided by the signal scales, wireless connection to the Internet can be built based on the following standards. Wi-Fi WiMAX Wi-Fi networks cover a small physical area, like a home, office, or small group of buildings. An access point is necessary for the connection. WiMAX networks connect several Wireless LAN systems to cover a metropolitan area, providing high-speed broadband access without the need for cables. Note: Your computer may not support all wireless connection methods.
Using Wi-Fi/WiMAX Enabling wireless connection To enable wireless communications, do the following:
Press Fn + F5 to make configuration. Hardware connection Access point *
Wi-Fi/WiMAX network
* Not supplied Software configuration Consult your Internet Service Provider (ISP) and search Windows Help and Support Center for details on how to configure your computer. 24 Chapter 4. OneKey Rescue system OneKey Rescue system - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Introduction The Lenovo OneKey Rescue system is an easy-to-use application that can be used to back up the data on your system partition (C drive) for easy restore when required. You can run Lenovo OneKey Recovery under the Windows operating system, and the OneKey Rescue system without starting the Windows operating system.
Attention:
In order to utilize the features of the OneKey Rescue system, your hard disk already includes a hidden partition by default to store the system image file and OneKey Rescue system program files. This default partition is hidden for security reasons and is the reason the available disk space is less than it claims. The exact available hard disk space depends on the file size of the mirror image file (based on the size of operating system and preinstalled software).
Using Lenovo OneKey Recovery (within Windows operating system) In Windows operating system, double click the OneKey Recovery system Icon on the desktop to launch Lenovo OneKey Recovery. Within the program, you can back up the system partition on the hard disk drive, other storage devices, or by creating recovery discs. Notes:
The backup process and creation of recovery discs may take some time, connect the AC adapter and battery pack to your computer.
After the recovery discs are burned, please number them so that you can use them in the correct order.
Computers without an integrated optical drive support the creation of recovery discs; however an appropriate external optical drive is needed to physically create the recovery discs. For more instructions, see the Help file of Lenovo OneKey Recovery.
Using Lenovo OneKey Rescue system (without Windows operating system) In the event that the operating system cannot be loaded, follow the steps below to access OneKey Rescue system.
Shut down your computer.
Press the key to launch OneKey Rescue system. Within the program, you can choose to restore your system partition to the original factory status, or to a previously generated backup. Note: The recovery process is irreversible. Make sure to back up any critical data before using the recovery feature. 25 Chapter 4. OneKey Rescue system
Creating a recovery disc(s) Your computer does not ship with a recovery disc. You can use Lenovo OneKey Recovery system to create a recovery disc(s), which can be used to start and restore your computer in case of a system failure. To create a recovery disc(s):
Insert a recordable disc into the optical drive on your computer. Note: If your computer does not come with an integrated optical drive or if the integrated optical drive does not support disc creating, connect an appropriate external optical drive to your computer.
In Windows, press the OneKey Rescue system button to launch Lenovo OneKey Recovery system.
On the main screen, click Create Recovery Disc.
Choose the type of recovery disc(s). You can create three types of recovery disc(s): recovery disc(s) with existing backup image, recovery disc(s) from the current system partition, and factory default recovery disc(s). Select the type of recovery disc you want to create and follow the on-screen instructions.
Insert additional recordable disc(s) when prompted. Notes:
The estimated number of discs needed will be displayed before the process of creating the recovery disc(s) begins. To minimize the number of discs needed, use recordable DVDs as the media. Also make sure your optical drive is compatible with the disc intended for use.
After recovery disc creation, number the discs appropriately for use in their correct order. The first disc created will be used to start the computer in the case of a system failure. 26 Chapter 5. Troubleshooting Frequently asked questions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This section lists frequently asked questions and tells where you can find detailed answers. For details about each publication included in the package with your computer, see Lenovo IdeaPad Y480/Y580 Setup Poster. What safety precautions should I follow when using my computer?
See Chapter 1. Important safety information of Lenovo Safety and General Information Guide. How can I prevent problems with my computer?
See Chapter 2. Use and care Information of Lenovo Safety and General Information Guide. What are the main hardware features of my computer?
More information can be found in Chapter 1 and 2. Where can I find the detailed specifications for my computer?
See http://consumersupport.lenovo.com. I need to upgrade a device or I need to replace one of the following: the hard disk drive, memory, or the keyboard. See Appendix. CRU instructions on page 33 of this guide. Where are the recovery discs?
Your computer did not come with a recovery disc. For an explanation of the alternative recovery methods offered by Lenovo, see Chapter 4. OneKey Rescue system on page 25. How can I contact the customer support center?
See " Chapter 3. Getting help and service" of Lenovo Safety and General Information Guide. Where can I find warranty information?
For the warranty applicable to your computer, including the warranty period and type of warranty service, see the Lenovo limited warranty flyer that came with your computer. How can I install the device drivers?
A compatible device driver is a requirement to ensure correct operation and performance of each component in your computer. If your computer is pre-installed with an operating system, Lenovo provides all drivers that you need in your hard disk. What can I do if the backup process fails?
If you can start the backup feature without a problem, but it fails during the backup process, please try the following steps:
1 Close other applications, then restart the backup process. 2 Check if the destination media is damaged, try to select another path and then try again. 27 Chapter 5. Troubleshooting When do I need to restore the system to the factory status?
You can use this feature when your system fails or you need to re-install your operating system. This will restore your computer back to the initial status when you first booted up your computer after receiving it from the store. If there is critical data on your current partition, back it up before you run this recovery feature. 28 Chapter 5. Troubleshooting Troubleshooting - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you do not find your problem here, see Chapter 2. The following section only describes problems that might negate the need to refer to the more comprehensive information in Chapter 2. Display problems When I turn on the computer, nothing appears on the screen.
If the screen is blank, make sure that:
- The battery is installed correctly.
- The AC adapter is connected to the computer and the power cord is plugged into a working electrical outlet.
- The computer power is on. (Press the power button again for confirmation.)
- The memory is installed correctly. If these items are properly set, and the screen remains blank, have the computer serviced. When I turn on the computer, only a white cursor appears on a blank screen. My screen goes blank while the computer is on. A Password problem I forgot my password. Keyboard problems A number appears when you enter a letter (Y480).
Restore backed-up files to your Windows environment or the entire contents of your hard disk to the original factory contents using OneKey Recovery. If you still see only the cursor on the screen, have the computer serviced.
Your screen saver or power management may be enabled. Do one of the following to exit from the screen saver or to resume from sleep or hibernation mode:
- Touch the touchpad.
- Press any key on the keyboard.
- Press the power button. Press Fn + F2 to confirm whether the LCD screen has been turned off.
If you forget your user password, you must take your computer to a Lenovo authorized servicer or a marketing representative to have the password changed. If you forget your HDD password, a Lenovo authorized servicer cannot reset your password or recover data from the hard disk. You must take your computer to a Lenovo authorized servicer or a marketing representative to have the hard disk drive replaced. Proof of purchase is required, and a fee will be charged for parts and service. If you forget your supervisor password, a Lenovo authorized servicer cannot reset your password. You must take your computer to a Lenovo authorized servicer or a marketing representative to have the system board replaced. Proof of purchase is required, and a fee will be charged for parts and service. The numeric lock function is on. To disable it, press Fn + F8. 29 Chapter 5. Troubleshooting Sleep or hibernation problems The critical low-battery error message appears, and the computer immediately turns off. The computer enters sleep mode immediately after Power-on self-test
(POST).
The battery power is getting low. Connect the AC adapter to the computer, or replace the battery with a fully charged one.
Make sure that:
- The battery is charged.
- The operating temperature is within the acceptable range. See Chapter 2. Use and care Information of Lenovo Safety and General Information Guide. Note: If the battery is charged and the temperature is within range, have the computer serviced. The computer does not return from sleep mode and the computer does not work.
If the computer does not return from sleep mode, it may have entered hibernation mode automatically because the battery is depleted. Check the power indicator. If your computer is in sleep mode, connect the AC adapter to the computer, then press any key or the power button. If your computer is in hibernation mode or power-off state, connect the AC adapter to the computer, then press the power button to resume operation. Note: If the system still does not return from sleep mode, your system has stopped responding, and you cannot turn off the computer; reset the computer. Unsaved data may be lost. To reset the computer, press and hold the power button for 4 seconds or more. If the computer is still not reset, remove the AC adapter and the battery. Computer screen problems The screen is blank.
Do the following:
- If you are using the AC adapter, or using the battery, and the battery status indicator is on, press Fn + to make the screen brighter.
- If the power indicator is in blinking, press the power button to resume from the sleep mode.
- If the problem persist, follow the solution in the following problem The screen is unreadable or distorted.
- Press Fn + F2 to confirm whether the LCD screen has been turned off. The screen is unreadable or distorted.
Make sure that:
- The display device driver is installed correctly.
- The screen resolution and color quality are correctly set.
- The monitor type is correct. Incorrect characters appear on the screen.
Did you install the operating system or application program correctly? If they are installed and configured correctly, have the computer serviced. Sound problems No sound can be heard from the speaker even when the volume is turned up.
Make sure that:
- The Mute function is off.
- The headphone jack is not used.
- Speakers are selected as the playback device. 30 Chapter 5. Troubleshooting Battery problems Your computer shuts down before the battery status indicator shows empty.
-or-
Your computer operates after the battery status indicator shows empty. The operating time for a fully charged battery is short. The computer does not operate with a fully charged battery. The battery does not charge. A hard disk drive problem The hard disk drive does not work. A startup problem
Discharge and recharge the battery.
For details, see Handling the battery in Chapter 2. The surge protector in the battery might be active. Turn off the computer for one minute to reset the protector; then turn on the computer again. For details, see Handling the battery in Chapter 2. In the Boot menu in BIOS setup utility, make sure that the hard disk drive is included in the Boot Device Priority correctly. The Microsoft Windows operating system does not start.
Use the OneKey Rescue system to help solve or identify your problem. For details about OneKey Rescue system, see Chapter 4. OneKey Rescue system on page 25. OneKey Rescue system problems Backup cannot be made.
You are not currently using a Windows operating system.
There is not enough space to store the backed up data. You will need to free more hard disk space on your system partition (C drive). Fail to restore system partition to factory default.
The system partition, such as the partition size or the drive capacity of C, has been modified. 31 Chapter 5. Troubleshooting Other problems Your computer does not respond.
To turn off your computer, press and hold the power button for 4 seconds or more. If the computer still does not respond, remove the AC adapter and the battery.
Your computer might lock when it enters sleep mode during a communication operation. Disable the sleep timer when you are working on the network. The computer does not start from a device you want.
See the Boot menu of the BIOS setup utility. Make sure that the Boot Device Priority in the BIOS setup utility is set so that the computer starts from the device you want.
Also make sure that the device from which the computer starts is
enabled. In the Boot menu in the BIOS setup utility, make sure that the device is included in the Boot Device Priority list. Press F12 when the Lenovo logo appears on the screen while the computer is starting up to select the device you want the computer starts from. The connected external device does not work.
Do not connect or disconnect any external device cables other than USB while the computer power is on; otherwise, you might damage your computer.
When using a high power consumption external devices such as an external USB optical disk drive, use external device power adapter. Otherwise, the device may not be recognized, or system shut down may result. For more technical support, please visit consumer product website http://consumersupport.lenovo.com. 32 Appendix. CRU instructions Notes:
The illustrations used in this chapter are of the Lenovo IdeaPad Y580, unless otherwise stated. The following steps about upgrading and replacing devices are the same for the Y480 and Y580. Replacing the battery - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Note: Use only the battery provided by Lenovo. Any other battery could ignite or explode. To replace the battery, do the following:
1 Turn off the computer, or enter hibernation mode. Disconnect the AC adapter and all cables from the computer. 2 Close the computer display, and turn the computer over. 3 Unlock the manual battery latch
. Holding the spring-loaded battery latch in the
, remove the battery pack in the direction shown by the arrow a c
. unlocked position b a c b 4 Install a fully charged battery. 5 Slide the manual battery latch to the locked position. 6 Turn the computer over again. Connect the AC adapter and the cables to the computer again. 33 Appendix. CRU instructions Replacing the hard disk drive - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
You can increase the storage capacity of your computer by replacing the hard disk drive with one of greater capacity. You can purchase a new hard disk drive from your reseller or Lenovo marketing representative. Notes:
Replace the hard disk drive only if you upgrade it or have it repaired. The connectors and bay of the hard disk drive were not designed for frequent changes, or drive swapping. The preinstalled software are not included on an optional hard disk drive.
Handling a hard disk drive
Do not drop the drive or subject it to physical shocks. Put the drive on a material, such as soft cloth, that absorbs the physical shock.
Do not apply pressure to the cover of the drive.
Do not touch the connector. The drive is very sensitive. Incorrect handling can cause damage and permanent loss of data on the hard disk. Before removing the hard disk drive, make a backup copy of all the information on the hard disk, and then turn the computer off. Never remove the drive while the system is operating, in sleep mode, or in hibernation mode. 34 Appendix. CRU instructions To replace the hard disk drive, do the following:
1 Turn off the computer; then disconnect the AC adapter and all cables from the computer. 2 Close the computer display, and then turn the computer over. 3 Remove the battery pack. 4 Remove the Hard disk drive (HDD)/Memory/Mini PCI Express Card slot compartment cover. a. Loosen the screws that secure the compartment cover b. Remove the compartment cover
. b a b 5 Remove the frame fixing screws c
. c a
. c 35 Appendix. CRU instructions 6 Take out the hard disk drive secured in a metal frame d
. d 7 Remove the screws and detach the metal frame from the hard disk drive. 8 Attach the metal frame to a new hard disk drive and tighten the screws. 9 Put the hard disk drive gently into the hard disk drive bay with the tab facing upwards and the connectors facing each other; then push it firmly into space. 0 Reinstall the frame fixing screws. A Reinstall the compartment cover and tighten the screws. B Reinstall the battery pack. C Turn the computer over again. Connect the AC adapter and the cables to the computer again. 36 Appendix. CRU instructions Replacing memory - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
You can increase the amount of memory in your computer by installing a double-data-rate three synchronous dynamic random access memory (DDR3 SDRAM)-available as an option-in the memory slot of your computer. DDR3 SDRAMs are available in various capacities. Note: Use only the memory types supported by your computer. If you incorrectly install optional memory, or install an unsupported memory type, a warning beep will sound when you try to start the computer. To install a DDR3 SDRAM, do the following:
1 Touch a metal table or a grounded metal object to reduce any static electricity in your body, which could damage the DDR3 SDRAM. Do not touch the contact edge of the DDR3 SDRAM. 2 Turn off the computer. Disconnect the AC adapter and all cables from the computer. 3 Close the computer display, and turn the computer over. 4 Remove the battery pack. 5 Remove the Hard disk drive (HDD)/Memory/Mini PCI Express Card slot compartment cover. a. Loosen the screws that secure the compartment cover b. Remove the compartment cover
. b a b a
. 37 Appendix. CRU instructions 6 If two DDR3 SDRAMs are already installed in the memory slot, remove one of them to make room for the new one by pressing out on the latches on both edges of the socket at the same time. Be sure to save the old DDR3 SDRAM for future use. a a b 7 Align the notch of the DDR3 SDRAM with the protrusion of the socket and gently insert the DDR3 SDRAM into the socket at a 30-45 angle. 8 Push the DDR3 SDRAM inward toward the socket until the latches on both edges of the socket are pushed into the closed position. b a 9 Reinstall the compartment cover and tighten the screws. 0 Reinstall the battery pack. A Turn the computer over again. Connect the AC adapter and the cables to the computer again. Note: If only one DDR3 SDRAM is used on the computer you are servicing, the card must be installed in SLOT-0 (
: lower slot), but not in SLOT-1 (
: upper slot). 38 Appendix. CRU instructions To make sure that the DDR3 SDRAM is installed correctly, do as follows:
1 Turn the computer on. 2 Hold F2 during startup. The BIOS setup utility screen opens. The System Memory item shows the total amount of memory installed in your computer. 39 Appendix. CRU instructions Removing the optical drive - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
To remove the optical drive, do the following:
1 Remove the Hard disk drive (HDD)/Memory/Mini PCI Express Card slot compartment cover. 2 Remove the screw shown in the illustration 3 Gently pull the optical drive out
. b b a
. a The following table provides a list of CRUs (Customer Replaceable Units) for your computer, and informs you of where to find replacement instructions. Setup Poster User Guide AC adapter Power cord for AC adapter Battery Bottom access doors Hard disk drive Memory Optical drive O O O O O O O O 40 Trademarks The following terms are trademarks or registered trademarks of Lenovo in the United States, other countries, or both. Lenovo IdeaPad OneKey VeriFace Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. NVIDIA and Optimus are trademarks and/or registered trademarks of NVIDIA Corporation in the United States and other countries. AMD and PowerXpress are trademarks of Advanced Micro Devices, Inc. is a trademark of SRS Labs, Inc. Premium Surround Sound technology is incorporated under license from SRS Labs, Inc. SRS Premium Surround Sound provides the ultimate audio experience for music, movies and games on the PC. Other company, products, or service names may be trademarks or service marks of others. 41 Notes Before using the product, be sure to read Lenovo Safety and General Information Guide first. Some instructions in this guide may assume that you are using Windows 7. If you are using other Windows operating system, some operations may be slightly different. If you are using other operating systems, some operations may not apply to you. The features described in this guide are common to most models. Some features may not be available on your computer and/or your computer may include features that are not described in this user guide. The illustrations used in this manual are for Lenovo Y570 unless otherwise stated. The illustrations in this manual may differ from the actual product. Please refer to the actual product. Regulatory Notice To refer to it, go to http://consumersupport.lenovo.com/ and click User guides and manuals. First Edition (December 2010) Copyright Lenovo 2010. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use, reproduction and disclosure. LIMITED AND RESTRICTED RIGHTS NOTICE: If products, data, computer software, or services are delivered pursuant a General Services Administration GSA contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. IdeaPad Y480/ Y580 User Guide V1.0 L e n o v o C h n a i New World. New Thinking.TM www.lenovo.com 2 0 1 2 V1.0_en-US Read the safety notices and important tips in the included manuals before using your computer.
1 2 3 4 5 6 7 8 9 | Users Manual | Users Manual | 797.87 KiB | December 12 2008 |
802.11n 1x1 PCIe Minicard transceiver Model AR5B95 Dec 2007 20002006 by Atheros Communications, Inc. All rights reserved. ATHEROS, the Atheros logo, 5-UP, Driving the Wireless Future, Atheros Driven, Atheros Turbo Mode, and the Air is Cleaner at 5-GHz are trademarks of Atheros Communications, Inc. All other trademarks are the property of their respective holders. Notice The information in this document has been carefully reviewed and is believed to be accurate. Nonetheless, this document is subject to change without notice, and Atheros Communications, Inc. (Atheros) assumes no responsibility for any inaccuracies that may be contained in this document, and makes no commitment to update or to keep current the contained information, or to notify a person or organization of any updates. Atheros reserves the right to make changes, at any time, in order to improve reliability, function or design and to attempt to supply the best product possible. Atheros does not represent that products described herein are free from patent infringement or from any other third party right. No part of this document may be reproduced, adapted or transmitted in any form or by any means, electronic or mechanical, for any purpose, except as expressly set forth in a written agreement signed by Atheros. Atheros or its affiliates may have patents or pending patent applications, trademarks, copyrights, maskwork rights or other intellectual property rights that apply to the ideas, material and information expressed herein. No license to such rights is provided except as expressly set forth in a written agreement signed by Atheros. ATHEROS MAKES NO WARRANTIES OF ANY KIND WITH REGARD TO THE CONTENT OF THIS DOCUMENT. IN NO EVENT SHALL ATHEROS BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL SPECULATORY OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBLITY OF SUCH DAMAGES. IN PARTICULAR, ATHEROS SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA TRANSMITTED OR OTHERWISE USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE OR DATA. ATHEROS SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE AS THEY MIGHT OTHERWISE APPLY TO THIS DOCUMENT AND TO THE IDEAS, MATERIAL AND INFORMATION EXPRESSED HEREIN. Document Conventions Text Conventions bold Bold type within paragraph text indicates commands, file names, directory names, paths, output, or returned values. Example: The DK_Client package will not function unless you use the wdreg_install batch file. italic Within commands, italics indicate a variable that the user must specify. Example: mem_alloc size_in_bytes Titles of manuals or other published documents are also set in italics. Courier The Courier font indicates output or display. Example:
Menu Error:Unable to allocate memory for transfer!
The Menu character tag is used for menu items. Example: Choose Edit > Copy.
Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit. Within commands, items enclosed in braces are options from which the user must choose. Within commands, the vertical bar separates options. An ellipsis indicates a repetition of the preceding parameter. The right angle bracket separates successive menu selections. Example: Start > Programs > DK > wdreg_install. Notices NOTE: This message denotes neutral or positive information that calls out important points to the text. A note provides information that may apply only in special cases. Atheros Communications, Inc. COMPANY CONFIDENTIAL December 2008 iii Revision History Revision Dec 2007 Description of Changes Initial Release iv Dec 2007 COMPANY CONFIDENTIAL Atheros Communications, Inc. Contents Introduction.......................................................................................................... 7 System Requirements .................................................................................... 7 Profile Management............................................................................................. 7 Create or Modify a Configuration Profile.................................................... 7 Remove a Configuration Profile ................................................................... 8 Auto Profile Selection Management ................................................................... 8 Switching to a Different Configuration Profile .................................................. 9 Import and Export Profiles .................................................................................. 9 Importing a Profile ............................................................................................... 9 Exporting a Profile ............................................................................................... 9 TCP/IP Configuration ......................................................................................... 9 Configuring the TCP/IP Address for the network device: ............................... 9 General Tab......................................................................................................... 10 Advanced Tab..................................................................................................... 10 Security Tab ........................................................................................................ 11 Using EAP-TLS Security.............................................................................. 12 Using EAP-TTLS Security ........................................................................... 12 Using PEAP (EAP-GTC) Security............................................................... 13 Using PEAP-MSCHAP V2 Security............................................................ 14 Using LEAP Security ................................................................................... 15 Configuring LEAP.............................................................................................. 15 Pre-Shared Encryption Keys.............................................................................. 16 Defining pre-shared encryption keys:............................................................... 16 Overwriting an Existing Static WEP Key.......................................................... 16 Disabling Static WEP.......................................................................................... 16 Using WPA Passphrase Security....................................................................... 17 Zero Configuration............................................................................................. 17 Wireless Network Configuration ...................................................................... 17 Check the Status Information or Diagnostics................................................... 18 Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 v Current Status...............................................................................................18 Adapter Information Button ..............................................................................19 Diagnostics Tab...................................................................................................19 Transmitted Frames............................................................................................20 Received Frames .................................................................................................20 Scan Available Networks ...................................................................................20 Connecting to a different network.....................................................................20 Display Settings ..................................................................................................22 ACU Tools...........................................................................................................22 Tray Icon..............................................................................................................23 Color ....................................................................................................................24 Quality .................................................................................................................24 RSSI*.....................................................................................................................24 Ad Hoc Mode......................................................................................................24 Ad Hoc Mode Profile Configuration ..........................................................24 Infrastructure (Access Point) Mode...................................................................25 Infrastructure (Access Point) Mode Profile Configuration........................25 Uninstall an Old Driver......................................................................................26 Additional Security Features .............................................................................26 Message Integrity Check (MIC) .........................................................................26 Advanced Status Information............................................................................27 Compliance..........................................................................................................28 Industry Canada Notice: ................................................... !
Avis de Conformit la Rglementation dIndustrie Canada:...!
European Community CE Notice: ................................................................28 vi Dec 2007 COMPANY CONFIDENTIAL Atheros Communications, Inc. Introduction The Atheros 802.11n Adapter supports 802.11bg operation. The card uses the Atheros Client Utility (ACU) which is a user-mode utility designed to edit and add profiles for selected Atheros network interface adapters. System Requirements Laptop/ PC containing:
32-bit PCI Express Bus 32 MB memory or greater 300 MHz processor or higher Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6) Profile Management Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility. Add a profile Edit a profile Import a Profile Export a Profile Order profiles Switch to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode (which uses an access point) or ad hoc mode (a group of stations participating in the wireless LAN). Create or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab. To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab. Note that the ACU only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the New button displays an error message. Remove an old profile or modify an existing profile for a new use. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 7 Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button. 2. The Auto Profile Selection Management window appears, with a list of all created profiles in the Available Profiles box. 3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto Selected Profiles box. Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box. 2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority. 3. Click OK. 4. Check the Auto Select Profiles box. 5. Save the modified configuration file. When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the adapter tries the next highest priority profile that matches the SSID, and so on. With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the adapter tries with the next highest priority profile. 8 COMPANY CONFIDENTIAL Atheros Communications, Inc. Switching to a Different Configuration Profile 1. To switch to a different profile, go to the Profile Management tab. 2. Click on the profile name in the Profile List. 3. Click the Activate button. The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength for that profile. Import and Export Profiles Importing a Profile 1. From the Profile Management tab, click the Import button. The Import Profile window appears. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open. The imported profile appears in the profiles list. Exporting a Profile 1. From the Profile Management tab, highlight the profile to export. 2. Click the Export button. The Export Profile window appears. 3. Browse to the directory to export the profile to. 4. Click Save. The profile is exported to the specified location. TCP/IP Configuration Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections. 2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties. 3. Select Internet Protocol (TCP/IP) and click Properties. 4. Click the radio button Use the following IP address, then enter an IP address and Subnet mask. Assigning an IP address and Subnet mask allows stations to operate in access point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click OK to finish. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 9 General Tab In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile. This name must be unique. Profile names are not case sensitive. Client Name Identifies the client machine. Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Configure up to three SSIDs (SSID1, SSID2, and SSID3). Advanced Tab In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. Edit the fields in the Advanced tab of Profile Management to configure the profile. Transmit Power Level Power Save Mode Selects the transmit power level in mW. Actual transmit power may be limited by hardware. Specify:
Maximum mode causes the access point to buffer incoming messages for the wireless adapter. The adapter periodically polls the access point to see if any messages are waiting. Normal uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. Off turns power saving off, thus powering up the wireless adapter continuously for a short message response time. Network Type Specifies the network as either infrastructure or ad hoc. 802.11b Preamble Authentication Mode Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in the 802.11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. Open enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. Shared only allows the adapter to associate with access points that have the same WEP key. 10 COMPANY CONFIDENTIAL Atheros Communications, Inc. For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the adapter should attempt to associate. Security Tab In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window. Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the General and Advanced tabs. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP WPA/WPA2 Passphrase Enables WPA/WPA2 Passphrase security. Click on the Configure button and fill in the WPA/WPA2 Passphrase. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP Pre-Shared Key
(Static WEP) If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Note: If the Lock checkbox is checked, you cannot change any values in this profile. See your system administrator. Enables the use of pre-shared keys that are defined on both the access point and the station. To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-
Shared Keys window. If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 11 allow association. None No security (not recommended). Using EAP-TLS Security To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list. The server/domain name and the login name are filled in automatically from the certificate information. Click OK. 3. Click OK. 4. Activate the profile. Using EAP-TTLS Security To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA/WPA2 radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TTLS from the drop-down menu. Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user name. 4. Click Advanced and:
OR: Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) 12 COMPANY CONFIDENTIAL Atheros Communications, Inc. Enter the domain name of the server from which the client will accept a certificate. Change the login name if needed. 5. Click OK. 6. Enable the profile. Using PEAP (EAP-GTC) Security To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-GTC) from the drop-down menu. To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. To avoid the need to log on again after resuming operation (for example, after your computer goes into standby or hibernate mode), check Always Resume the Secure Session. 3. Select the appropriate network certificate authority from the drop-down list. 4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 5. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication. 6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 13 Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu. To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 5. Click OK. 6. Enable the profile. 14 COMPANY CONFIDENTIAL Atheros Communications, Inc. Using LEAP Security To use security In the Atheros Client Utility, access the Security tab in the Profile Management window. LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager. Configuring LEAP On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. drop-down menu. 1. Click the Configure button. 2. Specify a user name and password. Select to Use Temporary User Name and Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP user name. OR: Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process. Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use. 3. Enter the user name and password. 4. Confirm the password. 5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server. (default) OR: Enter a specific domain name. 6. If desired, check No Network Connection Unless User Is Logged In to force the wireless adapter to disassociate after logging off. 7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 15 Pre-Shared Encryption Keys Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, Encryption Keys WEP Keys
(1-4) WEP Key Size A-F), or ASCII text (all keyboard characters except spaces). Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the key as the default encryption key. Defines the size for each encryption key. The options include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII) 4. Click OK for the changes to take effect. Overwriting an Existing Static WEP Key 1. Click the Pre-Shared Key radio button on the Security tab. 2. Click on Configure. 3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click in the field of the existing static WEP key to overwrite. 4. Delete the asterisks in that field. 5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP To disable static WEP for a particular profile, Select any other security option on the Profile Management tab to automatically disable static WEP OR: choose None on the Security tab to disable security, and click OK (not recommended). 16 COMPANY CONFIDENTIAL Atheros Communications, Inc. Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. Zero Configuration This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS). Wireless Network Configuration The Windows WZCS is a service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured. To set Zero Configuration on Windows XP, take the following steps:
1. 2. Select the check box Use Windows to configure my wireless network settings to set In Windows XP, open the Wireless Network Configuration Properties dialog box. Zero Configuration. When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles, thus users can not ( create new profiles with different settings while using Windows Zero Configuration. The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Profile Management tab of the ACU. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 17 In Windows XP, open the Wireless Network Configuration Properties dialog box. To turn Zero Configuration off on Windows XP, take the following steps:
1. 2. Clear the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the ACU Profile Management tab. Check the Status Information or Diagnostics The Atheros client utility includes a number of tools to display current diagnostics and status information. Check current status Check driver information Check receive and transmit diagnostics Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Current Status screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the General tab. Link Status Shows whether the station is associated to the wireless network. Wireless Mode Displays the wireless mode. Configure the wireless mode on the Advanced tab. IP Address Displays the computer's IP address. Network Type The type of network the station is connected to. Options include:
Infrastructure (access point) Ad Hoc Configure the network type on the Advanced tab. Current Channel Shows the currently connected channel. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Signal Strength Shows the strength of the signal. Click the Advanced button to see the advanced status diagnostics. 18 COMPANY CONFIDENTIAL Atheros Communications, Inc. Adapter Information Button The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name Name of the wireless network adapter. MAC Address MAC address of the wireless network adapter. Driver Driver name and path of the wireless network adapter driver. Driver Version Version of the wireless network adapter driver. Driver Date Creation date of the wireless network adapter driver. Client Name Name of the client computer. Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The Diagnostics tab does not require any configuration. It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received Broadcast packets transmitted and received Unicast packets transmitted and received Total bytes transmitted and received The Adapter Information button has general information about the wireless network adapter and NDIS driver. The Advanced Statistics button to shows statistics for diagnostics for frames received by or transmitted to the wireless network adapter:
Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 19 Transmitted Frames Frames transmitted OK Frames retried Frames dropped No ACK frames ACK frames RTS frames Clear-to-send (CTS) frames No CTS frames Retried RTS frames Retried data frames Received Frames Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile for that network. Infrastructure
(AP) Network Connected Infrastructure
(AP) Network 20 COMPANY CONFIDENTIAL Atheros Communications, Inc. Ad Hoc Network Connected Ad Hoc Network Encryption Active Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 21 Display Settings To change the display settings, choose Options > Display Settings from the menu. The display settings dialog box contains tools to set the:
Signal Strength Display Units Sets the units used when displaying signal strength: percentage (%) or dBm. Refresh Interval Use the up/down arrows to set the display refresh interval in seconds. Data Display Sets the display to cumulative or relative:
Relative displays the change in statistical data since the last update. Cumulative displays statistical data collected since opening the profile. ACU Tools Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio Enable or disable the RF Signal on all Atheros Enable/Disable Tray Icon station reference designs. Enable or disable the tray icon. Troubleshooting Run the optional Troubleshooting Utility. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Atheros Client Utility application. 22 COMPANY CONFIDENTIAL Atheros Communications, Inc. Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address. Right-click on the tray icon to:
Help Open the online help. Open Atheros Client Utility Launch the Atheros Client Utility (ACU). Use the ACU to configure a profile or view status and statistics information. Troubleshooting Run the Troubleshooting Utility. Preferences Set the ACU startup and menu options. Check to start the program automatically when Windows starts, and check menu items that should appear on the popup menu. Enable/Disable Radio Enable or disable the RF signal. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to the access point. Select Profile Click a configuration profile name to switch to. If no Show Connection Status Shows whether auto profile selection is enabled. configuration profile exists for a connection, add a profile. This window displays connection information:
Active Profile Displays the active configuration profile name. Auto Profile Selection Connection Status Link Quality SSID Access Point Name Access Point IP Address Link Speed Adapter IP Address Displays whether the adapter is connected to a wireless network. Lists the quality of the link connection. Displays the SSID of the associated network. Shows the name of the AP the wireless adapter is connected to. Shows the IP address of the access point the wireless adapter is connected to. Lists the speed of the link connection. Displays the IP address of the wireless adapter. Exit Exit the Atheros Client Utility application. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 23 The colors are defined as follows:
Color Green Green Yellow Red Gray Quality Excellent Good Poor Poor RSSI*
20 dB +
10-20 dB +
5-10 dB
< 5 dB No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage. Enable or disable the tray icon in the Action menu. Ad Hoc Mode In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP). To connect to an ad hoc network, configure the profile for ad hoc mode. Ad Hoc operation may be limited by Hardware to meet regulatory requirements. Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab) Transmit Power Level 802.11b Preamble (if using 802.11b) Wireless Mode When Starting an Ad Hoc Network 24 COMPANY CONFIDENTIAL Atheros Communications, Inc. Make sure to also edit the General and Security tabs. Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here. To connect to an access point network, configure the profile for access point mode. Infrastructure (Access Point) Mode Profile Configuration To configure a profile in infrastructure (access point) mode, change the Network Type in the Advanced tab. For access point mode, modify the settings:
Power Save Mode 802.11b Preamble (if using 802.11b) Wireless Mode 802.11 Authentication Mode Make sure to also edit the General and Security tabs. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 25 Uninstall an Old Driver Uninstall an old driver before upgrading to a new NDIS driver release. To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4. 1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros AR500x Wireless Network Adapter, and choose Uninstall. 2. Click OK to uninstall the device. 3. When the device is uninstalled from Device Manager, search for and delete the driver files that reside in the system. a. Go to the Start menu and choose Search > For Files or Folders. b. Enter oem*.inf in the Search for files or folders named: field, and enter Atheros in the Containing text: field. c. Click Search Now. A few files matching these criteria are possible, if previous drivers have not been removed properly. d. Choose the files that have been found and delete them from the system. 4. To complete the uninstallation, remove the file ar5211.sys from the folder
\WINNT\system32\drivers. Additional Security Features These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point. Message Integrity Check (MIC) MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering. Temporal Key Integrity Protocol (TKIP) This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys. Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. 26 COMPANY CONFIDENTIAL Atheros Communications, Inc. Advanced Status Information Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen. Network Name (SSID) Displays the wireless network name. Configure the network name on the General tab. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Authentication Type Displays the authentication mode. Message Integrity Check Configure the authentication mode on the General tab. Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets. Associated AP Name Displays the name of the access point the wireless adapter is Associated AP IP Address Associated AP MAC Address associated to. Shows the IP address of the access point the wireless adapter is associated to. Displays the MAC address of the access point the wireless adapter is associated to. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. Configure the power save mode on the Advanced tab. Current Power Level Displays the transmit power level rate in mW. Current Signal Strength Shows the current signal strength in dBm. Current Noise Level Displays the current noise level in dBm. Up Time Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds. 802.11b Preamble Displays the 802.11b preamble format. Configure the preamble format on the Advanced tab. Current Receive Rate Shows the current receive rate in Mbps. Current Transmit Rate Displays the current transmit rate in Mbps. Channel Shows the currently connected channel. Frequency Displays frequency the station is using. Channel Set Shows the current channel set. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 27 Regulatory Compliance Notices USA-Federal Communications Commission (FCC) FCC Radio-Frequency Exposure & Approval Conditions:
FCC ID#: PPD-AR5B95 1. Antennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of user during normal operating condition. This device must not be co-located or operating in conjunction with any other antenna or transmitter. 2. Only those antennas filed under FCC ID:PPD-AR5B95 can be used with this device. 3. When the Minicard is installed in a system where the antenna location is less than 20 cm separation distance to the body of the user, additional equipment authorization is required. 4. The regulatory label on the final system must include the statement: Contains FCC ID:PPD-AR5B95 . 5. The final system integrator must ensure there is no instruction provided in the user manual or customer documentation indicating how to install or remove the transmitter module. 6. AR5B95 must be installed and used in strict accordance with the manufacturers instructions as described in the user documentation that comes with the product. This device complies with the following radio frequency and safety standards. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna
-Increase the distance between the equipment and the receiver.
-Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. Caution: Exposure to Radio Frequency Radiation. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. This device must not be co-located or operating in conjunction with any other antenna or transmitter 28 COMPANY CONFIDENTIAL Atheros Communications, Inc. Canada Industry Canada (IC) This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. L utilisation de ce dispositif est autorise seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l utilisateur du dispositif doit tre prt accepter tout brouillage radiolectrique reu, mme si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. The term "IC" before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Pour empecher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit etre utilize a l'interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal. Si le matriel (ou son antenne d'emission) est installe a l'exterieur, il doit faire l'objet d'une licence. Caution: Exposure to Radio Frequency Radiation. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canadas website www.hc-sc.gc.ca/rpb. European Community CE Notice:
The CE! mark indicates compliance with the essential requirements of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
EN 300 328 EN 301 489-17 EN 60950 Marking by the symbol: ! indicates that usage restrictions apply in countries listed on this products packaging. Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 29 Taiwan DGT Radio Compliance:
2.4GHz Operation 30 COMPANY CONFIDENTIAL Atheros Communications, Inc. Atheros Communications, Incorporated 5480 Great America Parkway Santa Clara, CA 95054 t: 408/773-5200 f: 408/773-9940 www.atheros.com Atheros Communications, Inc. COMPANY CONFIDENTIAL Dec 2007 31
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2012-03-15 | 2422 ~ 2452 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 2422 ~ 2452 | DTS - Digital Transmission System | ||
3 | 2011-12-16 | 2422 ~ 2452 | DTS - Digital Transmission System | |
4 | 2011-07-27 | 2422 ~ 2452 | DTS - Digital Transmission System | |
5 | 2009-12-10 | 2422 ~ 2452 | DTS - Digital Transmission System | |
6 | 2009-11-24 | 2422 ~ 2452 | DTS - Digital Transmission System | |
7 | 2009-08-19 | 2422 ~ 2452 | DTS - Digital Transmission System | |
8 | 2008-12-12 | JBP - Part 15 Class B Computing Device Peripheral | Original Equipment | |
9 | 2422 ~ 2452 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 4 5 6 7 8 9 | Effective |
2012-03-15
|
||||
1 2 3 4 5 6 7 8 9 |
2011-12-16
|
|||||
1 2 3 4 5 6 7 8 9 |
2011-07-27
|
|||||
1 2 3 4 5 6 7 8 9 |
2009-12-10
|
|||||
1 2 3 4 5 6 7 8 9 |
2009-11-24
|
|||||
1 2 3 4 5 6 7 8 9 |
2009-08-19
|
|||||
1 2 3 4 5 6 7 8 9 |
2008-12-12
|
|||||
1 2 3 4 5 6 7 8 9 | Applicant's complete, legal business name |
Qualcomm Atheros, Inc.
|
||||
1 2 3 4 5 6 7 8 9 | FCC Registration Number (FRN) |
0003716743
|
||||
1 2 3 4 5 6 7 8 9 | Physical Address |
1700 Technology Dr
|
||||
1 2 3 4 5 6 7 8 9 |
San Jose, California 95110
|
|||||
1 2 3 4 5 6 7 8 9 |
United States
|
|||||
app s | TCB Information | |||||
1 2 3 4 5 6 7 8 9 | TCB Application Email Address |
c******@ccsemc.com
|
||||
1 2 3 4 5 6 7 8 9 |
m******@ccsemc.com
|
|||||
1 2 3 4 5 6 7 8 9 |
m******@CCSEMC.COM
|
|||||
1 2 3 4 5 6 7 8 9 |
m******@ccsemc.com
|
|||||
1 2 3 4 5 6 7 8 9 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 3 4 5 6 7 8 9 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 3 4 5 6 7 8 9 | Grantee Code |
PPD
|
||||
1 2 3 4 5 6 7 8 9 | Equipment Product Code |
AR5B95
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 4 5 6 7 8 9 | Name |
P**** G********
|
||||
1 2 3 4 5 6 7 8 9 | Title |
Vice President, Regulatory Engineering
|
||||
1 2 3 4 5 6 7 8 9 | Telephone Number |
858-6********
|
||||
1 2 3 4 5 6 7 8 9 | Fax Number |
858-6********
|
||||
1 2 3 4 5 6 7 8 9 |
p******@qti.qualcomm.com
|
|||||
app s | Technical Contact | |||||
1 2 3 4 5 6 7 8 9 | Firm Name |
COMPLIANCE CERTIFICATION SERVICES
|
||||
1 2 3 4 5 6 7 8 9 | Name |
T**** C******
|
||||
1 2 3 4 5 6 7 8 9 | Physical Address |
47173 Benicia Street
|
||||
1 2 3 4 5 6 7 8 9 |
Fremont, 94538
|
|||||
1 2 3 4 5 6 7 8 9 |
United States
|
|||||
1 2 3 4 5 6 7 8 9 | Telephone Number |
(510)********
|
||||
1 2 3 4 5 6 7 8 9 |
T******@CCSEMC.COM
|
|||||
app s | Non Technical Contact | |||||
1 2 3 4 5 6 7 8 9 | Firm Name |
COMPLIANCE CERTIFICATION SERVICES
|
||||
1 2 3 4 5 6 7 8 9 | Name |
T******** C******
|
||||
1 2 3 4 5 6 7 8 9 | Physical Address |
47173 Benicia Street
|
||||
1 2 3 4 5 6 7 8 9 |
Fremont, 94538
|
|||||
1 2 3 4 5 6 7 8 9 |
United States
|
|||||
1 2 3 4 5 6 7 8 9 | Telephone Number |
(510)********
|
||||
1 2 3 4 5 6 7 8 9 |
T******@CCSEMC.COM
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 3 4 5 6 7 8 9 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 4 5 6 7 8 9 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 4 5 6 7 8 9 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 09/11/2012 | ||||
1 2 3 4 5 6 7 8 9 | 06/12/2012 | |||||
1 2 3 4 5 6 7 8 9 | 01/23/2012 | |||||
1 2 3 4 5 6 7 8 9 | 01/07/2010 | |||||
1 2 3 4 5 6 7 8 9 | 05/19/2010 | |||||
1 2 3 4 5 6 7 8 9 | 02/13/2020 | |||||
1 2 3 4 5 6 7 8 9 | 01/26/2009 | |||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 4 5 6 7 8 9 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 4 5 6 7 8 9 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 4 5 6 7 8 9 | JBP - Part 15 Class B Computing Device Peripheral | |||||
1 2 3 4 5 6 7 8 9 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11n 1x1 PCIe Minicard Transceiver | ||||
1 2 3 4 5 6 7 8 9 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 4 5 6 7 8 9 | Modular Equipment Type | Limited Single Modular Approval | ||||
1 2 3 4 5 6 7 8 9 | Single Modular Approval | |||||
1 2 3 4 5 6 7 8 9 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 3 4 5 6 7 8 9 | Original Equipment | |||||
1 2 3 4 5 6 7 8 9 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 4 5 6 7 8 9 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 4 5 6 7 8 9 | Grant Comments | Class II Permissive change to allow use in portable host (IdeaPad Y580) as detailed in this filing. Modular approval. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. The highest measured SAR for this Permissive Change filing is: 0.29 W/kg. The highest measured SAR value across all filings under this FCC ID is 0.69 W/Kg. | ||||
1 2 3 4 5 6 7 8 9 | Class II Permissive change to allow use in portable host (IdeaPad Y480) as detailed in this filing. Modular approval. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. The highest measured SAR for this Permissive Change filing is: 0.69 W/kg. The highest measured SAR value across all filings under this FCC ID is 0.69 W/Kg. | |||||
1 2 3 4 5 6 7 8 9 | Class II Permissive Change to allow portable configurations in specific hosts as documented in this filing. Modular approval. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. OEM/Host integrator is responsible for complying with the instructions and requirements for each individual transmitter they choose to incorporate into a host product. Highest measured body SAR values as documented in this filing is: 0.668 W/kg. | |||||
1 2 3 4 5 6 7 8 9 | Class II Permissive Change to add the portable configuration as documented in this filing. The highest measured body SAR documented in this filing is 0.011W/kg at lap held configuration, 0.124W/kg at bystander configuration with 1.5cm separation distance. Modular approval. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance.The overall highest measured SAR for the Netbook/Laptop/Notebook/Tablet host platform is 1.13W/kg with a separation distance of 2.18 cm as described under this FCC ID. | |||||
1 2 3 4 5 6 7 8 9 | Class II Permissive Change to establish the most conservative antenna-to-user separation distance of 6.5 cm for Netbook/Notebook/Laptop PC. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented under this FCC ID number may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons as mobile device per section 2.1091. Installation in other portable/mobile host products is allowed in accordance with FCC notebook/module procedures. Simultaneous transmitters are allowed in portable/mobile products in accordance with FCC multi-transmitter product procedures within the limitations of the installation guidelines document included with the permissive change filing. Compliance of this device in all final product configurations is the responsibility of the Grantee; installation of this device into specific final products may require the submission of a permissive change application, where appropriate, containing data demonstrating compliance for SAR, spurious emissions, and host / module authentication, or new application if appropriate. Users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. OEM/Host integrator is responsible for complying with the instructions and requirements for each individual transmitter they choose to incorporate into a host product. The highest measured body SAR value @ 6.5 cm antenna-to-user separation distance in Netbook/Notebook/Laptop PC platform are: 0.068 W/kg | |||||
1 2 3 4 5 6 7 8 9 | Class II Permissive Change to allow portable configurations in specific hosts aas described in this filing. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. End users must be provided with transmitter operating conditions for satisfying RF exposure compliance. This transmitter is approved for use in configurations specified in the application filing. Additional equipment authorization is required for changes that result in the need for SAR evaluation. Highest measured body SAR value as documented in this filing is 0.00772 W/kg. Highest measured body SAR value as documented for this FCCID is 0.035 W/kg | |||||
1 2 3 4 5 6 7 8 9 | Class II Permissive Change. Output power listed is conducted. This module may be installed only by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except as described in this filing or in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. The highest reported body SAR under this FCCID is 0.035 W/kg. | |||||
1 2 3 4 5 6 7 8 9 | Modular approval. Output power listed is conducted. This module may only be installed by the OEM or an OEM integrator. Only antenna(s) documented in this filing may be used with this transmitter. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except in accordance with FCC multi-transmitter product procedures. OEM integrators and End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | |||||
1 2 3 4 5 6 7 8 9 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 4 5 6 7 8 9 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 4 5 6 7 8 9 | Firm Name |
Compliance Certification Services Inc.
|
||||
1 2 3 4 5 6 7 8 9 |
Cerpass Technology Corporation
|
|||||
1 2 3 4 5 6 7 8 9 |
Compliance Certification Services
|
|||||
1 2 3 4 5 6 7 8 9 |
Sporton International Inc.
|
|||||
1 2 3 4 5 6 7 8 9 | Name |
H**** L********
|
||||
1 2 3 4 5 6 7 8 9 |
E****** C****
|
|||||
1 2 3 4 5 6 7 8 9 |
T****** C****
|
|||||
1 2 3 4 5 6 7 8 9 |
A****** C******
|
|||||
1 2 3 4 5 6 7 8 9 |
B****** J******
|
|||||
1 2 3 4 5 6 7 8 9 | Telephone Number |
886-2******** Extension:
|
||||
1 2 3 4 5 6 7 8 9 |
886-2******** Extension:
|
|||||
1 2 3 4 5 6 7 8 9 |
510-7********
|
|||||
1 2 3 4 5 6 7 8 9 |
886-3******** Extension:
|
|||||
1 2 3 4 5 6 7 8 9 |
510-7********
|
|||||
1 2 3 4 5 6 7 8 9 | Fax Number |
886-2********
|
||||
1 2 3 4 5 6 7 8 9 |
886-2********
|
|||||
1 2 3 4 5 6 7 8 9 |
510-6********
|
|||||
1 2 3 4 5 6 7 8 9 |
886-3********
|
|||||
1 2 3 4 5 6 7 8 9 |
h******@sgs.com
|
|||||
1 2 3 4 5 6 7 8 9 |
e******@cerpass.com.tw
|
|||||
1 2 3 4 5 6 7 8 9 |
t******@ccsemc.com
|
|||||
1 2 3 4 5 6 7 8 9 |
a******@sporton.com.tw
|
|||||
1 2 3 4 5 6 7 8 9 |
b******@ccsemc.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412 | 2462 | 0.332 | ||||||||||||||||||||||||||||||||||||
1 | 2 | 15C | 2412 | 2462 | 0.337 | ||||||||||||||||||||||||||||||||||||
1 | 3 | 15C | 2422 | 2452 | 0.157 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | 2412 | 2462 | 0.332 | ||||||||||||||||||||||||||||||||||||
2 | 2 | 15C | 2412 | 2462 | 0.337 | ||||||||||||||||||||||||||||||||||||
2 | 3 | 15C | 2422 | 2452 | 0.157 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
3 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
3 | 3 | 15C | CC | 2422 | 2452 | 0.157 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
4 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
4 | 3 | 15C | CC | 2422 | 2452 | 0.157 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
5 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
5 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
5 | 3 | 15C | CC | 2422 | 2452 | 0.157 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
6 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
6 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
6 | 3 | 15C | CC | 2422 | 2452 | 0.157 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
7 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
7 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
7 | 3 | 15C | CC | 2422 | 2452 | 0.157 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
8 | 1 | 15B | CC | ||||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
9 | 1 | 15C | CC | 2412 | 2462 | 0.332 | |||||||||||||||||||||||||||||||||||
9 | 2 | 15C | CC | 2412 | 2462 | 0.337 | |||||||||||||||||||||||||||||||||||
9 | 3 | 15C | CC | 2422 | 2452 | 0.157 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC