all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 |
|
User Manual | Users Manual | 3.98 MiB | ||||
1 2 3 |
|
Users Manual | Users Manual | 462.03 KiB | ||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | External Photos | |||||||
1 2 3 | ID Label/Location Info | |||||||
1 2 3 | ID Label/Location Info | |||||||
1 2 3 | ID Label/Location Info | |||||||
1 2 3 | Internal Photos | |||||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | Test Report | |||||||
1 2 3 | Test Setup Photos | |||||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | ID Label/Location Info | |||||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | Cover Letter(s) | |||||||
1 2 3 | RF Exposure Info | |||||||
1 2 3 | Test Report | |||||||
1 2 3 | Cover Letter(s) |
1 2 3 | User Manual | Users Manual | 3.98 MiB |
Aspire Series User's Manual 2012 All Rights Reserved. Aspire Series User's Manual Original Issue: 03/2012 Model number:
Serial number:
Date of purchase:
Place of purchase:
T ABLE OF CONTENTS 5 Safety and comfort First things first 16 Your guides...................................................... 16 Basic care and tips for using your computer.......................................................... 16 Turning your computer on and off ............ 16 Taking care of your computer................... 17 Taking care of your AC adapter................ 18 Cleaning and servicing ............................. 18 Your Acer notebook tour 19 Screen view...................................................... 20 Keyboard view ................................................. 21 Front view ........................................................ 22 Rear view ......................................................... 22 Information on USB 3.0 ............................ 23 Left view........................................................... 24 Right view ........................................................ 25 Base view......................................................... 26 Touchpad 28 Touchpad basics.............................................. 28 Using the keyboard 30 Lock keys and embedded numeric keypad..... 30 Hotkeys..................................................... 31 Windows keys .................................................. 33 Recovery 35 Acer Recovery Management............................ 35 Creating recovery discs ............................ 36 Recovering your system .................................. 39 Types of recovery ..................................... 41 Power management Acer clear.fi 47 Navigating media and photos ......................... 47 Shared files .............................................. 48 Which devices are compatible?............... 49 Playing to another device ........................ 49 50 Acer Green Instant On ............................. 50 Battery pack 51 Battery pack characteristics............................ 51 Charging the battery ................................ 51 Optimizing battery life .............................. 53 Checking the battery level ....................... 53 Battery-low warning................................. 53 Traveling with your computer 55 Disconnecting from the desktop ..................... 55 Moving around ................................................ 55 Preparing the computer ........................... 56 What to bring to meetings ....................... 56 Taking the computer home ............................. 57 Preparing the computer ........................... 57 What to take with you .............................. 57 Special considerations............................. 58 Setting up a home office.......................... 58 Traveling with the computer............................ 59 Preparing the computer ........................... 59 What to take with you .............................. 59 Special considerations............................. 59 Traveling internationally with the computer .... 59 Preparing the computer ........................... 60 What to bring with you............................. 60 Special considerations............................. 60 Table of contents - 3 Connecting to a network Securing your computer 61 Using passwords ............................................. 61 Entering passwords .................................. 62 63 Built-in network feature ............................ 63 Wireless networks 64 Connecting to the Internet ............................... 64 Acer Instant Connect................................ 64 Wireless networks............................................ 64 66 HDMI 67 Universal Serial Bus (USB) 68 Playing DVD movies BIOS utility 69 Boot sequence ................................................ 69 Enable disk-to-disk recovery .......................... 69 Setting passwords........................................... 69 Frequently asked questions 70 Requesting service.......................................... 73 Troubleshooting .............................................. 75 Troubleshooting tips ................................ 75 Error messages ........................................ 75 77 Regulations and safety notices 4 - Table of contents S AFETY AND COMFORT SAFETY INSTRUCTIONS Read these instructions carefully. Keep this document for future reference. Follow all warnings and instructions marked on the product. Turning the product off before cleaning Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners. Use a damp cloth for cleaning. WARNINGS Accessing the power cord Be sure that the power outlet you plug the power cord into is easily accessible and located as close to the equipment operator as possible. When you need to disconnect power to the equipment, be sure to unplug the power cord from the electrical outlet. Disconnecting the power source Observe the following guidelines when connecting and disconnecting power to the power supply unit:
Install the power supply unit before connecting the power cord to the AC power outlet. Unplug the power cord before removing the power supply unit from the computer. If the system has multiple sources of power, disconnect power from the system by unplugging all power cords from the power supplies. Using electrical power This product should be operated from the type of power indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company. Do not allow anything to rest on the power cord. Do not locate this product where people will walk on the cord. Safety and comfort - 5 If an extension cord is used with this product, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed the fuse rating. Do not overload a power outlet, strip or receptacle by plugging in too many devices. The overall system load must not exceed 80% of the branch circuit rating. If power strips are used, the load should not exceed 80% of the power strip's input rating. This product's AC adapter is equipped with a three-wire grounded plug. The plug only fits in a grounded power outlet. Make sure the power outlet is properly grounded before inserting the AC adapter plug. Do not insert the plug into a non-
grounded power outlet. Contact your electrician for details. Warning! The grounding pin is a safety feature. Using a power outlet that is not properly grounded may result in electric shock and/or injury. Note: The grounding pin also provides good protection from unexpected noise produced by other nearby electrical devices that may interfere with the performance of this product. The system can be powered using a wide range of voltages; 100 to 120 or 220 to 240 V AC. The power cord included with the system meets the requirements for use in the country/region where the system was purchased. Power cords for use in other countries/regions must meet the requirements for that country/region. For more information on power cord requirements, contact an authorized reseller or service provider. Protecting your hearing Warning: Permanent hearing loss may occur if earphones or headphones are used at high volume for prolonged periods of time. To protect your hearing, follow these instructions. Increase the volume gradually until you can hear clearly and comfortably. Do not increase the volume level after your ears have adjusted. Do not listen to music at high volumes for extended periods. 6 - Safety and comfort Do not increase the volume to block out noisy surroundings. Decrease the volume if you can't hear people speaking near you. Bundled dummy cards Note: Information in this section may not apply to your computer. Your computer shipped with plastic dummies installed in the card slots. Dummies protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots. General Do not use this product near water. Do not place this product on an unstable cart, stand or table. If the product falls, it could be seriously damaged. Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface. This product should never be placed near or over a radiator or heat register, or in a built-in installation unless proper ventilation is provided. Never push objects of any kind into this product through cabinet slots as they may touch dangerous voltage points or short-out parts that could result in a fire or electric shock. Never spill liquid of any kind onto or into the product. To avoid damage of internal components and to prevent battery leakage, do not place the product on a vibrating surface. Never use it under sporting, exercising, or any vibrating environment which will probably cause unexpected short current or damage rotor devices, HDD, Optical drive, and even exposure risk from lithium battery pack. The bottom surface, areas around ventilation openings and AC adapter may get hot. To avoid injury, ensure they do not come in contact with your skin or body. Your device and its enhancements may contain small parts. Keep them out of the reach of small children. Safety and comfort - 7 Product servicing Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to qualified service personnel. Unplug this product from the wall outlet and refer servicing to qualified service personnel when:
The power cord or plug is damaged, cut or frayed. Liquid was spilled into the product. The product was exposed to rain or water. The product has been dropped or the case has been damaged. The product exhibits a distinct change in performance, indicating a need for service. The product does not operate normally after following the operating instructions. Note: Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition. Guidelines for safe battery usage This computer uses a Lithium-ion or Lithium-polymer battery. Do not use it in a humid, wet or corrosive environment. Do not put, store or leave your product in or near a heat source, in a high temperature location, in strong direct sunlight, in a microwave oven or in a pressurized container, and do not expose it to temperatures over 60 C (140 F). Failure to follow these guidelines may cause the battery to leak acid, become hot, explode or ignite and cause injury and/or damage. Do not pierce, open or disassemble the computer or battery. If the battery leaks and you come into contact with the leaked fluids, rinse thoroughly with water and seek medical attention immediately. For safety reasons, and to prolong the lifetime of the battery, charging will not occur at temperatures below 0 C (32 F) or above 40 C (104 F). 8 - Safety and comfort The full performance of a new battery is achieved only after two or three complete charge and discharge cycles. The battery can be charged and discharged hundreds of times, but it will eventually wear out. When the operation time becomes noticeably shorter than normal, refer to qualified service personnel. Use only the approved batteries, and recharge your battery only with the approved chargers designated for this device. The capacity and lifetime of the battery will be reduced if the computer is left in hot or cold places, such as in a closed car in summer or winter. Always try to keep the computer between 15C and 25C (59F and 77F). A device with a hot or cold battery may not work temporarily, even when the battery is fully charged. Battery performance is especially limited in temperatures well below freezing. Do not dispose of batteries in a fire as they may explode. Batteries may also explode if damaged. Dispose of batteries according to local regulations. Please recycle when possible. Do not dispose as household waste. Wireless devices may be susceptible to interference from the battery, which could affect performance. Note: Please refer to www.acer.com for battery shipping documents. Warning! Batteries may explode if not handled properly. Do not disassemble or dis-
pose of them in fire. Keep them away from children. Follow local regulations when disposing of used batteries. RADIO FREQUENCY INTERFERENCE Warning! For safety reasons, turn off all wireless or radio transmitting devices when using your laptop under the following conditions. These devices may include, but are not limited to: wireless LAN (WLAN), Bluetooth and/or 3G. Remember to follow any special regulations in force in any area, and always switch off your device when its use is prohibited or when it may cause interference or danger. Use the device only in its normal operating positions. This device meets RF exposure guidelines when used normally, and it and its antenna are positioned at least 1.5 centimeters (5/8 inch) away from your body. It should not contain metal and you should position the device the above-stated distance from your body. To successfully transmit Safety and comfort - 9 data files or messages, this device requires a good quality connection to the network. In some cases, transmission of data files or messages may be delayed until such a connection is available. Ensure that the above separation distance instructions are followed until the transmission is completed. Parts of the device are magnetic. Metallic materials may be attracted to the device, and persons with hearing aids should not hold the device to the ear with the hearing aid. Do not place credit cards or other magnetic storage media near the device, because information stored on them may be erased. MEDICAL DEVICES Operation of any radio transmitting equipment, including wireless phones, may interfere with the functionality of inadequately protected medical devices. Consult a physician or the manufacturer of the medical device to determine if they are adequately shielded from external RF energy or if you have any questions. Switch off your device in health care facilities when any regulations posted in these areas instruct you to do so. Hospitals or health care facilities may be using equipment that could be sensitive to external RF transmissions. Pacemakers. Pacemaker manufacturers recommend that a minimum separation of 15.3 centimeters (6 inches) be maintained between wireless devices and a pacemaker to avoid potential interference with the pacemaker. These recommendations are consistent with the independent research by and recommendations of Wireless Technology Research. Persons with pacemakers should do the following:
Always keep the device more than 15.3 centimeters (6 inches) from the pacemaker Not carry the device near your pacemaker when the device is switched on. If you suspect interference, switch off your device, and move it. Hearing aids. Some digital wireless devices may interfere with some hearing aids. If interference occurs, consult your service provider. VEHICLES RF signals may affect improperly installed or inadequately shielded electronic systems in motor vehicles such as electronic fuel injection systems, electronic anti-skid (anti-lock) braking systems, electronic speed control systems, and air bag systems. For more 10 - Safety and comfort information, check with the manufacturer, or its representative, of your vehicle or any equipment that has been added. Only qualified personnel should service the device, or install the device in a vehicle. Faulty installation or service may be dangerous and may invalidate any warranty that may apply to the device. Check regularly that all wireless equipment in your vehicle is mounted and operating properly. Do not store or carry flammable liquids, gases, or explosive materials in the same compartment as the device, its parts, or enhancements. For vehicles equipped with an air bag, remember that air bags inflate with great force. Do not place objects, including installed or portable wireless equipment in the area over the air bag or in the air bag deployment area. If in-vehicle wireless equipment is improperly installed, and the air bag inflates, serious injury could result. Using your device while flying in aircraft is prohibited. Switch off your device before boarding an aircraft. The use of wireless teledevices in an aircraft may be dangerous to the operation of the aircraft, disrupt the wireless telephone network, and may be illegal. POTENTIALLY EXPLOSIVE ENVIRONMENTS Switch off your device when in any area with a potentially explosive atmosphere and obey all signs and instructions. Potentially explosive atmospheres include areas where you would normally be advised to turn off your vehicle engine. Sparks in such areas could cause an explosion or fire resulting in bodily injury or even death. Switch off the device at refueling points such as near gas pumps at service stations. Observe restrictions on the use of radio equipment in fuel depots, storage, and distribution areas; chemical plants; or where blasting operations are in progress. Areas with a potentially explosive atmosphere are often, but not always, clearly marked. They include below deck on boats, chemical transfer or storage facilities, vehicles using liquefied petroleum gas (such as propane or butane), and areas where the air contains chemicals or particles such as grain, dust or metal powders. Do not switch the computer on when wireless phone use is prohibited or when it may cause interference or danger. Safety and comfort - 11 EMERGENCY CALLS Warning: You cannot make emergency calls through this device. To make an emergency call you shall dial out through your mobile phone or other telephone call system. DISPOSAL INSTRUCTIONS Do not throw this electronic device into the trash when discarding. To minimize pollution and ensure utmost protection of the global environment, please recycle. For more information on the Waste from Electrical and Electronics Equipment (WEEE) regulations, visit www.acer-group.com/
public/Sustainability/sustainability01.htm ENERGY STAR Acer's ENERGY STAR qualified products save your money by reducing energy cost and protecting the environment without sacrificing features or performance. Acer is proud to offer our customers products with the ENERGY STAR mark. What is ENERGY STAR?
Products that are ENERGY STAR qualified use less energy and prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the U.S. Environmental Protection Agency. Acer is committed to offering products and services worldwide that help customers save money, conserve energy and improve the quality of our environment. The more energy we can save through higher energy efficiency, the more we reduce greenhouse gases and the risks of climate change. More information refers to www.energystar.gov or www.energystar.gov/powermanagement. Note: Information in this section may not apply to your computer. Acer ENERGY STAR qualified products:
produce less heat and reduce cooling loads in warmer climates. automatically go into "display Sleep" and "computer Sleep" mode after 10 and 30 minutes of inactivity, respectively. 12 - Safety and comfort wake from "Sleep" mode if the keyboard is pressed or mouse is moved. save more than 80% energy when in "Sleep" mode. ENERGY STAR and the ENERGY STAR mark are registered U.S. marks. TIPS AND INFORMATION FOR COMFORTABLE USE Computer users may complain of eyestrain and headaches after prolonged use. Users are also at risk of physical injury after long hours of working in front of a computer. Long work periods, bad posture, poor work habits, stress, inadequate working conditions, personal health and other factors greatly increase the risk of physical injury. Incorrect computer usage may lead to carpal tunnel syndrome, tendonitis, tenosynovitis or other musculoskeletal disorders. The following symptoms may appear in the hands, wrists, arms, shoulders, neck or back:
Numbness, or a burning or tingling sensation. Aching, soreness or tenderness. Pain, swelling or throbbing. Stiffness or tightness. Coldness or weakness. If you have these symptoms, or any other recurring or persistent discomfort and/or pain related to computer use, consult a physician immediately and inform your company's health and safety department. The following section provides tips for more comfortable computer use. Finding your comfort zone Find your comfort zone by adjusting the viewing angle of the monitor, using a footrest, or raising your sitting height to achieve maximum comfort. Observe the following tips:
Refrain from staying too long in one fixed posture. Avoid slouching forward and/or leaning backward. Stand up and walk around regularly to remove the strain on your leg muscles. Take short rests to relax your neck and shoulders. Safety and comfort - 13 Avoid tensing your muscles or shrugging your shoulders. Install the external display, keyboard and mouse properly and within comfortable reach. If you view your monitor more than your documents, place the display at the center of your desk to minimize neck strain. Taking care of your vision Long viewing hours, wearing incorrect glasses or contact lenses, glare, excessive room lighting, poorly focused screens, very small typefaces and low-contrast displays could stress your eyes. The following sections provide suggestions on how to reduce eyestrain. Eyes Rest your eyes frequently. Give your eyes regular breaks by looking away from the monitor and focusing on a distant point. Blink frequently to keep your eyes from drying out. Display Keep your display clean. Keep your head at a higher level than the top edge of the display so your eyes point downward when looking at the middle of the display. Adjust the display brightness and/or contrast to a comfortable level for enhanced text readability and graphics clarity. Eliminate glare and reflections by:
placing your display in such a way that the side faces the window or any light source, minimizing room light by using drapes, shades or blinds, using a task light, changing the display's viewing angle, 14 - Safety and comfort using a glare-reduction filter, using a display visor, such as a piece of cardboard extended from the display's top front edge. Avoid adjusting your display to an awkward viewing angle. Avoid looking at bright light sources for extended periods of time. Developing good work habits The following work habits make computer use more relaxing and productive:
Take short breaks regularly and often. Perform some stretching exercises. Breathe fresh air as often as possible. Exercise regularly and maintain a healthy body. Warning! We do not recommend using the computer on a couch or bed. If this is unavoidable, work for only short periods, take breaks regularly, and do some stretching exercises. Note: For more information, please refer to "Regulations and safety notices" on page 77. Safety and comfort - 15 F IRST THINGS FIRST We would like to thank you for making an Acer notebook your choice for meeting your mobile computing needs. Your guides To help you use your Acer notebook, we have designed a set of guides:
First off, the setup poster helps you get started with setting up your computer. The Quick Guide introduces you to the basic features and functions of your new computer. For more on how your computer can help you to be more productive, please refer to the Aspire Users Manual. This guide contains detailed information on such subjects as system utilities, data recovery, expansion options and troubleshooting. In addition it contains general regulations and safety notices for your notebook. It is available from your computer desktop; simply double-click the Acer Users Manual icon. Basic care and tips for using your computer Turning your computer on and off To turn on the computer, simply press and release the power button. Please refer to the setup poster for the location of the power button. To turn the power off, do any of the following:
16 - First things first Use the Windows shutdown command: click Start then Click Shut Down. Use the power button. You can also put the computer in Sleep mode by pressing the Sleep hotkey <Fn> + <F4>. Note: If you cannot power off the computer normally, press and hold the power button for more than four seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. First things first - 17 Never place the computer on uneven surfaces. Taking care of your AC adapter Here are some ways to take care of your AC adapter:
Do not connect the adapter to any other device. Do not step on the power cord or place heavy objects on top of it. Carefully route the power cord and any cables away from foot traffic. When unplugging the power cord, do not pull on the cord itself but pull on the plug. The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord. Also, the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating. Cleaning and servicing When cleaning the computer, follow these steps:
1. Turn off the computer and remove the battery pack. 2. Disconnect the AC adapter. 3. Use a soft, moist cloth. Do not use liquid or aerosol cleaners. If either of the following occurs:
The computer has been dropped or the body has been damaged;
The computer does not operate normally Please refer to "Frequently asked questions" on page 70. 18 - First things first Y OUR A CER NOTEBOOK TOUR After setting up your computer as illustrated in the setup poster, let us show you around your new Acer computer. Aspire Series Your Acer notebook tour - 19 Screen view
1 2 3 Icon Item Webcam Microphone Display screen Description Web camera for video communication. Internal microphone for sound recording. Displays computer output. 20 - Your Acer notebook tour Keyboard view
1 2 Icon Item Keyboard Touchpad Description For entering data into your computer. Caution: Do not use a keyboard protector or similar cover as the keyboard includes ventilation intakes for cooling. Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click. Your Acer notebook tour - 21 Front view
1 2 Icon Item Power button Description Turns the computer on and off. Power indicator Battery indicator Indicates the computers power status. Indicates battery status. Charging: The light is amber when the battery is charging. Fully charged: The light is blue. Rear view Icon
1 Item Ventilation and cooling fan Description Allows the computer to stay cool. Do not cover or obstruct the openings. 22 - Your Acer notebook tour
2 3 4 5 6 7 Icon Item Headset/speaker jack USB ports USB port with power-off charging HDMI port Description Connects to audio devices (e.g., speakers, headphones) or a headset with microphone. Connects to USB devices. If a port is black it is USB 2.0 compatible, if it is blue it is also USB 3.0 compatible (see below). Supports high-definition digital video connections. Ethernet (RJ-45) port Connects to an Ethernet 10/100/
DC-in jack 1000-based network. Connects to an AC adapter. Information on USB 3.0 Compatible with USB 3.0 and earlier devices. For optimal performance, use USB 3.0-certified devices. Defined by the USB 3.0 specification (SuperSpeed USB). Your Acer notebook tour - 23 Left view
# Icon 1 Item Optical drive 2 3 4 5 Optical disk access indicator Optical drive eject button Emergency eject hole 2-in-1 card reader Description Internal optical drive; accepts CDs or DVDs. Lights up when the optical drive is active. Ejects the optical disk from the drive. Ejects the optical drive tray when the computer is turned off. Carefully insert a straightened paper clip to eject the optical drive tray. Accepts one Secure Digital (SD or SDHC) card or one MultiMediaCard
(MMC). Note: To remove the card, simply pull it from the slot. 24 - Your Acer notebook tour Right view Icon
1 Item Kensington lock slot Description Connects to a Kensington-
compatible computer security lock. Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Keyless models are also available. Your Acer notebook tour - 25 Base view
# Icon 1 Item Ventilation and cooling fan Description Allows the computer to stay cool. Do not cover or obstruct the 2 3 Hard disk bay Houses the computer's hard disk. openings. Memory compartment Speakers Houses the computer's main memory. Deliver stereo audio output. 26 - Your Acer notebook tour
# Icon 4 Item Battery reset pinhole Description Insert a paperclip into the hole and press for four seconds to reset the computer (simulates removing and reinstalling the battery). Your Acer notebook tour - 27 T OUCHPAD The built-in touchpad is a pointing device that senses movement on its surface. This means the cursor responds as you move your finger across the surface of the touchpad. The central location on the palmrest provides optimum comfort and support. Touchpad basics The following items show you how to use the touchpad. Move your finger across the touchpad to move the cursor. Press the touchpad down, or tap, to perform a click, which will select or start an item. Place you finger in the bottom right corner of the touchpad and press to perform a right click. The bottom left and bottom right corners of the touchpad are similar to the left and right buttons on a mouse. 28 - Touchpad Function Open Select Drag Bottom left corner Quickly press twice Press once Press and hold, then use finger on the touchpad to drag the cursor Bottom right corner Main touchpad Press or tap twice (at the same speed as double-
clicking a mouse button) Press or tap once Press or tap twice (at the same speed as double-
clicking a mouse button);
rest your finger on the touchpad on the second tap and drag the cursor Access context menu Press once Note: When using the touchpad, keep it and your fingers dry and clean. The touchpad is sensitive to finger movement; hence, the lighter the touch, the better the response. Tapping harder will not increase the touchpad's responsiveness. Touchpad - 29 U SING THE KEYBOARD The keyboard has full-sized keys and an embedded numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys and embedded numeric keypad Note: Information in this section may not apply to your computer. The keyboard has three lock keys which you can toggle on and off. Lock key Caps Lock Description When Caps Lock is on, all alphabetic characters typed are in uppercase. When Num Lock is on, the embedded keypad is in numeric mode. The keys function as a calculator
(complete with the arithmetic operators +, -, *, and /). Use this mode when you need to do a lot of numeric data entry. A better solution would be to connect an external keypad. When Scroll Lock is on, the screen moves one line up or down when you press the up or down arrow keys respectively. Scroll Lock does not work with some applications. Num Lock
<Fn> + <F11>
Scroll Lock
<Fn> + <F12>
The embedded numeric keypad functions like a desktop numeric keypad. It is indicated by small characters located on the upper right corner of the 30 - Using the keyboard keycaps. To simplify the keyboard legend, cursor-control key symbols are not printed on the keys. Desired access Number keys on embedded keypad Cursor-control keys on embedded keypad Main keyboard keys Hold <Fn> while typing Num Lock on Type numbers in a normal manner. Hold <Shift> while using cursor-control keys. Hold <Fn> while using cursor-control keys. Num Lock off Type the letters in a normal manner. letters on embedded keypad. Hotkeys The computer employs hotkeys or key combinations to access most of the computer's controls like screen brightness and volume output. To activate hotkeys, press and hold the <Fn> key before pressing the other key in the hotkey combination. Hotkey
<Fn> + <F3>
Icon Function Communication key Description Enables / disables the computer's communication devices. (Communication devices may vary by configuration.) Using the keyboard - 31 Hotkey
<Fn> + <F4>
Icon Function Sleep
<Fn> + <F5>
Display toggle
<Fn> + <F6>
Display off Description Puts the computer in Sleep mode. Switches display output between the display screen, external monitor (if connected) and both. Turns the display screen backlight off to save power. Press any key to return.
<Fn> + <F7>
Touchpad toggle Turns the built-in touchpad on and off.
<Fn> + <F8>
Speaker toggle Turns the speakers on and off.
<Fn> + <F11>
NumLk
<Fn> + < >
Brightness up Turns the embedded numeric keypad on or off (only for certain models). Increases the screen brightness. Decreases the screen brightness. Increases the sound volume. Brightness down Volume up Volume down Decreases the sound volume.
<Fn> + < >
<Fn> + < >
<Fn> + < >
32 - Using the keyboard Hotkey
<Fn> +
<Home>
<Fn> +
<Pg Up>
<Fn> +
<Pg Dn>
<Fn> + <End>
Icon Function Play/Pause Stop Previous Next Description Play or pause a selected media file. Stop playing the selected media file. Return to the previous media file. Jump to the next media file. Windows keys The keyboard has two keys that perform Windows-specific functions. Key Description Windows key Pressed alone it launches the Start menu.
>: Open or close the Start menu
> + <D>: Display the desktop
> + <E>: Open Windows Explorer
> + <F>: Search for a file or folder
> + <G>: Cycle through Sidebar gadgets
> + <L>: Lock your computer (if connected to a It can also be used with other keys for other functions:
domain), or switch users (if not connected to a domain)
> + <M>: Minimize all windows Using the keyboard - 33 Key Application key
> + <R>: Open the Run dialog box
> + <T>: Cycle through programs on the taskbar
> + <U>: Open Ease of Access Center
> + <X>: Open Windows Mobility Center
> + <Break>: Display System Properties
> + <Shift+M>: Restore minimized windows
> + <Tab>: Cycle through programs on the Description
taskbar by using Windows Flip 3-D
select Windows Sidebar
<CTRL> + <
computers
<CTRL> + <
cycle through open programs using Windows Flip 3-D This key has the same effect as clicking the right mouse button; it opens the application's context menu.
> + <Space>: Bring all gadgets to the front and
> + <Tab>: Use the arrow keys to
> + <F>: Search for network Note: Depending on your edition of Windows, some shortcuts may not function as described. 34 - Using the keyboard R ECOVERY Acer Recovery Management Note: Acer Recovery Management is only available with a preinstalled Windows operating system. If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the Windows operating system and factory-loaded software and drivers. To ensure you can recover your computer when needed, you should create a recovery backup as soon as possible. Acer eRecovery Management consists of the following functions:
1. Backup:
Create Factory Default Backup Backup Drivers and Applications 2. Restore:
Restore Operating System to Factory Defaults Restore Operating System and Retain User Data Reinstall Drivers or Applications This chapter will guide you through each process. Recovery - 35 To use the password protection feature of Acer eRecovery Management, you must first set the password. The password is set by launching Acer eRecovery Management and clicking Settings. Creating recovery discs To reinstall using discs, you must create a set of recovery discs beforehand. Throughout the process, you will be guided by on-screen instructions. Please read them carefully!
1. Click on Start Management.
> All Programs > Acer, then click on Acer Recovery 36 - Recovery 2. To create recovery discs for the hard drives entire original contents, including Windows and all factory-loaded software and drivers, click Create Factory Default Disc.
- OR -
To create recovery discs for only the factory-loaded software and drivers, click Create Drivers and Applications Backup Disc. Important: We recommend that you create each type of recovery disc as soon as possible. Recovery - 37 The Create Factory Default Backup dialog box opens. This dialog box tells you the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs ready before continuing. 38 - Recovery 3. Insert a blank disc into the drive indicated in the Backup to list, then click Next. You will be shown the backup progress on the screen. The drive ejects each disc as it completes burning it. 4. Remove the disc from the drive and mark it with a permanent marker. Important: Write a unique, descriptive label on each disc, such as Windows Recovery Disc 1 of 2 or Apps/Drivers Recovery disc. Make sure you keep the discs in a safe place that you will remember. 5. If multiple discs are required, insert a new disc when prompted, then click OK. Continue until the process is complete. Recovering your system If Acer support did not help fix your problem, you can use the Acer Recovery Management program. This will restore your computer to the Recovery - 39 same state as when you purchased it, while giving you an option to retain all settings and personal data for later retrieval. To recover your system:
1. Perform minor fixes. If only one or two items of software or hardware have stopped working correctly, the problem may be solved by reinstalling the software or the device drivers. To recover software and drivers that were pre-installed at the factory, see Recovering pre-installed software and drivers on page 41. For instructions on reinstalling software and drivers that were not pre-
installed, see that products documentation or technical support Web site. 2. Revert to a previous system condition. If reinstalling software or drivers does not help, then the problem may be solved by returning your system to a previous state when everything was working correctly. For instructions, see Returning to a previous system condition on page 42. 3. Reset your system to its factory condition. If nothing else has solved the problem and you want to reset your system to factory condition, see Returning your system to its factory condition on page 43. 40 - Recovery Types of recovery Recovering pre-installed software and drivers As a troubleshooting step, you may need to reinstall the software and device drivers that came pre-installed on your computer from the factory. You can recover using either your hard drive or the backup you have created. New software - If you need to recover software that did not come pre-
installed on your computer, you need to follow that softwares installation instructions. New device drivers - If you need to recover device drivers that did not come pre-installed on your computer, follow the instructions provided with the device. To recover your pre-installed software and drivers:
1. Click on Start
> All Programs > Acer, then click on Acer Recovery Management. Acer Recovery Management opens.
- OR -
If you are recovering from your driver and application recovery backup, insert it into the disc drive, then go to Step 3 after the Acer Application Recovery main menu opens. 2. Click on the Restore tab, then click Reinstall Drivers or Applications. The Acer Application Recovery main menu opens. Recovery - 41 3. Click on Contents. A list of software and device drivers opens. 4. Click on the install icon for the item you want to install, then follow the on-screen prompts to complete the installation. Repeat this step for each item you want to reinstall. Returning to a previous system condition Microsoft System Restore periodically takes snapshots of your system settings and saves them as restore points. In most cases of hard-to-
resolve software problems, you can return to one of these restore points to get your system running again. Windows automatically creates an additional restore point each day, and also each time you install software or device drivers. 42 - Recovery Help: For more information about using Microsoft System Restore, click Start, then click Help and Support. Type windows system restore in the Search Help box, then press Enter. To return to a restore point:
1. Click on Start
> Control Panel > System and Security > Action Center, then click on Recovery. 2. Click on Open System Restore, then Next. 3. Click on he restore point you want, click on Next, then Finish. A confirmation message box appears. 4. Click on Yes. Your system is restored using the restore point you specified. This process may take several minutes, and may restart your computer. Returning your system to its factory condition If your computer experiences problems that are not recoverable by other methods, you may need to reinstall everything to return your system to its factory condition. You can reinstall using either your hard drive or the recovery discs you have created. Caution: This complete recovery deletes everything on your hard drive, then reinstalls Windows and all software and drivers that were pre-installed on your system. If you can access important files on your hard drive, back them up now. If you can still run Windows, see Recovering from within Windows below. Recovery - 43 If you cannot run Windows and your original hard drive is still working, see Recovering from the hard drive during startup on page 45. If you cannot run Windows and your original hard drive has been completely re-formatted or you have installed a replacement hard drive, see Recovering from your recovery discs on page 45. Recovering from within Windows To reinstall Windows and all pre-installed software and drivers:
1. Click on Start
> All Programs > Acer, then click on Acer Recovery Management. Acer Recovery Management opens. 2. Click on the Restore tab, then Restore system to factory default. The Confirm Restoration dialog box opens. 3. Click on Yes, then Start. A dialog box displays information about the hard drive that the operating system will be recovered to. Caution: Continuing the process will erase all files on your hard drive. 4. Click on OK. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process may take a while, but a Acer Recovery Management screen shows you its progress. When the recovery has finished, a dialog box prompts you to restart your computer. 5. Click on OK. Your computer restarts. 6. Follow the on-screen prompts for first-time system setup. 44 - Recovery Recovering from the hard drive during startup To reinstall Windows and all pre-installed software and drivers:
1. Turn on your computer, then press Alt+F10 during startup. Acer Recovery Management opens. 2. Click on Restore system from factory default. Caution: Continuing the process will erase all files on your hard drive. 3. Click on Next. Your hard drives original, factory-loaded contents are recovered. This process will take several minutes. Recovering from your recovery discs To reinstall Windows and all pre-installed software and drivers:
1. Turn on your computer, insert the first system recovery disc into your optical disc drive, then restart your computer. Caution: Continuing the process will erase all files on your hard drive. 2. If it is not already enabled, you must enable the F12 Boot Menu:
1. Press F2 when starting your computer. 2. Use the left or right arrow keys to select the Main menu. 3. Press the down key until F12 Boot Menu is selected, press F5 to change this setting to Enabled. 4. Use the left or right arrow keys to select the Exit menu. 5. Select Save Changes and Exit and press Enter. Select OK to confirm. Recovery - 45 6. Your computer will restart. 3. During startup, press F12 to open the boot menu. The boot menu allows you to select which device to start from, such as the hard drive or an optical disc. 4. Use your arrow keys to select the line CDROM/DVD (this line may start with IDE 1...), then press Enter. Windows installs from the recovery disc you inserted. 5. Insert the second recovery disc when prompted, then follow the on-
screen prompts to complete the recovery. 46 - Recovery A CER CLEAR. FI Note: Only for certain models. With Acer clear.fi, you can enjoy videos, photos and music. Stream media from, or to, other devices with Acer clear.fi installed. Note: All devices must be connected to the same network. To watch videos or listen to music open clear.fi Media, to browse photos open clear.fi Photo. Important: When you first open a clear.fi application, Windows Firewall will ask for permission to allow clear.fi to access the network. Select Allow Access in each window. Navigating media and photos The list in the left panel shows your computer (My Library), then other devices if any are connected to your network (Home Shared). Acer clear.fi - 47 To view files on your computer, select one of the categories under My Library, then browse the files and folder on the right. Shared files Devices connected to your network are shown in the Home Shared section. Select a device, then the select the category to explore. After a short delay, shared files and folders are shown on the right. Browse to the file you want to play, then double-click to start playback. Use the media controls in the bar across the bottom of the screen to control playback. For example, when music is selected, you can play, pause or stop playback, and adjust the volume. Note: You must activate sharing on the device that stores the files. Open clear.fi on the device that stores the files, select Edit then make sure Share my library on local network is active. 48 - Acer clear.fi Which devices are compatible?
Certified Acer devices with clear.fi or DLNA software can be used with the clear.fi software. These include DLNA-compliant PCs, smartphones, and NAS (Network Attached Storage) devices. Playing to another device If you want to play the media on another device, you need to do the following:
1. In the bottom right corner, select Play to. 2. Select the remote device that will be used to play the file. Only devices optimised for playback are available in this list, certain PCs and storage devices will not appear. To add a Windows PC to this list, open Windows Media Player, select Stream and Allow remote control of my Player... 3. Select a file in the main window, then use the media controls in the bar across the bottom of the screen to control the remote device. For more help, go to http://www.acer.com/clearfi/download/. Acer clear.fi - 49 P OWER MANAGEMENT This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy. Acer Green Instant On The Acer Green Instant On feature allows your computer to wake up from Sleep mode in less than the time it takes to open the lid. When you close the lid, or select Shut Down > Sleep from the Start menu, your computer enters Sleep mode. While the computer is in Sleep mode, the power indicator LED will flash orange. Open the lid or press any key to wake the computer up from Sleep mode. After 8 hours in Sleep mode, the computer will enter Deep Sleep to preserve battery life. When the computer is in Deep Sleep, the power indicator LED will be turned off. In this state, battery life lasts up to 50 days. Press the power button to wake up from Deep Sleep. Acer Green Instant On uses the power-saving features of your computer to reduce overall power consumption. Note: You can change the delay before entering Deep Sleep with Start > All Programs > Acer > Deep Sleep Settings. 50 - Power management B ATTERY PACK The computer uses an embedded battery pack that gives you long use between charges. Battery pack characteristics The battery pack has the following characteristics:
Employs current battery technology standards. Delivers a battery-low warning. The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer. However, recharging with the computer turned off results in a significantly faster charge time. Charging the battery To charge the battery, plug the AC adapter into the computer, and connect to a mains power outlet. You can continue to operate your computer on AC power while your battery is charging. However, charging the battery with the computer turned off results in a significantly faster charge time. Note: You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully charged battery. Battery pack - 51 Conditioning a new battery pack Before you use a battery pack for the first time, there is a conditioning process that you should follow:
1. Connect the AC adapter and fully charge the battery. 2. Disconnect the AC adapter. 3. Turn on the computer and operate using battery power. 4. Fully deplete the battery until the battery-low warning appears. 5. Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning: Do not expose battery packs to temperatures below 0 C (32 F) or above 45 C (113 F). Extreme temperatures may adversely affect the battery pack. By following the battery conditioning process you condition your battery to accept the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns:
Using the computer on constant AC power. 52 - Battery pack Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. A standard computer battery has a life span of more than 1,000 charges. Optimizing battery life the charge/recharge cycle and Optimizing battery life helps you get the most out of battery operation, prolonging recharging efficiency. You are advised to follow the suggestions set out below:
Use AC power whenever possible, reserving battery for on-the-go use. Eject a PC Card if it is not being used, as it will continue to draw power improving
(for selected models). Excessive recharging decreases the battery life. Look after your AC adapter and battery. Checking the battery level The Windows power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level. Battery-low warning When using battery power pay attention to the Windows power meter. Battery pack - 53 Warning: Connect the AC adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation:
Situation The AC adapter and a power outlet are available. Recommended Action 1. Plug the AC adapter into the computer, and then connect to the mains power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. 1. Save all necessary files. 2. Close all applications. 3. Turn off the computer. The AC adapter or a power outlet is unavailable. 54 - Battery pack T RAVELING WITH YOUR COMPUTER This section gives you tips and hints to consider when moving around or traveling with your computer. these steps to disconnect your computer Disconnecting from the desktop Follow accessories:
1. Save any open files. 2. Remove discs from optical drive(s). 3. Shut down the computer. 4. Close the display cover. 5. Disconnect the cord from the AC adapter. 6. Disconnect any keyboard, pointing device, printer, external monitor and from external other external devices. 7. Disconnect the Kensington lock if you are using one to secure the computer. Moving around When you are just moving within short distances, for example, from your office desk to a meeting room. Traveling with your computer - 55 Preparing the computer Before moving the computer, close and latch the display cover to place it in Sleep mode. You can now safely take the computer anywhere you go within the building. To bring the computer out of Sleep mode, open the display; then press and release the power button. If you are taking the computer to a client's office or a different building, you may choose to shut down the computer:
Click Start then click Shut Down. Or:
You can put the computer in Sleep mode by pressing <Fn> + <F4>. Then close the display. When you are ready to use the computer again, open the display; then press and release the power button. Note: The computer may enter Hibernation or Deep Sleep mode after being in Sleep mode for a period of time. What to bring to meetings If your meeting is relatively short, you probably do not need to bring anything with you other than your computer. If your meeting will be longer, or if your battery is not fully charged, you may want to bring the AC adapter with you to plug in your computer in the meeting room. If the meeting room does not have an electrical outlet, reduce the drain on the battery by putting the computer in Sleep mode. Press <Fn> +
56 - Traveling with your computer
<F4> or close the display cover whenever you are not actively using the computer. Taking the computer home When you are moving from your office to your home or vice versa. Preparing the computer After disconnecting the computer from your desktop, follow these steps to prepare the computer for the trip home:
Check that you have removed all media and compact discs from the drive(s). Failure to remove the media can damage the drive head. Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Caution: Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen. What to take with you Unless you have some items at home, take the following items with you:
AC adapter and power cord. The printed setup poster. Traveling with your computer - 57 Special considerations Follow these guidelines to protect your computer while traveling to and from work:
Minimize the effects of temperature changes by keeping the computer with you. If you need to stop for an extended period of time and cannot carry the computer with you, leave the computer in the trunk of the car to avoid exposing the computer to excessive heat. Changes in temperature and humidity can cause condensation. Allow the computer to return to room temperature, and inspect the screen for condensation before turning on the computer. If the temperature change is greater than 10 C (18 F), allow the computer to come to room temperature slowly. If possible, leave the computer for 30 minutes in an environment with a temperature between outside and room temperature. Setting up a home office If you frequently work on your computer at home, you may want to purchase a second AC adapter for use at home. With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse. 58 - Traveling with your computer Traveling with the computer When you are moving within a larger distance, for instance, from your office building to a client's office building or traveling locally. Preparing the computer Prepare the computer as if you were taking it home. Make sure that the battery in the computer is charged. Airport security may require you to turn on your computer when carrying it into the gate area. What to take with you Take the following items with you:
AC adapter. Additional printer driver files if you plan to use another printer. Special considerations In addition to the guidelines for taking the computer home, follow these guidelines to protect your computer while traveling:
Always take the computer as carry-on luggage. If possible, have the computer inspected by hand. Airport security X-
ray machines are safe, but do not put the computer through a metal detector. Traveling internationally with the computer When you are moving from country to country. Traveling with your computer - 59 Preparing the computer Prepare the computer as you would normally prepare it for traveling. What to bring with you Bring the following items with you:
AC adapter. Power cords that are appropriate for the country to which you are traveling. Additional printer driver files if you plan to use another printer. Proof of purchase, in case you need to show it to customs officials. International Travelers Warranty passport. Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the AC adapter power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in. 60 - Traveling with your computer S ECURING YOUR COMPUTER Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See "BIOS utility" on page 69. User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-
up and resume from Hibernation (if available) for maximum security. Password on Boot secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-
up and resume from Hibernation (if available) for maximum security. Important! Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center. Securing your computer - 61 Entering passwords When a password is set, a password prompt appears in the center of the display screen. When the Supervisor Password is set, a prompt appears when you press <F2> to enter the BIOS utility at boot-up. Type the Supervisor Password and press <Enter> to access the BIOS utility. If you enter the password incorrectly, a warning message appears. Try again and press <Enter>. When the User Password is set and the password on boot parameter is enabled, a prompt appears at boot-up. Type the User Password and press <Enter> to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press <Enter>. Important! You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again. 62 - Securing your computer C ONNECTING TO A NETWORK Built-in network feature The built-in network feature allows you to connect your computer to an Ethernet-based network. To use the network feature, connect an Ethernet cable from the Ethernet
(RJ-45) port on the chassis of the computer to a network jack or hub on your network. Connecting to a network - 63 W IRELESS NETWORKS Connecting to the Internet Your computer's wireless connection is turned on by default. Windows will detect and display a list of available networks during setup. Select your network and enter the password if required. To turn your computer's Bluetooth or wireless connections on or off, press Fn+F3 to open Launch Manager. Note: Click On to enable the wireless/Bluetooth connection. Click Off to disable. Otherwise, open Internet Explorer and follow the instructions. Please refer to your ISP or router documentation. Acer Instant Connect Instant Connect ensures a faster connection to any of the networks that your computer connects to most frequently. Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection. 64 - Wireless networks What are benefits of a wireless network?
Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner. Also you can share an internet connection with other computers in your home. Installation speed and simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings. Components of a wireless LAN To set up your Wireless network at home you need to have the following:
Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally supplies a modem/router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Wireless networks - 65 HDMI HDMI (High-Definition Multimedia Interface) is an industry-supported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable. Use the HDMI port on your computer to connect with high-end audio and video equipment. Single cable implementation allows tidy setup and fast connection. 66 - HDMI U NIVERSAL S ERIAL B US (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources. Universal Serial Bus (USB) - 67 P LAYING DVD MOVIES When the DVD drive module is installed in the optical drive bay, you can play DVD movies on your computer. 1. Insert a DVD. 2. The DVD movie will automatically play after a few seconds. Important! When you launch the DVD player for the first time, the program asks you to enter the region code. DVDs are available for 6 regions. Region code Country or region 1 2 3 4 5 6 USA, Canada Europe, Middle East, South Africa, Japan Southeast Asia, Taiwan, South Korea Latin America, Australia, New Zealand Former USSR, parts of Africa, India Peoples Republic of China Note: To change the region code, insert a DVD movie of a different region into the DVD drive. Once your DVD drive is set to a region code, it will only play DVDs for that region. You can set the region code a maximum of five times (including the first time), after which the last region code set will remain permanent. Recovering your hard disk does not reset the number of times the region code has been set. 68 - Playing DVD movies BIOS UTILITY The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press <F2> during the POST while the computer logo is being displayed. Boot sequence To set the boot sequence in the BIOS utility, activate the BIOS utility, then select Boot from the categories listed at the top of the screen. Enable disk-to-disk recovery To enable disk-to-disk recovery (hard disk recovery), activate the BIOS utility, then select Main from the categories listed at the top of the screen. Find D2D Recovery at the bottom of the screen and use the <F5> and
<F6> keys to set this value to Enabled. Setting passwords To set a password on boot, activate the BIOS utility, then select Security from the categories listed at the top of the screen. Find Password on boot: and use the <F5> and <F6> keys to enable this feature. BIOS utility - 69 F REQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up. Look at the power indicator:
If it is not lit, no power is being supplied to the computer. Check the following:
If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack. Make sure that the AC adapter is properly plugged into the computer and to the power outlet. If it is lit, check the following:
Is a disc in the optical drive? Remove it and press <Ctrl> + <Alt> +
<Del> to restart the system. Do you have a USB storage device (USB disk or smartphone) plugged into your computer? Unplug it and press <Ctrl> + <Alt> +
<Del> to restart the system. Nothing appears on the screen. The computers power management system automatically blanks the screen to save power. Press any key to turn the display back on. 70 - Frequently asked questions If pressing a key does not turn the display back on, three things might be the cause:
The brightness level might be too low. Press <Fn> + < > (increase) to adjust the brightness level. The display device might be set to an external monitor. Press the display toggle hotkey <Fn> + <F5> to toggle the display back to the computer. If the Sleep indicator is lit, the computer is in Sleep mode. Press and release the power button to resume. No audio is heard from the computer. Check the following:
The volume may be muted. In Windows, look at the volume control
(speaker) icon on the taskbar. If it is crossed-out, click the icon and deselect the Mute all option. The volume level may be too low. In Windows, look at the volume control icon on the taskbar. You can also use the volume control buttons to adjust the volume. If headphones, earphones or external speakers are connected to the line-out port on the computer, the internal speakers automatically turn off. I want to eject the optical drive tray without turning on the power. There is a mechanical eject hole on the optical drive. Simply insert the tip of a pen or paperclip into the hole and push to eject the tray. Frequently asked questions - 71 The keyboard does not respond. Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work. Check the following:
Make sure that the printer is connected to a power outlet and that it is turned on. Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer. I want to restore my computer to its original settings without recovery CDs. Note: If your system is the multilingual version, the operating system and language you choose when you first turn on the system will be the only option for future recovery operations. This recovery process helps you restore the C: drive with the original software content that is installed when you purchased your computer. Follow the steps below to rebuild your C: drive. (Your C: drive will be reformatted and all data will be erased.) It is important to back up all data files before using this option. Before performing a restore operation, please check the BIOS settings. 1. Check to see if Acer disk-to-disk recovery is enabled or not. 2. Make sure the D2D Recovery setting in Main is Enabled. 72 - Frequently asked questions 3. Exit the BIOS utility and save changes. The system will reboot. Note: To activate the BIOS utility, press <F2> during POST. To start the recovery process:
1. Restart the system. 2. While the Acer logo is showing, press <Alt> + <F10> at the same time to enter the recovery process. 3. Refer to the onscreen instructions to perform system recovery. Important! This feature occupies 15 GB in a hidden partition on your hard disk. Requesting service International Travelers Warranty (ITW) Your computer is backed by an International Travelers Warranty (ITW) that gives you security and peace of mind when traveling. Our worldwide network of service centers are there to give you a helping hand. An ITW passport comes with your computer. This passport contains all you need to know about the ITW program. A list of available, authorized service centers is in this handy booklet. Read this passport thoroughly. Always have your ITW passport on hand, especially when you travel, to receive the benefits from our support centers. Place your proof-of-
purchase in the flap located inside the front cover of the ITW passport. If the country you are traveling in does not have an Acer-authorized ITW service site, you can still get in contact with our offices worldwide. Please visit www.acer.com. Frequently asked questions - 73 Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps). You are required to provide the following information:
Name:
Address:
Telephone number:
Machine and model type:
Serial number:
Date of purchase:
74 - Frequently asked questions Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer. Do not attempt to open the computer yourself; contact your dealer or authorized service center for assistance. Troubleshooting tips This computer incorporates an advanced design that delivers onscreen error message reports to help you solve problems. If the system reports an error message or an error symptom occurs, see
"Error messages" below. If the problem cannot be resolved, contact your dealer. See "Requesting service" on page 73. Error messages If you receive an error message, note the message and take the corrective action. The following table lists the error messages in alphabetical order together with the recommended course of action. Error messages CMOS battery bad Contact your dealer or an authorized service Corrective action CMOS checksum error center. Contact your dealer or an authorized service center.
- 75 Error messages Disk boot failure Equipment configuration error Hard disk 0 error Hard disk 0 extended type error I/O parity error Keyboard error or no keyboard connected Keyboard interface error Memory size mismatch Corrective action Insert a system (bootable) disk, then press
<Enter> to reboot. Press <F2> (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. Contact your dealer or an authorized service center. Contact your dealer or an authorized service center. Contact your dealer or an authorized service center. Contact your dealer or an authorized service center. Contact your dealer or an authorized service center. Press <F2> (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. If you still encounter problems after going through the corrective measures, please contact your dealer or an authorized service center for assistance. 76 -
R EGULATIONS AND SAFETY NOTICES FCC STATEMENT This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio or television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the device and receiver. Connect the device into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/television technician for help. Notice: Shielded cables All connections to other computing devices must be made using shielded cables to maintain compliance with FCC regulations. NOTICE: PERIPHERAL DEVICES Only peripherals (input/output devices, terminals, printers, etc.) certified to comply with the Class B limits may be attached to this equipment. Operation with non-certified peripherals is likely to result in interference to radio and TV reception. Regulations and safety notices - 77 Caution: Changes or modifications not expressly approved by the manufacturer could void the user's authority, which is granted by the Federal Communications Commission, to operate this computer. NOTICE FOR CANADA This Class B digital apparatus complies with Canadian ICES-003. Remarque l'intention des utilisateurs canadiens Cet appareil numrique de la classe B est conforme a la norme NMB-003 du Canada. COMPLIANT WITH RUSSIAN REGULATORY CERTIFICATION LCD PIXEL STATEMENT The LCD unit is produced with high-precision manufacturing techniques. Nevertheless, some pixels may occasionally misfire or appear as black or red dots. This has no effect on the recorded image and does not constitute a malfunction. RADIO DEVICE REGULATORY NOTICES Note: Below regulatory information is for models with wireless LAN and / or Bluetooth only. To prevent radio interference to the licensed service, this device is intended to be operated indoors. This product complies with the radio frequency and safety standards of any country or region in which it has been approved for wireless use. Depending on configurations, this product may or may not contain wireless radio devices (such as wireless LAN and/or Bluetooth modules). Below information is for products with such devices. 78 - Regulations and safety notices Declaration of Conformity for EU countries Hereby, Acer, declares that this computer is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Wireless operation channels for different domains N. America 2.412-2.462 GHz Ch01 through Ch11 Japan 2.412-2.484 GHz Ch01 through Ch14 Europe ETSI 2.412-2.472 GHz Ch01 through Ch13 France: Restricted wireless frequency bands Some areas of France have a restricted frequency band. The worst case maximum authorized power indoors is:
10 mW for the entire 2.4 GHz band (2400 MHz - 2483.5 MHz) 100 mW for frequencies between 2446.5 MHz and 2483.5 MHz Note: Channels 10 through 13 inclusive operate in the band 2446.6 MHz to 2483.5 MHz. There are few possibilities for outdoor use: On private property or on the private property of public persons, use is subject to a preliminary authorization procedure by the Ministry of Defense, with maximum authorized power of 100 mW in the 2446.5 - 2483.5 MHz band. Use outdoors on public property is not permitted. In the departments listed below, for the entire 2.4 GHz band:
Maximum authorized power indoors is 100 mW Maximum authorized power outdoors is 10 mW Regulations and safety notices - 79 Departments in which the use of the 2400 - 2483.5 MHz band is permitted with an EIRP of less than 100 mW indoors and less than 10 mW outdoors:
01 Ain Orientales 02 Aisne 03 Allier 05 Hautes Alpes 08 Ardennes 09 Ariege 11 Aude 12 Aveyron 16 Charente 24 Dordogne 71 Saone et Loire 75 Paris 82 Tarn et Garonne 84 Vaucluse 88 Vosges 89 Yonne 90 Territoire de Belfort 94 Val de Marne 59 Nord 60 Oise 61 Orne 63 Puy Du Dome 64 Pyrenees Atlantique 66 Pyrenees 67 Bas Rhin 68 Haut Rhin 70 Haute Saone 25 Doubs 26 Drome 32 Gers 36 Indre 37 Indre et Loire 41 Loir et Cher 45 Loret 50 Manche 55 Meuse 58 Nievre This requirement is likely to change over time, allowing you to use your wireless LAN card in more areas within France. Please check with ART for the latest information (www.art-telecom.fr). Note: Your WLAN Card transmits less than 100 mW, but more than 10 mW. 80 - Regulations and safety notices List of national codes This equipment may be operated in the following countries:
Country Country Austria Belgium Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia Lithuania Luxembourg ISO 3166 2 letter code AT BE CY CZ DK EE FI FR DE GR HU IE IT LV LT LU Malta Netherlands Poland Portugal Slovakia Slovenia Spain Sweden United Kingdom Iceland Liechtenstein Norway Switzerland Bulgaria Romania Turkey ISO 3166 2 letter code MT NT PL PT SK SL ES SE GB IS LI NO CH BG RO TR CANADA LOW-POWER LICENSE-EXEMPT RADIO COMMUNICATION DEVICES (RSS-210) Exposure of humans to RF fields (RSS-102) The computer employs low gain integral antennas that do not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canada's website at www.hc-sc.gc.ca/rpb. Regulations and safety notices - 81 This device complies with RSS210 of Industry Canada. This Class B digital apparatus complies with Canadian ICES-003, Issue 4, and RSS-210, No 4 (Dec 2000) and No 5 (Nov 2001).
"To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing."
Cet appareil numrique de la classe B est conforme la norme NMB-003, No. 4, et CNR-
210, No 4 (Dec 2000) et No 5 (Nov 2001). Pour empcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit tre utilis a l'intrieur et devrait tre plac loin des fentres afin de fournir un cran de blindage maximal. Si le matriel (ou son antenne d'mission) est install l'extrieur, il doit faire l'objet d'une licence. Caution: When using IEEE 802.11a wireless LAN, this product is restricted to indoor use due to its operation in the 5.15- to 5.25-GHz frequency range. Industry Canada requires this product to be used indoors for the frequency range of 5.15 GHz to 5.25 GHz to reduce the potential for harmful interference to co-channel mobile satellite systems. High power radar is allocated as the primary user of the 5.25 to 5.35 GHz and 5.65 to 5.85-GHz bands. These radar stations can cause interference with and/
or damage to this device. The maximum allowed antenna gain for use with this device is 6 dBi in order to comply with the E.I.R.P limit for the 5.25- to 5.35 and 5.725 to 5.85 GHz frequency range in point-
to-point operation. 82 - Regulations and safety notices
1 2 3 | Users Manual | Users Manual | 462.03 KiB |
Atheros 802.11n Adapter Model AR5B97 802.11n Adapter June. 2009 20002006 by Atheros Communications, Inc. All rights reserved. ATHEROS
, Driving the Wireless Future Mode trademarks are the property of their respective holders.
, and the Air is Cleaner at 5-GHz
, the Atheros logo, 5-UP are trademarks of Atheros Communications, Inc. All other
, Atheros Driven
, Atheros Turbo Notice The information in this document has been carefully reviewed and is believed to be accurate. Nonetheless, this document is subject to change without notice, and Atheros Communications, Inc. (Atheros) assumes no responsibility for any inaccuracies that may be contained in this document, and makes no commitment to update or to keep current the contained information, or to notify a person or organization of any updates. Atheros reserves the right to make changes, at any time, in order to improve reliability, function or design and to attempt to supply the best product possible. Atheros does not represent that products described herein are free from patent infringement or from any other third party right. No part of this document may be reproduced, adapted or transmitted in any form or by any means, electronic or mechanical, for any purpose, except as expressly set forth in a written agreement signed by Atheros. Atheros or its affiliates may have patents or pending patent applications, trademarks, copyrights, maskwork rights or other intellectual property rights that apply to the ideas, material and information expressed herein. No license to such rights is provided except as expressly set forth in a written agreement signed by Atheros. ATHEROS MAKES NO WARRANTIES OF ANY KIND WITH REGARD TO THE CONTENT OF THIS DOCUMENT. IN NO EVENT SHALL ATHEROS BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL SPECULATORY OR CONSEQUENTIAL DAMAGES ARISING FROM THE USE OR INABILITY TO USE THIS PRODUCT OR DOCUMENTATION, EVEN IF ADVISED OF THE POSSIBLITY OF SUCH DAMAGES. IN PARTICULAR, ATHEROS SHALL NOT HAVE LIABILITY FOR ANY HARDWARE, SOFTWARE, OR DATA TRANSMITTED OR OTHERWISE USED WITH THE PRODUCT, INCLUDING THE COSTS OF REPAIRING, REPLACING, INTEGRATING, INSTALLING OR RECOVERING SUCH HARDWARE, SOFTWARE OR DATA. ATHEROS SPECIFICALLY DISCLAIMS THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE AS THEY MIGHT OTHERWISE APPLY TO THIS DOCUMENT AND TO THE IDEAS, MATERIAL AND INFORMATION EXPRESSED HEREIN. Document Conventions Text Conventions bold Bold type within paragraph text indicates commands, file names, directory names, paths, output, or returned values. Example: The DK_Client package will not function unless you use the wdreg_install batch file. italic Within commands, italics indicate a variable that the user must specify. Example: mem_alloc size_in_bytes Titles of manuals or other published documents are also set in italics. Courier The Courier font indicates output or display. Example:
Menu Error:Unable to allocate memory for transfer!
The Menu character tag is used for menu items. Example: Choose Edit > Copy.
Within commands, items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit. Within commands, items enclosed in braces are options from which the user must choose. Within commands, the vertical bar separates options. An ellipsis indicates a repetition of the preceding parameter. The right angle bracket separates successive menu selections. Example: Start > Programs > DK > wdreg_install. Notices NOTE: This message denotes neutral or positive information that calls out important points to the text. A note provides information that may apply only in special cases. Atheros Communications, Inc. COMPANY CONFIDENTIAL iii Feb. 2009 Revision History Revision Feb. 2009 Description of Changes Initial Release iv Dec 2007 Atheros Communications, Inc. COMPANY CONFIDENTIAL Contents Introduction .......................................................................................................... 7 System Requirements .................................................................................... 7 Profile Management ............................................................................................. 7 Create or Modify a Configuration Profile .................................................... 7 Remove a Configuration Profile ................................................................... 8 Auto Profile Selection Management ................................................................... 8 Switching to a Different Configuration Profile .................................................. 9 Import and Export Profiles .................................................................................. 9 Importing a Profile ............................................................................................... 9 Exporting a Profile ............................................................................................... 9 TCP/IP Configuration ......................................................................................... 9 Configuring the TCP/IP Address for the network device: ............................... 9 General Tab......................................................................................................... 10 Advanced Tab..................................................................................................... 10 Security Tab ........................................................................................................ 11 Using EAP-TLS Security.............................................................................. 12 Using EAP-TTLS Security ........................................................................... 12 Using PEAP (EAP-GTC) Security ............................................................... 13 Using PEAP-MSCHAP V2 Security............................................................ 14 Using LEAP Security ................................................................................... 15 Configuring LEAP.............................................................................................. 15 Pre-Shared Encryption Keys.............................................................................. 16 Defining pre-shared encryption keys:............................................................... 16 Overwriting an Existing Static WEP Key.......................................................... 16 Disabling Static WEP.......................................................................................... 16 Using WPA Passphrase Security....................................................................... 17 Zero Configuration............................................................................................. 17 Wireless Network Configuration ...................................................................... 17 Check the Status Information or Diagnostics ................................................... 18 Atheros Communications, Inc. COMPANY CONFIDENTIAL v Feb. 2009 Current Status...............................................................................................18 Adapter Information Button ..............................................................................19 Diagnostics Tab...................................................................................................19 Transmitted Frames............................................................................................20 Received Frames .................................................................................................20 Scan Available Networks ...................................................................................20 Connecting to a different network.....................................................................20 Display Settings ..................................................................................................22 ACU Tools ...........................................................................................................22 Tray Icon..............................................................................................................23 Color ....................................................................................................................24 Quality .................................................................................................................24 RSSI*.....................................................................................................................24 Ad Hoc Mode......................................................................................................24 Ad Hoc Mode Profile Configuration ..........................................................24 Infrastructure (Access Point) Mode ...................................................................25 Infrastructure (Access Point) Mode Profile Configuration........................25 Uninstall an Old Driver ......................................................................................26 Additional Security Features .............................................................................26 Message Integrity Check (MIC) .........................................................................26 Advanced Status Information ............................................................................27 Compliance..........................................................................................................28 Industry Canada Notice: ................................................... !
Avis de Conformit la Rglementation dIndustrie Canada:...!
European Community CE Notice: ................................................................28 vi Dec 2007 Atheros Communications, Inc. COMPANY CONFIDENTIAL Introduction The Atheros 802.11n Adapter supports 802.11bg operation. The card uses the Atheros Client Utility (ACU) which is a user-mode utility designed to edit and add profiles for selected Atheros network interface adapters. System Requirements Laptop/ PC containing:
32-bit PCI Express Bus 32 MB memory or greater 300 MHz processor or higher Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6) Profile Management Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility. Add a profile Edit a profile Import a Profile Export a Profile Order profiles Switch to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode (which uses an access point) or ad hoc mode (a group of stations participating in the wireless LAN). Create or Modify a Configuration Profile To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab. To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab. Note that the ACU only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the New button displays an error message. Remove an old profile or modify an existing profile for a new use. Atheros Communications, Inc. COMPANY CONFIDENTIAL 7 Feb. 2009 Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button. 2. The Auto Profile Selection Management window appears, with a list of all created profiles in the Available Profiles box. 3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto Selected Profiles box. Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box. 2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority. 3. Click OK. 4. Check the Auto Select Profiles box. 5. Save the modified configuration file. When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the adapter tries the next highest priority profile that matches the SSID, and so on. With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the adapter tries with the next highest priority profile. 8 Atheros Communications, Inc. COMPANY CONFIDENTIAL Switching to a Different Configuration Profile 1. To switch to a different profile, go to the Profile Management tab. 2. Click on the profile name in the Profile List. 3. Click the Activate button. The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength for that profile. Import and Export Profiles Importing a Profile 1. From the Profile Management tab, click the Import button. The Import Profile window appears. 2. Browse to the directory where the profile is located. 3. Highlight the profile name. 4. Click Open. The imported profile appears in the profiles list. Exporting a Profile 1. From the Profile Management tab, highlight the profile to export. 2. Click the Export button. The Export Profile window appears. 3. Browse to the directory to export the profile to. 4. Click Save. The profile is exported to the specified location. TCP/IP Configuration Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections. 2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties. 3. Select Internet Protocol (TCP/IP) and click Properties. 4. Click the radio button Use the following IP address, then enter an IP address and Subnet mask. Assigning an IP address and Subnet mask allows stations to operate in access point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click OK to finish. Atheros Communications, Inc. COMPANY CONFIDENTIAL 9 Feb. 2009 General Tab In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile. This name must be unique. Profile names are not case sensitive. Client Name Identifies the client machine. Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters. Configure up to three SSIDs (SSID1, SSID2, and SSID3). Advanced Tab In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. Edit the fields in the Advanced tab of Profile Management to configure the profile. Transmit Power Level Power Save Mode Selects the transmit power level in mW. Actual transmit power may be limited by hardware. Specify:
Maximum mode causes the access point to buffer incoming messages for the wireless adapter. The adapter periodically polls the access point to see if any messages are waiting. Normal uses maximum when retrieving a large number of packets, then switches back to power save mode after retrieving the packets. Off turns power saving off, thus powering up the wireless adapter continuously for a short message response time. Network Type Specifies the network as either infrastructure or ad hoc. 802.11b Preamble Specifies the preamble setting in 802.11b. The default setting is Short &
Long (access point mode), which allows both short and long headers in the 802.11b frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames. Authentication Mode Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but switches it to open authentication if shared fails. Open enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match. Shared only allows the adapter to associate with access points that have the same WEP key. 10 Atheros Communications, Inc. COMPANY CONFIDENTIAL For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the adapter should attempt to associate. Security Tab In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window. Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the General and Advanced tabs. WPA/WPA2 Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP WPA/WPA2 Passphrase Enables WPA/WPA2 Passphrase security. Click on the Configure button and fill in the WPA/WPA2 Passphrase. 802.1x Enables 802.1x security. This option requires IT administration. Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-FAST EAP-TLS EAP-TTLS PEAP (EAP-GTC) PEAP (EAP-MSCHAP V2) LEAP If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Note: If the Lock checkbox is checked, you cannot change any values in this profile. See your system administrator. Pre-Shared Key
(Static WEP) Enables the use of pre-shared keys that are defined on both the access point and the station. To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-
Shared Keys window. If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to Atheros Communications, Inc. COMPANY CONFIDENTIAL 11 Feb. 2009 allow association. None No security (not recommended). Using EAP-TLS Security To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list. The server/domain name and the login name are filled in automatically from the certificate information. Click OK. 3. Click OK. 4. Activate the profile. Using EAP-TTLS Security To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA/WPA2 radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TTLS from the drop-down menu. Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user name. OR: Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) 12 Atheros Communications, Inc. COMPANY CONFIDENTIAL Enter the domain name of the server from which the client will accept a certificate. Change the login name if needed. 5. Click OK. 6. Enable the profile. Using PEAP (EAP-GTC) Security To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-GTC) from the drop-down menu. To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. To avoid the need to log on again after resuming operation (for example, after your computer goes into standby or hibernate mode), check Always Resume the Secure Session. 3. Select the appropriate network certificate authority from the drop-down list. 4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 5. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication. 6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL 13 Feb. 2009 Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu. To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager. 1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP user name. OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended) Enter the domain name of the server from which the client will accept a certificate. The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 5. Click OK. 6. Enable the profile. 14 Atheros Communications, Inc. COMPANY CONFIDENTIAL Using LEAP Security To use security In the Atheros Client Utility, access the Security tab in the Profile Management window. LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager. Configuring LEAP On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down menu. OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. 1. Click the Configure button. 2. Specify a user name and password. Select to Use Temporary User Name and Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP user name. OR: Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process. Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use. 3. Enter the user name and password. 4. Confirm the password. 5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server. (default) OR: Enter a specific domain name. 6. If desired, check No Network Connection Unless User Is Logged In to force the wireless adapter to disassociate after logging off. 7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Atheros Communications, Inc. COMPANY CONFIDENTIAL 15 Feb. 2009 Pre-Shared Encryption Keys Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces). Encryption Keys WEP Keys
(1-4) WEP Key Size Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the key as the default encryption key. Defines the size for each encryption key. The options include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII) 4. Click OK for the changes to take effect. Overwriting an Existing Static WEP Key 1. Click the Pre-Shared Key radio button on the Security tab. 2. Click on Configure. 3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click in the field of the existing static WEP key to overwrite. 4. Delete the asterisks in that field. 5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP To disable static WEP for a particular profile, Select any other security option on the Profile Management tab to automatically disable static WEP OR: choose None on the Security tab to disable security, and click OK (not recommended). 16 Atheros Communications, Inc. COMPANY CONFIDENTIAL Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. Zero Configuration This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS). Wireless Network Configuration The Windows WZCS is a service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured. To set Zero Configuration on Windows XP, take the following steps:
1. 2. Select the check box Use Windows to configure my wireless network settings to set In Windows XP, open the Wireless Network Configuration Properties dialog box. Zero Configuration. When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles, thus users can not ( create new profiles with different settings while using Windows Zero Configuration. The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Profile Management tab of the ACU. Atheros Communications, Inc. COMPANY CONFIDENTIAL 17 Feb. 2009 In Windows XP, open the Wireless Network Configuration Properties dialog box. To turn Zero Configuration off on Windows XP, take the following steps:
1. 2. Clear the check box Use Windows to configure my wireless network settings to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the ACU Profile Management tab. Check the Status Information or Diagnostics The Atheros client utility includes a number of tools to display current diagnostics and status information. Check current status Check driver information Check receive and transmit diagnostics Current Status The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Current Status screen. Profile Name The name of the current selected configuration profile. Set up the configuration name on the General tab. Link Status Shows whether the station is associated to the wireless network. Wireless Mode Displays the wireless mode. Configure the wireless mode on the Advanced tab. IP Address Displays the computer's IP address. Network Type The type of network the station is connected to. Options include:
Infrastructure (access point) Ad Hoc Configure the network type on the Advanced tab. Current Channel Shows the currently connected channel. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the Shows whether server based authentication is used. encryption type on the Security tab. Signal Strength Shows the strength of the signal. Click the Advanced button to see the advanced status diagnostics. 18 Atheros Communications, Inc. COMPANY CONFIDENTIAL Adapter Information Button The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab. Card Name Name of the wireless network adapter. MAC Address MAC address of the wireless network adapter. Driver Driver name and path of the wireless network adapter driver. Driver Version Version of the wireless network adapter driver. Driver Date Creation date of the wireless network adapter driver. Client Name Name of the client computer. Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The Diagnostics tab does not require any configuration. It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received Broadcast packets transmitted and received Unicast packets transmitted and received Total bytes transmitted and received The Adapter Information button has general information about the wireless network adapter and NDIS driver. The Advanced Statistics button to shows statistics for diagnostics for frames received by or transmitted to the wireless network adapter:
Atheros Communications, Inc. COMPANY CONFIDENTIAL 19 Feb. 2009 Transmitted Frames Frames transmitted OK Frames retried Frames dropped No ACK frames ACK frames RTS frames Clear-to-send (CTS) frames No CTS frames Retried RTS frames Retried data frames Received Frames Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out Authentication rejects: the number of AP authentication failures received by the wireless network adapter Association time-out Association rejects: the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Scan Available Networks Scan Available Networks Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile for that network. Infrastructure
(AP) Network Connected Infrastructure
(AP) Network 20 Atheros Communications, Inc. COMPANY CONFIDENTIAL Ad Hoc Network Connected Ad Hoc Network Encryption Active Atheros Communications, Inc. COMPANY CONFIDENTIAL 21 Feb. 2009 Display Settings To change the display settings, choose Options > Display Settings from the menu. The display settings dialog box contains tools to set the:
Signal Strength Display Units Sets the units used when displaying signal strength: percentage (%) or dBm. Refresh Interval Use the up/down arrows to set the display refresh interval in seconds. Data Display Sets the display to cumulative or relative:
Relative displays the change in statistical data since the last update. Cumulative displays statistical data collected since opening the profile. ACU Tools Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio Enable or disable the RF Signal on all Atheros Enable/Disable Tray Icon station reference designs. Enable or disable the tray icon. Troubleshooting Run the optional Troubleshooting Utility. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Atheros Client Utility application. 22 Atheros Communications, Inc. COMPANY CONFIDENTIAL Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address. Right-click on the tray icon to:
Help Open the online help. Open Atheros Client Utility Launch the Atheros Client Utility (ACU). Use the ACU to configure a profile or view status and statistics information. Troubleshooting Run the Troubleshooting Utility. Preferences Set the ACU startup and menu options. Check to start the program automatically when Windows starts, and check menu items that should appear on the popup menu. Enable/Disable Radio Enable or disable the RF signal. Manual LEAP Login Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to the access point. Select Profile Click a configuration profile name to switch to. If no configuration profile exists for a connection, add a profile. Show Connection Status Shows whether auto profile selection is enabled. This window displays connection information:
Active Profile Displays the active configuration profile name. Auto Profile Selection Connection Status Link Quality SSID Access Point Name Displays whether the adapter is connected to a wireless network. Shows the name of the AP the wireless adapter is connected to. Displays the SSID of the associated network. Lists the quality of the link connection. Access Point IP Address Link Speed Adapter IP Address Shows the IP address of the access point the wireless adapter is connected to. Lists the speed of the link connection. Displays the IP address of the wireless adapter. Exit Exit the Atheros Client Utility application. Atheros Communications, Inc. COMPANY CONFIDENTIAL 23 Feb. 2009 The colors are defined as follows:
Color Green Green Yellow Red Gray Quality Excellent Good Poor Poor RSSI*
20 dB +
10-20 dB +
5-10 dB
< 5 dB No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage. Enable or disable the tray icon in the Action menu. Ad Hoc Mode In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP). To connect to an ad hoc network, configure the profile for ad hoc mode. Ad Hoc operation may be limited by Hardware to meet regulatory requirements. Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab) Transmit Power Level 802.11b Preamble (if using 802.11b) Wireless Mode When Starting an Ad Hoc Network 24 Atheros Communications, Inc. COMPANY CONFIDENTIAL Make sure to also edit the General and Security tabs. Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here. To connect to an access point network, configure the profile for access point mode. Infrastructure (Access Point) Mode Profile Configuration To configure a profile in infrastructure (access point) mode, change the Network Type in the Advanced tab. For access point mode, modify the settings:
Power Save Mode 802.11b Preamble (if using 802.11b) Wireless Mode 802.11 Authentication Mode Make sure to also edit the General and Security tabs. Atheros Communications, Inc. COMPANY CONFIDENTIAL 25 Feb. 2009 Uninstall an Old Driver Uninstall an old driver before upgrading to a new NDIS driver release. To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4. 1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros AR500x Wireless Network Adapter, and choose Uninstall. 2. Click OK to uninstall the device. 3. When the device is uninstalled from Device Manager, search for and delete the driver files that reside in the system. a. Go to the Start menu and choose Search > For Files or Folders. b. Enter oem*.inf in the Search for files or folders named: field, and enter Atheros in the Containing text: field. c. Click Search Now. A few files matching these criteria are possible, if previous drivers have not been removed properly. d. Choose the files that have been found and delete them from the system. 4. To complete the uninstallation, remove the file ar5211.sys from the folder
\WINNT\system32\drivers. Additional Security Features These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point. Message Integrity Check (MIC) MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering. Temporal Key Integrity Protocol (TKIP) This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys. Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. 26 Atheros Communications, Inc. COMPANY CONFIDENTIAL Advanced Status Information Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen. Network Name (SSID) Displays the wireless network name. Configure the network name on the General tab. Shows whether server based authentication is used. Server Based Authentication Data Encryption Displays the encryption type the driver is using. Configure the encryption type on the Security tab. Authentication Type Displays the authentication mode. Configure the authentication mode on the General tab. Message Integrity Check Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets. Associated AP Name Displays the name of the access point the wireless adapter is associated to. Associated AP IP Address Associated AP MAC Address Shows the IP address of the access point the wireless adapter is associated to. Displays the MAC address of the access point the wireless adapter is associated to. Power Save Mode Shows the power save mode. Power management is disabled in ad hoc mode. Configure the power save mode on the Advanced tab. Current Power Level Displays the transmit power level rate in mW. Current Signal Strength Shows the current signal strength in dBm. Current Noise Level Displays the current noise level in dBm. Up Time Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds. 802.11b Preamble Displays the 802.11b preamble format. Configure the preamble format on the Advanced tab. Current Receive Rate Shows the current receive rate in Mbps. Current Transmit Rate Displays the current transmit rate in Mbps. Channel Shows the currently connected channel. Frequency Displays frequency the station is using. Channel Set Shows the current channel set. Atheros Communications, Inc. COMPANY CONFIDENTIAL 27 Feb. 2009 Regulatory Compliance Notices USA-Federal Communications Commission (FCC) FCC Radio-Frequency Exposure & Approval Conditions:
FCC ID#: PPD-AR5B97 1. Antennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of user during normal operating condition. This device must not be co-located or operating in conjunction with any other antenna or transmitter. 2. Only those antennas filed under FCC ID:PPD-AR5B97 can be used with this device. 3. When the Minicard is installed in a system where the antenna location is less than 20 cm separation distance to the body of the user, additional equipment authorization is required. 4. The regulatory label on the final system must include the statement: Contains FCC ID:PPD-AR5B97 . 5. The final system integrator must ensure there is no instruction provided in the user manual or customer documentation indicating how to install or remove the transmitter module. 6. AR5B97 must be installed and used in strict accordance with the manufacturers instructions as described in the user documentation that comes with the product. This device complies with the following radio frequency and safety standards. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna
-Increase the distance between the equipment and the receiver.
-Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. 28 Atheros Communications, Inc. COMPANY CONFIDENTIAL IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization. End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained between the antenna and users. The final end product must be labeled in a visible area with the following: Contains FCC ID: PPD-AR5B97. Manual Information To the End User The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the users manual of the end product which integrates this module. The end user manual shall include all required regulatory information/warning as show in this manual. Canada Industry Canada (IC) This device complies with RSS 210 of Industry Canada. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device. The term "IC" before the equipment certification number only signifies that the Industry Canada technical specifications were met. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. IMPORTANT NOTE:
Atheros Communications, Inc. COMPANY CONFIDENTIAL 29 Feb. 2009 IC Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Antenna having a higher than approved gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication. This device is intended only for OEM integrators under the following conditions:
The transmitter module may not be co-located with any other transmitter or antenna. As long as conduction above is met, further transmitter test will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.). IMPORTANT NOTE:
In the event that these conditions can not be met (for example certain laptop configurations or co-location with another transmitter), then the IC authorization is no longer considered valid and the IC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate IC authorization. End Product Labeling The final end product must be labeled in a visible area with the following: Contains IC : 4104A-
AR5B97. Manual Information That Must be Included The OEM integrator has to be aware not to provide information to the end user regarding how to install or remove. This RF module in the users manual of the end product which integrates this module. The users manual for OEM Integrators must include the following information in a prominent location IMPORTANT NOTE: To comply with FCC RF exposure compliance requirements. The antenna must not be co-located or operating in conjunction with any other antenna or transmitter. 30 Atheros Communications, Inc. COMPANY CONFIDENTIAL European Community CE Notice:
The CE! mark indicates compliance with the essential requirements of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
EN 300 328 EN 301 489-17 EN 60950 Marking by the symbol: ! indicates that usage restrictions apply in countries listed on this products packaging. Atheros Communications, Inc. COMPANY CONFIDENTIAL 31 Feb. 2009 Taiwan DGT Radio Compliance:
AR5B97 5.25-5.35(GHz) Japan Telecom Certification - JATE 32 Atheros Communications, Inc. COMPANY CONFIDENTIAL Atheros Communications, Incorporated 5480 Great America Parkway Santa Clara, CA 95054 t: 408/773-5200 f: 408/773-9940 www.atheros.com Atheros Communications, Inc. COMPANY CONFIDENTIAL 33 Feb. 2009
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2012-03-22 | 2422 ~ 2452 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 2009-08-14 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
3 | JBP - Part 15 Class B Computing Device Peripheral |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 | Effective |
2012-03-22
|
||||
1 2 3 |
2009-08-14
|
|||||
1 2 3 | Applicant's complete, legal business name |
Qualcomm Atheros, Inc.
|
||||
1 2 3 | FCC Registration Number (FRN) |
0003716743
|
||||
1 2 3 | Physical Address |
1700 Technology Dr
|
||||
1 2 3 |
San Jose, California 95110
|
|||||
1 2 3 |
United States
|
|||||
app s | TCB Information | |||||
1 2 3 | TCB Application Email Address |
c******@ccsemc.com
|
||||
1 2 3 |
m******@ccsemc.com
|
|||||
1 2 3 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 3 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 3 | Grantee Code |
PPD
|
||||
1 2 3 | Equipment Product Code |
AR5B97
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 | Name |
P****** G****
|
||||
1 2 3 | Title |
Vice President, Regulatory Engineering
|
||||
1 2 3 | Telephone Number |
858-6********
|
||||
1 2 3 | Fax Number |
858-6********
|
||||
1 2 3 |
p******@qti.qualcomm.com
|
|||||
app s | Technical Contact | |||||
1 2 3 | Firm Name |
Bureau Veritas Consumer Product Service (Hong Kon
|
||||
1 2 3 | Name |
A****** C****
|
||||
1 2 3 | Physical Address |
81-1 Luliaoken, 9th Lin, Wulung Tsuen Chiunglin
|
||||
1 2 3 |
Hsinchu, 307
|
|||||
1 2 3 |
Taiwan
|
|||||
1 2 3 | Telephone Number |
+886-********
|
||||
1 2 3 | Fax Number |
+886-********
|
||||
1 2 3 |
a******@adt.com.tw
|
|||||
app s | Non Technical Contact | |||||
1 2 3 | Firm Name |
Bureau Veritas Consumer Product Service (Hong Kon
|
||||
1 2 3 | Name |
A******** C****
|
||||
1 2 3 | Physical Address |
81-1 Luliaoken, 9th Lin, Wulung Tsuen Chiunglin
|
||||
1 2 3 |
Hsinchu, 307
|
|||||
1 2 3 |
Taiwan
|
|||||
1 2 3 | Telephone Number |
+886-********
|
||||
1 2 3 | Fax Number |
+886-********
|
||||
1 2 3 |
a******@adt.com.tw
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 3 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 09/18/2012 | ||||
1 2 3 | 09/28/2009 | |||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 | JBP - Part 15 Class B Computing Device Peripheral | |||||
1 2 3 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11n 2x2 Minicard | ||||
1 2 3 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 | Modular Equipment Type | Single Modular Approval | ||||
1 2 3 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 3 | Original Equipment | |||||
1 2 3 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 | Grant Comments | Class II Permissive Change to allow configuration in a specific portable host as described in this filing. Power listed is the maximum combined conducted output power. Device is 2x2 Spatial Multiplexing MIMO Mini-PCI Module. Approval is limited to OEM installation only. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter except as described in this filing or in accordance with the FCC multitransmitter product procedures. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. This grant is valid only when the device is sold to OEM integrators and the OEM integrators are instructed to ensure that the end user has no manual instructions to remove or install the device. Highest measured body SAR values as documented in this filing are 2.4 GHz: 0.689 W/kg | ||||
1 2 3 | Power listed is the maximum combined conducted output power. Device is 2x2 Spatial Multiplexing MIMO Mini-PCI Module. Approval is limited to OEM installation only. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-Users must be provided with transmitter operation conditions for satisfying RF exposure compliance. This grant is valid only when the device is sold to OEM integrators and the OEM integrators are instructed to ensure that the end user has no manual instructions to remove or install the device. | |||||
1 2 3 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 | Firm Name |
SGS TAIWAN LTD.
|
||||
1 2 3 |
Bureau Veritas CPS (H.K.) Ltd., Taoyuan Branch
|
|||||
1 2 3 | Name |
N**** B********
|
||||
1 2 3 |
R**** C******
|
|||||
1 2 3 | Telephone Number |
886-2******** Extension:
|
||||
1 2 3 |
886-3******** Extension:
|
|||||
1 2 3 | Fax Number |
886-2********
|
||||
1 2 3 |
886-3********
|
|||||
1 2 3 |
n******@sgs.com
|
|||||
1 2 3 |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC MO | 2412 | 2462 | 0.16 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC MO | 2412 | 2462 | 0.51 | |||||||||||||||||||||||||||||||||||
1 | 3 | 15C | CC MO | 2412 | 2462 | 0.505 | |||||||||||||||||||||||||||||||||||
1 | 4 | 15C | CC MO | 2422 | 2452 | 0.466 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC MO | 2412 | 2462 | 0.16 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15C | CC MO | 2412 | 2462 | 0.51 | |||||||||||||||||||||||||||||||||||
2 | 3 | 15C | CC MO | 2412 | 2462 | 0.505 | |||||||||||||||||||||||||||||||||||
2 | 4 | 15C | CC MO | 2422 | 2452 | 0.466 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15B | CC |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC