Fujitsu Client Computing WB0034 Users Manual

FCC ID: EJE-WB0034 (IC: 337J-WB0034) Report No. M050750_Cert_WLL4070_DTS_BT
APPENDIX I
EMC Technologies Pty Ltd – 57 Assembly Drive, Tullamarine VIC 3043 Australia
www.emctech.com.au
P7010.book Page 53 Wednesday, June 1, 2005 3:39 PM
Configuration of the WLAN Device
WIreless LAN User’s Guide
The WLAN Device can be configured to establish wire­less network connectivity using one of the following tools:
Intel PROSet Software - The Intel PROSet Software allows for multiple profile setup and supports auto­matic profile switching. Support for most industry standard security solutions is contained in this soft­ware.
Atheros Client Utility - The Atheros Client Utility soft­ware allows for multiple profile setups and supports automatic profile switching. Support for most indus­try standard security solutions is contained in this software.
FLOW OF OPERATIONS
1. Activate the WLAN Device (See Activating the WLAN Device on page 52 for more information).
2. Configure the Wireless Network parameters (See Configure Wireless Network Parameters on page 53 for more information).
Enter the network name (SSID)
Choose the appropriate WLAN architecture (Ad Hoc or Infrastructure)
Choose Authentication method: Open, Shared, WPA-Enterprise, WPA2-Enterprise, WPA­Personal, or WPA2-Personal
If using static WEP keys, enter static WEP key and choose key index.
3. Configure network settings (See Configure Net­work Parameters on page 53 for more information)
TCP/IP settings
Workgroup or Domain settings.
CONFIGURATION USING INTEL PROSET SOFTWARE
This section explains the procedure to properly configure the WLAN device using the Intel PROSet Soft­ware. Pre-defined parameters will be required for this procedure. Please consult with your network adminis­trator for these parameters:
Network Name - Also known as the SSID
Network Key (WEP) - Required if using static WEP
keys.
Authent ication Type - Open, Shared, WPA, or WPA­PSK
Procedure
1. Activate the WLAN device using either the Wireless On/Off Switch or the Intel PROSet software.
2. Click the [Start] button first and then [All Pro­grams].
3. Click the icon [Intel PROSet Wireless] to execute the Intel PROSet Wireless software.
4. Click the [Add] button. The General Settings dialog displays.
5. Enter a profile name in the Profile Name field.
6. Enter the network SSID, in the Network Name (SSID) field.
7. Click Infrastructure or Ad Hoc for the operating mode.
8. Click [Advanced].
9. The Mandatory Access Point option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Enter the MAC address for the access point. Click OK to save the setting and return to the General Settings page.
10. Click [Next].
11. If you are using Cisco CCX, click Cisco Options to enable Cisco CKIP data encryption on the Security Settings page. Check the Cisco Compatible Exten­sions Options. If you have checked the Cisco's "Mixed-Cell" box in the Advanced Setting, this option must also be checked.
12. Click [OK].
13. Click Next.
14. Select Open, Shared, WPA-Enterprise, WPA2­Enterprise, WPA-Personal, or WPA2-Personal in the Network Authentication options.
15. Select either None, WEP, CKIP (if Enable Cisco Cli­ent eXtentions is enabled, use CKIP or WEP), or TKIP for the data encryption.
16. If WEP is selected, select either 64 or 128-bit for the Encryption Level.
17. Select the key index 1, 2, 3 or 4.
18. Enter the WEP key if required. If your network does not employ a 802.1x/EAP security mechanism, please skip to step 24.
53
P7010.book Page 54 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
19. Click the Enable 802.1x checkbox to enable the
802.1x security option. Please contact your network administrator if configuration of this setting is required.
20. Select the appropriate Authentication Type. Please contact your network administrator if configura­tion of this setting is required.
21. After selecting your authentication type, enter the user name, domain, and password of the user you have created on the authentication server. The user name and password do not have to be the same as name and password of your current Windows user login.
22. Click [OK] to save the settings.
23. From the Intel ProSet Wireless page, click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list.
24. Click the Connect button to connect to the net­work.
25. Click [Close] if you want to close the Intel(R) PROSet for Wireless window.
CONFIGURATION USING ATHEROS CLIENT UTILITY SOFTWARE
This section explains the procedure to properly configure the WLAN device using the Atheros Client Utility. Pre-defined parameters will be required for this procedure. Please consult with your network adminis­trator for these parameters:
Network Name - Also known as the SSID
Network Key (WEP) - Required if using static WEP
keys.
Authent ication Type - Open, Shared, WPA, or WPA­PSK
Procedure
1. Activate the WLAN device using either the Wireless On/Off Switch or the Atheros Client Utility
2. Right-click on the “Atheros Client Utility” icon in the system tray, and select “Open Atheros Client Utility” from the menu.
3. From the Current Status page, click the Profile Management tab.
4. If this is your first time using this utility, highlight the profile [Default] and Click the [Modify] button, otherwise Click the [New] button. The General Set­tings dialog displays.
5. From the General page, enter a profile name in the Profile Name field.
6. Enter the network SSID, in the SSID1 field. If you wish to create a profile that can connect to up to 3 different wireless networks, SSID's can be entered in the SSID2 and SSID3 fields as well.
7. Click the Security tab.
8. The Security tab allows for the configuration of the Security modes listed in the table below. Please select the radio button of the desired security mode. If these settings are not known to you, please consult with your network administrator for the correct settings.
Field Name Description
WPA Enables the use of Wi-Fi Protected
Access. Choosing WPA opens the WPA EAP drop-down menu. Options include TLS and PEAP. If these settings are not known to you, please consult with your network administrator for the correct settings.
WPA-PSK Enables WPA-Pre-Shared Key. Click
on the Configure button to enter the WPA Passphrase. If these settings are not known to you, please consult with your network administrator for the correct settings.
802.1x Enables 802.1x security. If these settings are not known to you, please consult with your network administrator for the correct settings. Choosing this option opens the
802.1x EAP type drop-down menu. Options include TLS, PEAP, and LEAP
Pre-Shared Key Enables the use of pre-shared keys
that are defined on both the access point and the station. This is where static WEP keys are entered. Click the Configure button to fill in the Define Pre-Shared Keys window.
None No security
9. Click OK
10. Click the Advanced tab
11. The Advanced tab allows for the configuration of the options detailed in the table below.
54
P7010.book Page 55 Wednesday, June 1, 2005 3:39 PM
WIreless LAN User’s Guide
.
Field Name Description
Power Save Mode
Network Type Options are AP (Infrastructure) or Ad
802.11b Preamble
Transmit Power Level
Wireless Mode Specifies 5 GHz 54 Mbps, 5 GHz 108
Wireless Mode when Starting Ad Hoc Network
Options are Maximum, Normal, or Off
Hoc
Specifies the preamble setting in
802.11b. The default setting is Short and Long (Access Point mode), which allows both short and long headers in the 802.11b frames. Set to Long Only to override allowing short frames.
Options are 100%, 50%, 25%,
12.5% or Lowest transmit power (0mW)
Mbps, 2.4 GHz 11 Mbps, or 2.4 GHz 54 Mbps operation in an access point network.
Specifies 5GHz 54 Mbps, 5 GHz 108 Mbps, 2.4 GHz 11 Mbps, or 2.4 GHz 54 Mbps to start an Ad Hoc network if no matching network name is found after scanning all available modes.
12. Click OK
13. If the profile you just created does not activate immediately, click the Profile Management tab, highlight the desired Profile, and click Activate.
14. Click [Close] if you want to close the Atheros Client Utility.
CONNECTION TO THE NETWORK
This section explains connection to the network.
If there is an administrator of the network, contact the network administrator for data settings.
Setting the network
Perform the “Setting TCP/IP” and “Confirming the computer and work group names” operations required for network connection.
Setting TCP/IP
To change the setting of the IP address, you need to be logged in from Windows as an administrator.
1. Click the [Start] button first and then [Control Panel].
2. If the Control Panel is in Category view, switch to Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
3. Double-click [Network Connections]. A list of cur­rently installed networks will be displayed.
4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis­played. The [Wireless Network Connection Proper­ties] window will be displayed.
5. Click the [General] tab if it is not already selected.
6. Click [Internet Protocol (TCP/IP] and then click [Properties]. The [Internet Protocol (TCP/IP) Properties] window will be displayed.
7. Set the IP address as follows:
For ad hoc connection: Select [Use the following IP address:] and then enter data for [IP address] and [Subnet mask]. See page 62 for IP address setting.
For access point (infrastructure) connection: If your network uses DHCP, select [Obtain an IP address automatically] and [Obtain DNS server address automatically]. If your network uses static IP addresses, consult with your network adminis­trator for the correct IP address settings.
8. Click the [OK] button. Processing will return to the
[Wireless Network Connection Properties] window.
9. Click the [OK] button.
10. Close the [Network Connection] window.
Following this operation, confirm the names of the
computer and the workgroup as follows.
Confirming the computer and work group names
To modify the computer name and/or the work group name, you need to be logged in from Windows as an administrator.
1. Click the [Start] button, then [Control Panel].
2. If the Control Panel is in Category view, switch to Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
3. Double-click the [System] icon. The [System Prop­erties] window will be displayed.
4. Click the [Computer Name] tab.
55
P7010.book Page 56 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
5. Confirm the settings of [Full computer name:] and [Workgroup:].
a. The setting of [Full computer name:] denotes the
name for identifying the computer. Any name can be assigned for each personal computer.
To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen.
Enter the desired name in less than 15 ASCII character code format. Identifiability can be enhanced by entering the model number, the user name, and other factors.
b. [Workgroup name] is the group name of the
network. Enter the desired name in less than 15 ASCII character code format.
For ad hoc connection: Assign the same network name to all personal computers existing on the network.
For access point (infrastructure) connection:
Assign the name of the work group to be accessed.
3. Double-click [Network Connections]. A list of cur­rently installed networks will be displayed.
4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis­played. The [Wireless Network Connection Proper­ties] window will be displayed.
5. If [File and Printer Sharing for Microsoft Net- works] is displayed, proceed to step 6. If [File and Printer Sharing for Microsoft Networks] is not dis­played, skip to step 7.
6. Make sure that the [File and Printer Sharing for Microsoft Networks] check box is checked, and then click the [OK] button. Skip to “Setting file­sharing function”.
7. Click [Install]. The [Select Network Component Type] window will be displayed.
8. Click [Service], then click the [Add] button. The [Select Network Service] window will be displayed.
9. Click [File and Printer Sharing for Microsoft Net­works] and then click the [OK] button. Processing will return to the [Wireless Network Connection Properties] window, and [File and Printer Sharing for Microsoft Networks] will be added to the list.
6. Click the [OK] button. If a message is displayed that requests you to restart the personal computer, click [Yes] to restart the computer.
Setting the sharing function
Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid.
This operation is not required unless the sharing func­tion is to be used.
The folder and printer for which the sharing function has been set will be usable from any personal computer present on the network.
To share a file and/or the connected printer, you need to be logged in as an administrator.
Setting the Microsoft network-sharing service
1. Click the [Start] button first and then [Control
Panel].
2. If the Control Panel is in Category view, switch to
Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
10. Click the [Close] button.
Setting the file-sharing function
The procedure for setting the file-sharing function follows, with the “work” folder in drive C: as an example.
1. Click the [Start] button first and then [My Com­puter].
2. Double-click [Local disk (C:)].
3. Right-click the “work” folder (or whichever folder
you want to share), and then click [Sharing and Security...] in the menu displayed. The [Folder
Name Properties] window will be displayed.
Setting the file-sharing function for the file which has been used to execute Network Setup Wizard is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the file­sharing function easily without using Network Setup Wizard are given below.
4. Click [Sharing] if it isn’t already selected.
56
P7010.book Page 57 Wednesday, June 1, 2005 3:39 PM
WIreless LAN User’s Guide
5. Click the link stating “If you understand the secu­rity risks, but want to share files without running the wizard, click here”.
6. Click “Just enable file sharing” and click [OK].
7. Check the [Share this folder on the network] check
box.
To specify the corresponding folder as a read-only folder, select the [Read only] checkbox under the General tab.
8. Click the [OK] button. The folder will be set as a sharable folder, and the display of the icon for the “work.” folder will change.
Setting the printer-sharing function
1. Click the [Start] button first and then [Printers and FAX]. A list of connected printers will be displayed.
2. Right-click the printer for which the sharing func­tion is to be set, and then click [Sharing] in the menu displayed. The property window correspond-
ing to the selected printer will be displayed.
Setting the printer-sharing function when Network Setup Wizard has been executed is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the printer-sharing function without using Network Setup Wizard are laid down below.
3. Click the [Sharing] tab.
4. Click [Share this printer].
5. Enter the sharing printer name in [Share name].
6. Click the [OK] button.
Confirming connection
After you have finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure.
In the case of access point (infrastructure) connection, enter the necessary data for the access point before confirming connection. Refer to the manual of the access point for the access point setup procedure.
Connecting your personal computer to another personal computer
1. Click [Start] first and then [My Computer]. The [My Computer] window will be displayed in the left frame.
2. Click [My Network Places] in the “Other Places” list. The window [My Network Places] will be dis­played.
3. Click [View workgroup computers] under Network Tasks in the left frame.
4. Double-click the personal computer to which your personal computer is to be connected. The folder that was specified in “Setting the file-sharing func­tion” on page 56 will be displayed.
5. Double-click the folder to be accessed.
Confirming the status of the radio
1. Right-click the Intel PRO Wireless icon in the lower right corner of the screen.
2. Click [Open Intel PROSet for Wireless]. The Intel PROSet for Wireless window opens.
3. Contained within the General tab and the Details section (accessed by pressing the [Details] button), you will find the current operating status of the radio. (When the radio is turned off or the com­puter is not yet connected, some of the conditions will not be displayed.)
Profile Name
The current configuration profile is displayed.
Network Name (SSID)
Displays the Network Name (SSID) currently used by the radio.
IP Address
The IP address of the current profile.
Signal Quality
Displays a message stating the current quality of the signal.
Signal Strength
Displays a graphic representation of the current signal strength.
Additionally, in the lower section of the display, you will see a variety of different measurements related to the WLAN. For additional information about the items, click on the “Help?” button:
Adapter MAC Address
Band
Supported Data Rates
57
P7010.book Page 58 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
Radio Frequency
Channel Number
Network Authentication
Data Encryption
802.1x Authentication Type
802.1x Authentication Protocol
CCX Version
CCX TPC
CCX Power Levels
Access Point MAC Address
Mandatory Access Point
58
P7010.book Page 59 Wednesday, June 1, 2005 3:39 PM
WIreless LAN User’s Guide
Troubleshooting
Causes and countermeasures for troubles you may encounter while using your wireless LAN are described in the following table.
Problem Possible Cause Possible Solution
Unavailable network connection
Incorrect network name (SSID) or network key
Weak received signal strength and/or link quality
The WLAN device has been deactivated or disabled
The computer to be connected is turned off
RF interference from Access Points or other wireless networks
Ad hoc connection: verify that the network names (SSID’s) and network
keys (WEP) of all computers to be connected have been configured correctly. SSID’s and WEP key values must be identical on each machine.
Access Point (Infrastructure) connection: set the network name (SSID) and network key to the same values as those of the access point.
Set the Network Authentication value identically to that of the Access Point. Please consult your network administrator for this value, if necessary.
For the method of setting network authentication, refer to the following page:·”Assigning parameters” on page 53·
Ad hoc connection: Retry connection after shortening the distance to the destination computer or removing any obstacles for better sight.
Access Point (Infrastructure) connection: Retry connection after short­ening the distance to the access point or removing any obstacles for better sight.
To check the wave condition, refer to the following page:· “Confirming the status of the radio waves” on page 57.
Check if the wireless switch is turned ON. Also verify “Disable Radio” is not checked in “Network setting” window. Refer to “Starting Transmis­sion” on page 52.
Check if the computer to be connected is turned ON.
The use of identical or overlapping RF channels can cause interference with the operation of the WLAN device. Change the channel of your Access Point to a channel that does not overlap with the interfering device.
Wireless network authentication has failed
Incorrectly configured network settings
Incorrect IP address configuration
Re-check your Network Authentication, Encryption, and Security settings. Incorrectly configured security settings such as an incorrectly typed WEP key, a mis-configured LEAP username, or an incorrectly chosen authentication method will cause the LAN device to associate but not authenticate to the wireless network.
Recheck the configuration of your network settings.
For the method of checking, refer to the following page:·“Connection to the Network” on page 55.
This only applies to networks using static IP addresses. Please contact your network administrator for the correct settings.
59
P7010.book Page 60 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
Wireless LAN Glossary
Ad Hoc Mode
Ad Hoc Mode refers to a wireless network architecture where wireless network connectivity between multiple computers is established without a central wireless network device, typically known as Access Points. Connectivity is accomplished using only client devices in a peer-to-peer fashion. For details, refer to “Ad hoc connection” on page 50.
Channel
Range of narrow-band frequencies used by the WLAN device to transmit data. IEEE802.11b/g - 11 channels, 22 MHz wide channels.
DHCP (Dynamic Host Configuration Protocol)
A protocol that provides a means to dynamically allocate IP addresses to computers on a local area network.
DNS (Domain Name System)
A data query service that provides a mechanism with which to translate host names into Internet addresses.
IEEE802.11a
Wireless LAN standard that supports a maximum data rate of 54 Mbps. 802.11a devices operate in the 5 GHz lower and middle UNII bands.
IEEE802.11b
Wireless LAN standard that supports a maximum data rate of 11 Mbps. 802.11b devices operate in the 2.4 GHz ISM band.
Access point
Wireless network device used to bridge wireless and wired network traffic.
IP address
The logical 32-bit host address defined by the Internet Protocol that uniquely identifies a computer on a network. The IP address is usually expressed in dotted decimal notation.
LAN (Local Area Network)
A LAN or Local Area Network is a computer network (or data communications network) which is confined to a limited geographical area.
MAC address (Media Access Control Address)
A MAC address (also called an Ethernet address or IEEE MAC address) is the 48-bit address (typically written as twelve hexadecimal digits, 0 through 9 and A through F, or as six hexadecimal numbers separated by periods or colons, e.g., 0080002012ef, 0:80:0:2:20:ef) which uniquely identifies a computer that has an Ethernet interface.
MTU (Maximum Transmission Unit)
The maximum size of data which can be transmitted at one time in networks including the Internet. In an envi­ronment whose maximum size of data is too large to correctly receive data, normal communications can be restored by setting the size of MTU to a smaller value.
Network key
Data that is used for encrypting data in data communi­cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication.
Network name (SSID: Security Set Identifier)
When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with “Network name (SSID)”. In order to improve security, the network key is set allowing no communication unless “Network name (SSID)” coincides with the network key.
Open system authentication
Null authentication method specified in the 802.11 stan­dard that performs no authentication checks on a wire­less client before allowing it to associate.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet.
Protocol
A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into proce­dures.
60
P7010.book Page 61 Wednesday, June 1, 2005 3:39 PM
Shared key authentication
802.11 network authentication method in which the AP sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key authentica­tion is not considered secure, because a hacker who detects both the clear-text challenge and the same chal­lenge encrypted with a WEP key can decipher the WEP key.
SSID (Service Set Identifier)
Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because the SSID is broadcast in plain text, it does not supply any security to the network.
Subnet mask
WIreless LAN User’s Guide
TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A standard protocol of the Internet.
Wi-Fi
Wi-Fi, or Wireless Fidelity, is a set of standards for wire­less local area networks (WLAN) based on the IEEE
802.11 specifications. Certified products can use the official Wi-Fi logo, which indicates that the product is interoperable with any other product also showing that logo.
61
P7010.book Page 62 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
IP address information
IP addressing is much more complicated than can be briefly explained in this document. You are advised to consult with your network administrator for additional information.
If IP address is unknown, set IP address as follows:
If you have an access point (DHCP server) on the network, set the IP address as follows:
[Obtain an IP address automatically]
A DHCP server is a server that automatically assigns IP addresses to computers or other devices in the network. There is no DHCP server for the AdHoc network.
If the IP address is already assigned to the computer in the network, ask the network administrator to check the IP address to be set for the computer.
If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255.
Set the each computer as follows: The value in paren­theses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0)
Computer B: 192.168.100.3 (255.255.255.0)
Computer C: 192.168.100.4 (255.255.255.0)
:
:
Computer X: 192.168.100.254 (255.255.255.0)
62
P7010.book Page 63 Wednesday, June 1, 2005 3:39 PM
WIreless LAN User’s Guide
Specifications
Item Specification
Type of network The Atheros AR5002X and the Intel PRO/Wireless 2915ABG
Network Connections WLAN devices conform to IEEE 802.11a and 802.11b/g (Wi-Fi based)*.
Transfer rate (Automatic switching)
IEEE 802.11a/g: 54 Mbps maximum data rate
IEEE 802.11b: 11 Mbps maximum data rate
Active frequency 802.11b/g: 2400~2473 MHz
802.11a: 4900 ~ 5850 MHz
Number of channels 802.11a: 8 independent channels
Security Encryption Types - CKIP, WEP, TKIP, AES**
Maximum recommended number of computers to be connected over wireless LAN (during ad hoc connection)
802.11b/g: 11 channels, 3 non-overlapping channels
WPA 1.0 compliant
Encryption Keylengths Supported: 64 bits, 128 bits, and 152 bits (Atheros module using AES encryption only)
802.1x/EAP
10 units or less ***
* “Wi-Fi based” indicates that the interconnectivity test of the organization which guarantees the interconnectivity of wireless LAN (Wi-Fi Alliance) has been passed.
** Encryption with network key (WEP) is performed using the above number of bits, however, users can set 40 bits/ 104 bits after subtracting the fixed length of 24 bits.
*** Depending on practical environments, the allowable number of computers to be connected may be decreased.
63
P7010.book Page 64 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Series Notebook - Section Five
Using the Bluetooth Device
The integrated Bluetooth module is an optional device available for Fujitsu mobile computers.
WHAT IS BLUETOOTH?
Bluetooth technology is designed as a short-range wire­less link between mobile devices, such as laptop computers, phones, printers, and cameras. Bluetooth technology is used to create Personal Area Networks (PANs) between devices in short-range of each other.
WHERE TO FIND INFORMATION ABOUT BLUETOOTH
The Bluetooth module contains a robust Help user’s guide to assist you in learning about operation of the Bluetooth device.
To access the Help file, click [Start] -> All Programs, and click on Toshiba. Select Bluetooth, then select User’s Guide.
For additional information about Bluetooth Technology, visit the Bluetooth Web site at: www.bluetooth.com.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. The maximum power output is less than 20mW and meets the exemption criteria for radiation exposure limits.
The transmitters in this device must not be co-located or operated in conjunction with any other antenna or transmitter.
Canadian Notice
To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
Warranty
Users are not authorized to modify this product. Any modifications invalidate the warranty.
This equipment may not be modified, altered, or changed in any way without signed written permission from Fujitsu. Unauthorized modification will void the equipment authorization from the FCC and Industry Canada and the warranty.
64
P7010.book Page 65 Wednesday, June 1, 2005 3:39 PM
Troubleshooting
6
65
P7010.book Page 66 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Notebook – Section Six
66
P7010.book Page 67 Wednesday, June 1, 2005 3:39 PM
Troubleshooting
Your Fujitsu LifeBook notebook is sturdy and subject to few problems in the field. However, you may encounter simple setup or operating problems that you can solve on the spot, or problems with peripheral devices, that you can solve by replacing the device. The information in this section helps you isolate and resolve some of these straightforward problems and identify failures that require service.
IDENTIFYING THE PROBLEM
If you encounter a problem, go through the following procedure before pursuing complex troubleshooting:
1. Turn off your LifeBook notebook.
2. Make sure the AC adapter is plugged into your note­book and to an active AC power source.
3. Make sure that any card installed in the PC Card slot is seated properly. You can also remove the card from the slot, thus eliminating it as a possible cause of failure.
4. Make sure that any devices connected to the external connectors are plugged in properly. You can also disconnect such devices, thus eliminating them as possible causes of failure.
5. Turn on your notebook. Make sure it has been off at least 10 seconds before you turn it back on.
6. Go through the boot sequence.
7. If the problem has not been resolved, refer to the Troubleshooting Table, that follows, for more detailed troubleshooting information.
8. If you are still having problems after referring to the Troubleshooting Table, go to the Fujitsu Computer Systems Support website (http://www.computers.us .fujitsu.com/support), and search the list of Frequently Asked Questions (FAQs) contained there.
Troubleshooting
If you keep notes about what you have tried, your support representative may be able to help you more quickly by giving additional suggestions over the phone.
9. If you have tried the solutions suggested above without success, contact your support representative:
Toll free: 1-800-8Fujitsu (1-800-838-5487) Fax: 408-764-2724 E-mail: 8fujitsu@us.fujitsu.com Web site: http://www.computers.us.fujitsu.com/support
Before you place the call, you should have the following information ready so that the customer support represen­tative can provide you with the fastest possible solution:
Product name
Product configuration number
Product serial number
Purchase date
Conditions under which the problem occurred
Any error messages that have occurred
Type of device connected, if any
See the Configuration Label on the bottom of your notebook for configuration and serial numbers. (See
figure 2-7 on page 11 for location)
SPECIFIC PROBLEMS
Using the Troubleshooting Table
When you have problems with your LifeBook notebook, try to find the symptoms under the Problem column of the troubleshooting table for the feature giving you difficulty. You will find a description of common causes for that symptom under the column Possible Cause and what, if anything, you can do to correct the condition under Possible Solutions. All possible causes or solutions may not apply to your notebook.
67
P7010.book Page 68 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Notebook – Section Six
TRO U BLE SHO OTI NG TA BLE
Problem Page
Audio Problems . . . . . . . . . . . . . . . . . . . . . . . . . . page 68
Optical Drive Problems . . . . . . . . . . . . . . . . . . . . page 68
Floppy Disk Drive Problems . . . . . . . . . . . . . . . . page 69
Hard Drive Problems . . . . . . . . . . . . . . . . . . . . . . page 69
Keyboard or Mouse Problems. . . . . . . . . . . . . . . page 69
Memory Problems . . . . . . . . . . . . . . . . . . . . . . . . page 70
Modem Problems. . . . . . . . . . . . . . . . . . . . . . . . . page 70
Problem Possible Cause Possible Solutions
Audio Problems
There is no sound coming from the built-in speakers.
The software volume control is set too low.
Problem Page
USB Device Problems . . . . . . . . . . . . . . . . . . . . . page 70
PC Card Problems . . . . . . . . . . . . . . . . . . . . . . . . page 70
Power Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . page 71
Shutdown and Startup Problems . . . . . . . . . . . . page 72
Video Problems . . . . . . . . . . . . . . . . . . . . . . . . . . page 73
Miscellaneous Problems . . . . . . . . . . . . . . . . . . . page 74
Adjust the sound volume control settings in your software, operating system and applications.
DVD/CD-RW Drive Problems
LifeBook notebook fails to recognize disc in optical drive.
Headphones are plugged into your notebook.
BIOS audio settings are incorrect.
Software driver is not configured correctly.
Protective sheet is still in the optical drive tray.
The disc is not pushed down onto raised center of the drive.
Optical drive tray is not latched shut.
Incorrect DVD Player or no DVD Player software is installed.
Wrong drive designator was used for optical drive in the application.
Windows auto insertion function is disabled.
Plugging in headphones disables the built-in speakers; remove the headphones.
Set the BIOS setup utility to the default values within the Multimedia Device Configuration menu. (See
BIOS Setup Utility on page 25 for more information)
Refer to your application and operating system documentation for help.
Remove the protective sheet from the tray.
Open optical drive tray and re-install the disc properly.
Push on the front of the optical drive tray until it latches.
Install DVD Player software. (See “Using the Optical
Drive Software” on page 35 for more information.)
Verify the drive designator used by the application is the same as the one used by the operating system. When the operating system is booted from a DVD/ CD, drive designations are automatically adjusted.
Start the optical drive from the desktop or application software or re-enable the Windows auto insertion function. (See Auto Insert Notification
Function on page 36 for more information)
The Optical Drive Access indicator on the Status Indicator Panel blinks at regular intervals when no disc is in the tray or the drive is not installed.
68
DVD/CD disc is dirty or defec­tive.
The Windows auto insertion function is active and is checking to see if a disc is ready to run.
Wipe disc with non-abrasive cleaning cloth and reinsert. It if still will not work try a different disc.
This is normal. However, you may disable this feature. (See Auto Insert Notification Function on
page 36 for more information)
P7010.book Page 69 Wednesday, June 1, 2005 3:39 PM
Problem Possible Cause Possible Solutions
Floppy Disk Drive Problems
You cannot access your optional floppy disk.
You tried to write to a write protected floppy disk.
Floppy disk is not loaded correctly.
Security is set to protect access to floppy disk data.
Hard Drive Problems
You cannot access your hard drive.
The setup utility is incorrectly set for your internal (Primary Master) or optional second hard drive (Primary Slave).
The wrong drive designator was used by an application when a bootable CD-ROM was used to start the notebook.
Troubleshooting
Eject the floppy disk and set it to write enable. (See Preparing a Disk for Use on page 33 for more informa­tion)
Eject floppy disk, check orientation and re-insert.
(See Ejecting a Disk on page 33 for more information)
Verify your password and security settings.
Revise BIOS settings to set both Primary Master and Primary Slave correctly. (See BIOS Setup Utility
on page 25 for more information)
Verify drive designator used by application is in use by the operating system. When the operating system is booted from a CD, drive designations are automatically adjusted.
Keyboard or Mouse Problems
The built-in keyboard does not seem to work.
The characters that appear do not match those which you typed.
You have installed an external keyboard or mouse, and it does not seem to work.
You have connected an external keyboard or a mouse and it seems to be locking up the system.
Security is set so your operating
Verify your password and security settings. system cannot be started without a password.
The notebook has gone into
Push the Suspend/Resume/Power On button. Suspend mode.
Your application has locked out your keyboard.
Try to use your integrated pointing device to restart
your system. If this fails, turn your notebook off by
pressing the Power/Suspend/Resume button for
several seconds. After the system has been off for at
least 10 seconds, turn it back on.
NumLk is set in the BIOS. Go to the BIOS and make sure that NumLk is
disabled. (See BIOS Setup Utility on page 25 for more
information)
Your external device is not prop­erly installed.
Your operating system software is not setup with the correct soft-
Re-install your device. (See Device Ports on page 44
for more information)
Check your device and operating system docu-
mentation and activate the proper driver. ware driver for that device.
Your operating system software is not setup with the correct soft-
Check your device and operating system
documentation and activate the proper driver. ware driver for that device.
Your system has crashed. Try to restart your notebook. If this fails, turn your
notebook off by pressing the Power/Suspend/
Resume button for several seconds. After the system
has been off for at least 10 seconds, turn it back on.
69
P7010.book Page 70 Wednesday, June 1, 2005 3:39 PM
LifeBook P7000 Notebook – Section Six
Problem Possible Cause Possible Solutions
Memory Problems
Your Power On screen, or Info menu of the BIOS
Your memory upgrade module
is not properly installed. setup utility information, does not show the correct amount of installed
You have a memory failure. Check for Power On Self Test (POST) messages.
memory.
Modem Problems
Messages about modem operation.
Messages about modem opera-
tion are generated by whichever
modem application is in use.
USB Device Problems
You have installed a USB device but your LifeBook notebook does not recog­nize the device, or the device does not seem to work properly.
The device is not properly
installed.
The device may have been
installed while an application
was running, so your notebook
is not aware of its installation.
Your software may not have the
correct software driver active.
You may have the wrong I/O
address selected for your device.
Your device and another device
are assigned the same I/O
address.
PC Card Problems
Remove and re-install your memory upgrade module. (See Memory Upgrade Module on page 42
for more information)
(See Power On Self Test Messages on page 75 for more information)
See your application software documentation for additional information.
Remove and re-install the device. (See Device Ports
on page 44 for more information)
Close the application and restart your notebook.
See your software documentation and activate the correct driver.
See your device documentation and software docu­mentation to determine the required I/O address. Change the settings in the BIOS setup utility. (See
BIOS Setup Utility on page 25 for more information)
Check all I/O addresses located within the BIOS setup utility and any other installed hardware or software to make sure there are no duplications.
A card inserted in the PC Card slot doe s not wor k or is locking up the system.
70
The card is not properly
installed.
The card may have been installed
while an application was
running, so your notebook is not
aware of its installation.
Your software may not have the
correct software driver active.
You may have the wrong
I/O address selected for your PC
Card device.
Yo u r P C C ar d d ev ic e an d
another device are assigned the
same I/O address.
Remove and re-install the card. (See PC Cards on
page 37 for more information)
Close the application and restart your notebook.
See your software documentation and activate the correct driver.
See your PC Card documentation to determine the required I/O address. Change the settings in the BIOS. (See BIOS Setup Utility on page 25 for
more information)
Check all I/O addresses located within the BIOS setup utility and any other installed hardware or software to make sure there are no duplications.
Loading...
+ 42 hidden pages