Fujitsu Client Computing WB0045 Users Manual

FCC ID: EJE-WB0045 (IC: 337J-WB0045) Report No. M061025_Cert_AR5BXB6_NII_BT
EMC Technologies Report Number: M061025_Cert_AR5BXB6_NII_BT
FUJITSU NOTEBOOK USER MANUAL (part 2)
EMC Technologies Pty Ltd – 57 Assembly Drive, Tullamarine VIC 3043 Australia
www.emctech.com.au
P7120.book Page 48 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
Before Using the Wireless LAN
This manual describes the procedures required to prop­erly set up and configure the optional integrated Wire­less LAN Mini-PCI device (referred to as "WLAN”). Before using the WLAN device, read this manual care­fully to ensure it's correct operation. Keep this manual in a safe place for future reference.
Prior to using the wireless LAN device, be sure to run the Click Me! utility, as detailed in “Installing Click Me!” on page 26.
Wireless LAN Devices Covered by this Document
This document is applicable to systems containing one of the following devices. Most of the procedures are identical. Sections that differ between the devices have been noted in the text:
Intel PRO/Wireless 3945ABG
Network Connections
(WM3945ABG)
Atheros AR5006EXS Mini-Card Wireless network
card (AR5BXB6)
Characteristics of the WLAN Device
The WLAN device is a Mini-PCI card attached to the main board of the mobile computer.
The WLAN devices operate in license-free RF bands, therefore eliminating the need to procure an FCC license to operate. The WLAN devices operate in the
2.4GHz Industrial, Scientific, and Medical (ISM) RF band and in the lower and middle bands of the 5GHz Unlicensed National Information Infrastructure (UNII) bands.
The WLAN devices are capable of three operating modes, IEEE802.11a, IEEE802.11b and IEEE802.11g.
Encoding of data is modulated using Direct Sequence Spread Spectrum (DSSS) and Complementary Code Keying (CCK) when the WLAN device is operating in IEEE 802.11b mode and Orthogonal Frequency Divi­sion Multiplexing (OFDM) when operating in IEEE802.11a or IEEE802.11g mode.
The WLAN device is Wi-Fi certified and operates at the maximum data transfer rate of 54 Mbps in IEEE802.11a or IEEE802.11g mode and 11 Mbps in IEEE802.11b mode.
The maximum communication range indoors is approximately 80 feet (25 meters). However, that range will increase or decrease depending on factors such as number of walls, reflective material, or inter­ference from external RF sources.
The WLAN device supports the following encryption methods - WEP, CKIP, TKIP, and AES encryption.
WIRELESS LAN MODES USING THIS DEVICE
Ad Hoc Mode
(See Figure 5-1)
"Ad Hoc Mode" refers to a wireless network architecture where wireless network connectivity between multiple computers is established without a central wireless network device, typically known as Access Point(s). Connectivity is accomplished using only client devices in a peer-to-peer fashion. That is why Ad Hoc networks are also known as peer-to-peer networks. Ad Hoc networks are an easy and inexpensive method for establishing network connectivity between multiple computers.
Ad Hoc mode requires that the SSID, network authenti­cation, and encryption key settings are identically configured on all computers in the Ad Hoc network.
Figure 5-1. Ad Hoc Mode Network
48
P7120.book Page 49 Monday, October 10, 2005 4:38 PM
WIreless LAN User’s Guide
Access Point (Infrastructure) Mode
(See Figure 5-2)
Infrastructure mode refers to a wireless network archi­tecture in which devices communicate with wireless or wired network devices by communicating through an Access Point. In infrastructure mode, wireless devices can communicate with each other or can communicate with a wired network. Corporate wireless networks operate in infrastructure mode because they require access to the wired LAN in order to access computers, devices, and services such as file servers, printers, and databases.
How to Handle This Device
The WLAN device comes pre-installed in your mobile computer. Under normal circumstances, it should not be necessary for you to remove or re-install it. The Oper­ating System that your mobile computer comes with has been pre-configured to support the WLAN device.
WIRELESS NETWORK CONSIDERATIONS
The Intel PRO/Wireless 2915ABG and Atheros AR5002X WLAN devices support IEEE802.11a, IEEE802.11b and IEEE802.11g.
The WLAN devices operate in the 2.4GHz ISM band and the 5 GHz lower, middle, and upper UNII bands.
The maximum range of the WLAN device indoors is typically 80 feet (25 meters). Please note that the max­imum range you achieve may be shorter or longer than 80 feet, depending on factors such as access point
transmit power, number and density of obstructions, or external RF interference.
Microwave ovens will interfere with the operation of WLAN device as microwave ovens operate in the same
2.4GHz frequency range that IEEE802.11b/g devices operate in. Interference by microwaves does not occur with IEEE802.11a radio which operates in the 5 GHz RF band.
Wireless devices that transmit in the 2.4GHz fre­quency range may interfere with the operation of WLAN devices in IEEE802.11b/g modes. Symptoms of interference include reduced throughput, intermittent disconnects, and large amounts of frame errors. It is HIGHLY recommended that these interfering devices be powered off to ensure the proper operation of the WLAN device.
DEACTIVATING THE WLAN DEVICE
Deactivation of the WLAN device may be desired in certain circumstances (to extend battery life) or where certain environments require it (i.e. hospitals, clinics, airplanes, etc.). Fujitsu mobile computers employ two methods with which to deactivate the WLAN device:
Using the Wireless On/Off Switch
In Windows, using the Intel PROSet Software or
Atheros Client Utility software.
Figure 5-2. Access Point (Infrastructure) Mode Network
Internet
ADSL modem, cable modem, or similar
Wireless LAN
Wired LAN
Access Point*
*An optional hub for a wired LAN may be required depending upon the type of access point used.
49
P7120.book Page 50 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
Deactivation using the Wireless On/Off Switch
The WLAN device can be deactivated quickly and effi­ciently by toggling the Wireless On/Off Switch to the Off position. (Figure 5-3)
The Wireless On/Off switch has no effect on non-Wire­less LAN models.
Wireless LAN On/Off Switch
Figure 5-3. Wireless LAN On/Off Switch Location
Deactivation using the Intel PROSet Software
The WLAN device can also be deactivated in Windows using the Intel PROSet Software. The procedure to accomplish this:
1. Click [Start]-> [All Programs].
2. Select Intel ProSet Wireless, then click on Intel ProSet Wireless from the menu that appears. The Intel ProSet Wireless utility will be displayed.
3. At the bottom left corner of the window, select Wireless Off from the dropdown list.
Deactivation using Atheros Client Utility software
1. Right-click on Atheros Client Utility icon in the system tray. Select “Open Atheros Client Utility” from the menu.
2. Choose Action and click Disable Radio.
ACTIVATING THE WLAN DEVICE
Activation of the WLAN device can be accomplished using the same methods as the deactivation process
Using the Wireless On/Off Switch
In Windows using the Intel PROSet Software or Atheros Software
50
P7120.book Page 51 Monday, October 10, 2005 4:38 PM
Configuration of the WLAN Device
WIreless LAN User’s Guide
The WLAN Device can be configured to establish wire­less network connectivity using one of the following tools:
Intel PROSet Software - The Intel PROSet Software allows for multiple profile setup and supports auto­matic profile switching. Support for most industry standard security solutions is contained in this soft­ware.
Atheros Client Utility - The Atheros Client Utility soft­ware allows for multiple profile setups and supports automatic profile switching. Support for most indus­try standard security solutions is contained in this software.
FLOW OF OPERATIONS
1. Activate the WLAN Device (See Activating the WLAN Device on page 50 for more information).
2. Configure the Wireless Network parameters (See Configure Wireless Network Parameters on page 51 for more information).
Enter the network name (SSID)
Choose the appropriate WLAN architecture (Ad Hoc or Infrastructure)
Choose Authentication method: Open, Shared, WPA-Enterprise, WPA2-Enterprise, WPA­Personal, or WPA2-Personal
If using static WEP keys, enter static WEP key and choose key index.
3. Configure network settings (See Configure Net­work Parameters on page 51 for more information)
TCP/IP settings
Workgroup or Domain settings.
CONFIGURATION USING INTEL PROSET SOFTWARE
This section explains the procedure to properly configure the WLAN device using the Intel PROSet Soft­ware. Pre-defined parameters will be required for this procedure. Please consult with your network adminis­trator for these parameters:
Network Name - Also known as the SSID
Network Key (WEP) - Required if using static WEP
keys.
Authentication Type - Open, Shared, WPA, or WPA­PSK
Procedure
1. Activate the WLAN device using either the Wireless On/Off Switch or the Intel PROSet software.
2. Click the [Start] button first and then [All Pro­grams].
3. Click the icon [Intel PROSet Wireless] to execute the Intel PROSet Wireless software.
4. Click the [Add] button. The General Settings dialog displays.
5. Enter a profile name in the Profile Name field.
6. Enter the network SSID, in the Network Name (SSID) field.
7. Click Infrastructure or Ad Hoc for the operating mode.
8. Click [Advanced].
9. The Mandatory Access Point option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Enter the MAC address for the access point. Click OK to save the setting and return to the General Settings page.
10. Click [Next].
11. If you are using Cisco CCX, click Cisco Options to enable Cisco CKIP data encryption on the Security Settings page. Check the Cisco Compatible Exten­sions Options. If you have checked the Cisco's "Mixed-Cell" box in the Advanced Setting, this option must also be checked.
12. Click [OK].
13. Click Next.
14. Select Open, Shared, WPA-Enterprise, WPA2­Enterprise, WPA-Personal, or WPA2-Personal in the Network Authentication options.
15. Select either None, WEP, CKIP (if Enable Cisco Cli­ent eXtentions is enabled, use CKIP or WEP), or TKIP for the data encryption.
16. If WEP is selected, select either 64 or 128-bit for the Encryption Level.
17. Select the key index 1, 2, 3 or 4.
18. Enter the WEP key if required. If your network does not employ a 802.1x/EAP security mechanism, please skip to step 24.
51
P7120.book Page 52 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
19. Click the Enable 802.1x checkbox to enable the
802.1x security option. Please contact your network administrator if configuration of this setting is required.
20. Select the appropriate Authentication Type. Please contact your network administrator if configura­tion of this setting is required.
21. After selecting your authentication type, enter the user name, domain, and password of the user you have created on the authentication server. The user name and password do not have to be the same as name and password of your current Windows user login.
22. Click [OK] to save the settings.
23. From the Intel ProSet Wireless page, click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of the new profile in the priority list.
24. Click the Connect button to connect to the net­work.
25. Click [Close] if you want to close the Intel(R) PROSet for Wireless window.
CONFIGURATION USING ATHEROS CLIENT UTILITY SOFTWARE
This section explains the procedure to properly configure the WLAN device using the Atheros Client Utility. Pre-defined parameters will be required for this procedure. Please consult with your network adminis­trator for these parameters:
Network Name - Also known as the SSID
Network Key (WEP) - Required if using static WEP
keys.
Authentication Type - Open, Shared, WPA, or WPA­PSK
Procedure
1. Activate the WLAN device using either the Wireless On/Off Switch or the Atheros Client Utility
2. Right-click on the “Atheros Client Utility” icon in the system tray, and select “Open Atheros Client Utility” from the menu.
3. From the Current Status page, click the Profile Management tab.
4. If this is your first time using this utility, highlight the profile [Default] and Click the [Modify] button, otherwise Click the [New] button. The General Set­tings dialog displays.
5. From the General page, enter a profile name in the Profile Name field.
6. Enter the network SSID, in the SSID1 field. If you wish to create a profile that can connect to up to 3 different wireless networks, SSID's can be entered in the SSID2 and SSID3 fields as well.
7. Click the Security tab.
8. The Security tab allows for the configuration of the Security modes listed in the table below. Please select the radio button of the desired security mode. If these settings are not known to you, please consult with your network administrator for the correct settings.
Field Name Description
WPA Enables the use of Wi-Fi Protected
Access. Choosing WPA opens the WPA EAP drop-down menu. Options include TLS and PEAP. If these settings are not known to you, please consult with your network administrator for the correct settings.
WPA-PSK Enables WPA-Pre-Shared Key. Click
on the Configure button to enter the WPA Passphrase. If these settings are not known to you, please consult with your network administrator for the correct settings.
802.1x Enables 802.1x security. If these settings are not known to you, please consult with your network administrator for the correct settings. Choosing this option opens the
802.1x EAP type drop-down menu. Options include TLS, PEAP, and LEAP
Pre-Shared Key Enables the use of pre-shared keys
that are defined on both the access point and the station. This is where static WEP keys are entered. Click the Configure button to fill in the Define Pre-Shared Keys window.
None No security
9. Click OK
10. Click the Advanced tab
11. The Advanced tab allows for the configuration of the options detailed in the table below.
52
P7120.book Page 53 Monday, October 10, 2005 4:38 PM
WIreless LAN User’s Guide
.
Field Name Description
Power Save Mode
Network Type Options are AP (Infrastructure) or Ad
802.11b Preamble
Transmit Power Level
Wireless Mode Specifies 5 GHz 54 Mbps, 5 GHz 108
Wireless Mode when Starting Ad Hoc Network
Options are Maximum, Normal, or Off
Hoc
Specifies the preamble setting in
802.11b. The default setting is Short and Long (Access Point mode), which allows both short and long headers in the 802.11b frames. Set to Long Only to override allowing short frames.
Options are 100 mW, 63 mW, 50 mW, and 40 mW.
Mbps, 2.4 GHz 11 Mbps, or 2.4 GHz 54 Mbps operation in an access point network.
Specifies 5GHz 54 Mbps, 5 GHz 108 Mbps, 2.4 GHz 11 Mbps, or 2.4 GHz 54 Mbps to start an Ad Hoc network if no matching network name is found after scanning all available modes.
12. Click OK
13. If the profile you just created does not activate immediately, click the Profile Management tab, highlight the desired Profile, and click Activate.
14. Click [Close] if you want to close the Atheros Client Utility.
CONNECTION TO THE NETWORK
This section explains connection to the network.
2. If the Control Panel is in Category view, switch to Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
3. Double-click [Network Connections]. A list of cur­rently installed networks will be displayed.
4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis­played. The [Wireless Network Connection Proper­ties] window will be displayed.
5. Click the [General] tab if it is not already selected.
6. Click [Internet Protocol (TCP/IP] and then click [Properties]. The [Internet Protocol (TCP/IP) Properties] window will be displayed.
7. Set the IP address as follows:
For ad hoc connection: Select [Use the following IP address:] and then enter data for [IP address] and [Subnet mask]. See page 60 for IP address setting.
For access point (infrastructure) connection: If your network uses DHCP, select [Obtain an IP address automatically] and [Obtain DNS server address automatically]. If your network uses static IP addresses, consult with your network adminis­trator for the correct IP address settings.
8. Click the [OK] button. Processing will return to the
[Wireless Network Connection Properties] window.
9. Click the [OK] button.
10. Close the [Network Connection] window.
Following this operation, confirm the names of the
computer and the workgroup as follows.
If there is an administrator of the network, contact the network administrator for data settings.
Setting the network
Perform the “Setting TCP/IP” and “Confirming the computer and work group names” operations required for network connection.
Setting TCP/IP
To change the setting of the IP address, you need to be logged in from Windows as an administrator.
1. Click the [Start] button first and then [Control Panel].
Confirming the computer and work group names
To modify the computer name and/or the work group name, you need to be logged in from Windows as an administrator.
1. Click the [Start] button, then [Control Panel].
2. If the Control Panel is in Category view, switch to Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
3. Double-click the [System] icon. The [System Prop­erties] window will be displayed.
4. Click the [Computer Name] tab.
53
P7120.book Page 54 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
5. Confirm the settings of [Full computer name:] and [Workgroup:].
a. The setting of [Full computer name:] denotes the
name for identifying the computer. Any name can be assigned for each personal computer.
To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen.
Enter the desired name in less than 15 ASCII character code format. Identifiability can be enhanced by entering the model number, the user name, and other factors.
b. [Workgroup name] is the group name of the
network. Enter the desired name in less than 15 ASCII character code format.
For ad hoc connection: Assign the same network name to all personal computers existing on the network.
For access point (infrastructure) connection:
Assign the name of the work group to be accessed.
3. Double-click [Network Connections]. A list of cur­rently installed networks will be displayed.
4. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu dis­played. The [Wireless Network Connection Proper­ties] window will be displayed.
5. If [File and Printer Sharing for Microsoft Net- works] is displayed, proceed to step 6. If [File and Printer Sharing for Microsoft Networks] is not dis­played, skip to step 7.
6. Make sure that the [File and Printer Sharing for Microsoft Networks] check box is checked, and then click the [OK] button. Skip to “Setting file­sharing function”.
7. Click [Install]. The [Select Network Component Type] window will be displayed.
8. Click [Service], then click the [Add] button. The [Select Network Service] window will be displayed.
9. Click [File and Printer Sharing for Microsoft Net­works] and then click the [OK] button. Processing will return to the [Wireless Network Connection Properties] window, and [File and Printer Sharing for Microsoft Networks] will be added to the list.
6. Click the [OK] button. If a message is displayed that requests you to restart the personal computer, click [Yes] to restart the computer.
Setting the sharing function
Set the sharing function to make file and/or printer sharing with other network-connected personal computers valid.
This operation is not required unless the sharing func­tion is to be used.
The folder and printer for which the sharing function has been set will be usable from any personal computer present on the network.
To share a file and/or the connected printer, you need to be logged in as an administrator.
Setting the Microsoft network-sharing service
1. Click the [Start] button first and then [Control Panel].
2. If the Control Panel is in Category view, switch to Classic view by clicking “Switch to Classic View” under Control Panel the left frame. (If you are already in Classic view, “Switch to Category View” will be displayed.)
10. Click the [Close] button.
Setting the file-sharing function
The procedure for setting the file-sharing function follows, with the “work” folder in drive C: as an example.
1. Click the [Start] button first and then [My Com­puter].
2. Double-click [Local disk (C:)].
3. Right-click the “work” folder (or whichever folder
you want to share), and then click [Sharing and Security...] in the menu displayed. The [Folder
Name Properties] window will be displayed.
Setting the file-sharing function for the file which has been used to execute Network Setup Wizard is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the file­sharing function easily without using Network Setup Wizard are given below.
4. Click [Sharing] if it isn’t already selected.
54
P7120.book Page 55 Monday, October 10, 2005 4:38 PM
WIreless LAN User’s Guide
5. Click the link stating “If you understand the secu­rity risks, but want to share files without running the wizard, click here”.
6. Click “Just enable file sharing” and click [OK].
7. Check the [Share this folder on the network] check
box.
To specify the corresponding folder as a read-only folder, select the [Read only] checkbox under the General tab.
8. Click the [OK] button. The folder will be set as a sharable folder, and the display of the icon for the “work.” folder will change.
Setting the printer-sharing function
1. Click the [Start] button first and then [Printers and FAX]. A list of connected printers will be displayed.
2. Right-click the printer for which the sharing func­tion is to be set, and then click [Sharing] in the menu displayed. The property window correspond-
ing to the selected printer will be displayed.
Setting the printer-sharing function when Network Setup Wizard has been executed is suggested on the screen. For the wireless LAN, however, since security is guaranteed by entry of the network name (SSID) and the network key, the steps to be taken to set the printer-sharing function without using Network Setup Wizard are laid down below.
3. Click the [Sharing] tab.
4. Click [Share this printer].
5. Enter the sharing printer name in [Share name].
6. Click the [OK] button.
Confirming connection
After you have finished the network setup operations, access the folder whose sharing has been set for other personal computers. Also, confirm the status of the radio waves in case of trouble such as a network connection failure.
In the case of access point (infrastructure) connection, enter the necessary data for the access point before confirming connection. Refer to the manual of the access point for the access point setup procedure.
Connecting your personal computer to another personal computer
1. Click [Start] first and then [My Computer]. The [My Computer] window will be displayed in the left frame.
2. Click [My Network Places] in the “Other Places” list. The window [My Network Places] will be dis­played.
3. Click [View workgroup computers] under Network Tasks in the left frame.
4. Double-click the personal computer to which your personal computer is to be connected. The folder that was specified in “Setting the file-sharing func­tion” on page 54 will be displayed.
5. Double-click the folder to be accessed.
Confirming the status of the radio
1. Right-click the Intel PRO Wireless icon in the lower right corner of the screen.
2. Click [Open Intel PROSet for Wireless]. The Intel PROSet for Wireless window opens.
3. Contained within the General tab and the Details section (accessed by pressing the [Details] button), you will find the current operating status of the radio. (When the radio is turned off or the com­puter is not yet connected, some of the conditions will not be displayed.)
Profile Name
The current configuration profile is displayed.
Network Name (SSID)
Displays the Network Name (SSID) currently used by the radio.
IP Address
The IP address of the current profile.
Signal Quality
Displays a message stating the current quality of the signal.
Signal Strength
Displays a graphic representation of the current signal strength.
Additionally, in the lower section of the display, you will see a variety of different measurements related to the WLAN. For additional information about the items, click on the “Help?” button:
Adapter MAC Address
Band
Supported Data Rates
55
P7120.book Page 56 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
Radio Frequency
Channel Number
Network Authentication
Data Encryption
802.1x Authentication Type
802.1x Authentication Protocol
CCX Version
CCX TPC
CCX Power Levels
Access Point MAC Address
Mandatory Access Point
56
P7120.book Page 57 Monday, October 10, 2005 4:38 PM
WIreless LAN User’s Guide
Troubleshooting
Causes and countermeasures for troubles you may encounter while using your wireless LAN are described in the following table.
Problem Possible Cause Possible Solution
Unavailable network connection
Incorrect network name (SSID) or network key
Weak received signal strength and/or link quality
The WLAN device has been deactivated or disabled
The computer to be connected is turned off
RF interference from Access Points or other wireless networks
Ad hoc connection: verify that the network names (SSID’s) and network
keys (WEP) of all computers to be connected have been configured correctly. SSID’s and WEP key values must be identical on each machine.
Access Point (Infrastructure) connection: set the network name (SSID) and network key to the same values as those of the access point.
Set the Network Authentication value identically to that of the Access Point. Please consult your network administrator for this value, if necessary.
For the method of setting network authentication, refer to the following page:·”Assigning parameters” on page 51·
Ad hoc connection: Retry connection after shortening the distance to the destination computer or removing any obstacles for better sight.
Access Point (Infrastructure) connection: Retry connection after short­ening the distance to the access point or removing any obstacles for better sight.
To check the wave condition, refer to the following page:· “Confirming the status of the radio waves” on page 55.
Check if the wireless switch is turned ON. Also verify “Disable Radio” is not checked in “Network setting” window. Refer to “Starting Transmis­sion” on page 50.
Check if the computer to be connected is turned ON.
The use of identical or overlapping RF channels can cause interference with the operation of the WLAN device. Change the channel of your Access Point to a channel that does not overlap with the interfering device.
Wireless network authentication has failed
Incorrectly configured network settings
Incorrect IP address configuration
Re-check your Network Authentication, Encryption, and Security settings. Incorrectly configured security settings such as an incorrectly typed WEP key, a mis-configured LEAP username, or an incorrectly chosen authentication method will cause the LAN device to associate but not authenticate to the wireless network.
Recheck the configuration of your network settings.
For the method of checking, refer to the following page:·“Connection to the Network” on page 53.
This only applies to networks using static IP addresses. Please contact your network administrator for the correct settings.
57
P7120.book Page 58 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
Wireless LAN Glossary
Ad Hoc Mode
Ad Hoc Mode refers to a wireless network architecture where wireless network connectivity between multiple computers is established without a central wireless network device, typically known as Access Points. Connectivity is accomplished using only client devices in a peer-to-peer fashion. For details, refer to “Ad hoc connection” on page 48.
Channel
Range of narrow-band frequencies used by the WLAN device to transmit data. IEEE802.11b/g - 11 channels, 22 MHz wide channels.
DHCP (Dynamic Host Configuration Protocol)
A protocol that provides a means to dynamically allocate IP addresses to computers on a local area network.
DNS (Domain Name System)
A data query service that provides a mechanism with which to translate host names into Internet addresses.
IEEE802.11a
Wireless LAN standard that supports a maximum data rate of 54 Mbps. 802.11a devices operate in the 5 GHz lower and middle UNII bands.
IEEE802.11b
Wireless LAN standard that supports a maximum data rate of 11 Mbps. 802.11b devices operate in the 2.4 GHz ISM band.
Access point
Wireless network device used to bridge wireless and wired network traffic.
IP address
The logical 32-bit host address defined by the Internet Protocol that uniquely identifies a computer on a network. The IP address is usually expressed in dotted decimal notation.
LAN (Local Area Network)
A LAN or Local Area Network is a computer network (or data communications network) which is confined to a limited geographical area.
MAC address (Media Access Control Address)
A MAC address (also called an Ethernet address or IEEE MAC address) is the 48-bit address (typically written as twelve hexadecimal digits, 0 through 9 and A through F, or as six hexadecimal numbers separated by periods or colons, e.g., 0080002012ef, 0:80:0:2:20:ef) which uniquely identifies a computer that has an Ethernet interface.
MTU (Maximum Transmission Unit)
The maximum size of data which can be transmitted at one time in networks including the Internet. In an envi­ronment whose maximum size of data is too large to correctly receive data, normal communications can be restored by setting the size of MTU to a smaller value.
Network key
Data that is used for encrypting data in data communi­cation. The personal computer uses the same network key both for data encryption and decryption, therefore, it is necessary to set the same network key as the other side of communication.
Network name (SSID: Security Set Identifier)
When a wireless LAN network is configured, grouping is performed to avoid interference or data theft. This grouping is performed with “Network name (SSID)”. In order to improve security, the network key is set allowing no communication unless “Network name (SSID)” coincides with the network key.
Open system authentication
Null authentication method specified in the 802.11 stan­dard that performs no authentication checks on a wire­less client before allowing it to associate.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol adopted in telephone line connection (PPP) to be used over an Ethernet.
Protocol
A procedure or rule of delivering data among computers. Ordered data communication is allowed by making all conditions required for communication including the method of data transmission/reception and actions upon communication errors into proce­dures.
58
P7120.book Page 59 Monday, October 10, 2005 4:38 PM
Shared key authentication
802.11 network authentication method in which the AP sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key authentica­tion is not considered secure, because a hacker who detects both the clear-text challenge and the same chal­lenge encrypted with a WEP key can decipher the WEP key.
SSID (Service Set Identifier)
Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because the SSID is broadcast in plain text, it does not supply any security to the network.
Subnet mask
WIreless LAN User’s Guide
TCP-IP network is controlled by being divided into multiple smaller networks (subnets). IP address consists of the subnet address and the address of each computer. Subnet mask defines how many bits of IP address comprise the subnet address. The same value shall be set among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A standard protocol of the Internet.
Wi-Fi
Wi-Fi, or Wireless Fidelity, is a set of standards for wire­less local area networks (WLAN) based on the IEEE
802.11 specifications. Certified products can use the official Wi-Fi logo, which indicates that the product is interoperable with any other product also showing that logo.
59
P7120.book Page 60 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
IP address information
IP addressing is much more complicated than can be briefly explained in this document. You are advised to consult with your network administrator for additional information.
If IP address is unknown, set IP address as follows:
If you have an access point (DHCP server) on the network, set the IP address as follows:
[Obtain an IP address automatically]
A DHCP server is a server that automatically assigns IP addresses to computers or other devices in the network. There is no DHCP server for the AdHoc network.
If the IP address is already assigned to the computer in the network, ask the network administrator to check the IP address to be set for the computer.
If no access point is found in the network:
An IP address is expressed with four values in the range between 1 and 255.
Set the each computer as follows: The value in paren­theses is a subnet mask.
<Example>
Computer A: 192.168.100.2 (255.255.255.0)
Computer B: 192.168.100.3 (255.255.255.0)
Computer C: 192.168.100.4 (255.255.255.0)
:
:
Computer X: 192.168.100.254 (255.255.255.0)
60
P7120.book Page 61 Monday, October 10, 2005 4:38 PM
WIreless LAN User’s Guide
Specifications
Item Specification
Type of network The Atheros AR5002X and the Intel PRO/Wireless 2915ABG
Network Connections WLAN devices conform to IEEE 802.11a and 802.11b/g (Wi-Fi based)*.
Transfer rate (Automatic switching)
IEEE 802.11a/g: 54 Mbps maximum data rate
IEEE 802.11b: 11 Mbps maximum data rate
Active frequency 802.11b/g: 2400~2473 MHz
802.11a: 4900 ~ 5850 MHz
Number of channels 802.11a: 8 independent channels
Security Encryption Types - CKIP, WEP, TKIP, AES**
Maximum recommended number of computers to be connected over wireless LAN (during ad hoc connection)
802.11b/g: 11 channels, 3 non-overlapping channels
WPA 1.0 compliant
Encryption Key lengths Supported: 64 bits, 128 bits, and 152 bits (Atheros module using AES encryption only)
802.1x/EAP
10 units or less ***
* “Wi-Fi based” indicates that the interconnectivity test of the organization which guarantees the interconnectivity of wireless LAN (Wi-Fi Alliance) has been passed.
** Encryption with network key (WEP) is performed using the above number of bits, however, users can set 40 bits/ 104 bits after subtracting the fixed length of 24 bits.
*** Depending on practical environments, the allowable number of computers to be connected may be decreased.
61
P7120.book Page 62 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Series Notebook - Section Five
Using the Bluetooth Device
The Integrated Bluetooth module (EYTF3CSFT) is an optional device available for Fujitsu mobile computers.
WHAT IS BLUETOOTH
Bluetooth technology is designed as a short-range wire­less link between mobile devices, such as laptop computers, phones, printers, and cameras. Bluetooth technology is used to create Personal Area Networks (PANs) between devices in short-range of each other.
The Wireless LAN/Bluetooth On/Off Switch will power off both the optional wireless LAN and Bluetooth devices at the same time. To enable or disable either one of the devices individually, perform the following steps:
1. Slide the Wireless LAN/Bluetooth on/ off switch to On position.
2. In the Control Panel, double-click the Fujitsu Radio Control icon.
3. In the window that appears, click the button associated with Bluetooth and/ or Wireless LAN Status to enable or dis­able the individual devices.
4. Click [OK].
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
The transmitters in this device must not be co-located or operated in conjunction with any other antenna or transmitter.
Canadian Notice
To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
Warranty
Users are not authorized to modify this product. Any modifications invalidate the warranty.
This equipment may not be modified, altered, or changed in any way without signed written permission from Fujitsu. Unauthorized modification will void the equipment authorization from the FCC and Industry Canada and the warranty.
WHERE TO FIND INFORMATION ABOUT BLUETOOTH
The Bluetooth module contains a robust Help user’s guide to assist you in learning about operation of the Bluetooth device.
To access the Help file, click [Start] -> All Programs, and click on Toshiba. Select Bluetooth, then select User’s Guide.
For additional information about Bluetooth Technology, visit the Bluetooth Web site at: www.bluetooth.com.
62
P7120.book Page 63 Monday, October 10, 2005 4:38 PM
Troubleshooting
6
63
P7120.book Page 64 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Notebook – Section Six
64
P7120.book Page 65 Monday, October 10, 2005 4:38 PM
Troubleshooting
Your Fujitsu LifeBook notebook is sturdy and subject to few problems in the field. However, you may encounter simple setup or operating problems that you can solve on the spot, or problems with peripheral devices, that you can solve by replacing the device. The information in this section helps you isolate and resolve some of these straightforward problems and identify failures that require service.
IDENTIFYING THE PROBLEM
If you encounter a problem, go through the following procedure before pursuing complex troubleshooting:
1. Turn off your LifeBook notebook.
2. Make sure the AC adapter is plugged into your note­book and to an active AC power source.
3. Make sure that any card inserted in the PC Card slot is seated properly. You can also remove the card from the slot, thus eliminating it as a possible cause of failure.
4. Make sure that any devices connected to the external connectors are plugged in properly. You can also disconnect such devices, thus eliminating them as possible causes of failure.
5. Turn on your notebook. Make sure it has been off at least 10 seconds before you turn it back on.
6. Go through the boot sequence.
7. If the problem has not been resolved, refer to the Troubleshooting Table, that follows, for more detailed troubleshooting information.
8. If you are still having problems after referring to the Troubleshooting Table, go to the Fujitsu Computer Systems Support website (http://www.computers.us .fujitsu.com/support), and search the list of Frequently Asked Questions (FAQs) contained there.
Troubleshooting
If you keep notes about what you have tried, your support representative may be able to help you more quickly by giving additional suggestions over the phone.
9. If you have tried the solutions suggested above without success, contact your support representative:
Toll free: 1-800-8Fujitsu (1-800-838-5487) Fax: 408-764-2724 E-mail: 8fujitsu@us.fujitsu.com Web site: http://www.computers.us.fujitsu.com/support
Before you place the call, you should have the following information ready so that the customer support represen­tative can provide you with the fastest possible solution:
Product name
Product configuration number
Product serial number
Purchase date
Conditions under which the problem occurred
Any error messages that have occurred
Type of device connected, if any
See the Configuration Label on the bottom of your notebook for configuration and serial numbers.
SPECIFIC PROBLEMS
Using the Troubleshooting Table
When you have problems with your LifeBook notebook, try to find the symptoms under the Problem column of the troubleshooting table for the feature giving you difficulty. You will find a description of common causes for that symptom under the column Possible Cause and what, if anything, you can do to correct the condition under Possible Solutions. All possible causes or solutions may not apply to your notebook.
65
P7120.book Page 66 Monday, October 10, 2005 4:38 PM
LifeBook P7000 Notebook – Section Six
TROU B LES H O OTI N G TAB L E
Problem Page
Audio Problems . . . . . . . . . . . . . . . . . . . . . . . . . . page 66
Optical Drive Problems . . . . . . . . . . . . . . . . . . . . page 66
Floppy Disk Drive Problems . . . . . . . . . . . . . . . . page 67
Hard Drive Problems . . . . . . . . . . . . . . . . . . . . . . page 67
Keyboard or Mouse Problems. . . . . . . . . . . . . . . page 67
Memory Problems . . . . . . . . . . . . . . . . . . . . . . . . page 68
Modem Problems. . . . . . . . . . . . . . . . . . . . . . . . . page 68
Problem Possible Cause Possible Solutions
Audio Problems
There is no sound coming from the built-in speakers.
The software volume control is set too low.
Headphones are plugged into your notebook.
BIOS audio settings are incorrect.
Software driver is not config­ured correctly.
Problem Page
USB Device Problems . . . . . . . . . . . . . . . . . . . . . page 68
PC Card Problems . . . . . . . . . . . . . . . . . . . . . . . . page 68
Power Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . page 69
Shutdown and Startup Problems . . . . . . . . . . . . page 70
Video Problems . . . . . . . . . . . . . . . . . . . . . . . . . . page 71
Miscellaneous Problems . . . . . . . . . . . . . . . . . . . page 72
Adjust the sound volume control settings in your software, operating system and applications. You can also use the [Fn+F9] key combination. Pressing [F9] repeatedly while holding [Fn] will increase the notebook volume.
Plugging in headphones disables the built-in speakers; remove the headphones.
Set the BIOS setup utility to the default values within the Multimedia Device Configuration menu. (See BIOS Setup
Utility on page 25 for more information)
Refer to your application and operating system documen­tation for help.
Sound may be set to Mute. Click on the Volume icon in the system tray and verify that
Device Manager may not be set correctly.
DVD/CD-RW Drive Problems
LifeBook notebook fails to recognize disc in optical drive.
Protective sheet is still in the optical drive tray.
The disc is not pushed down onto the center of the drive.
Optical drive tray is not latched shut.
Incorrect DVD Player or no player software is installed.
Wrong drive designator was used for optical drive in the application.
the Mute checkbox is not set. You can also use the [Fn+F3] key combination. Pressing [F3] while holding [Fn] will toggle the audio Mute on and off.
Go to the Control Panel -> System, and click on the Hard­ware tab. Click the [Device Manager] button and scroll down to “Sound, Video and Game Controllers”. Click the “+” symbol and scroll down the list that appears to see if there is a yellow exclamation point next to any of the items. If there is, you will need to reload the related driver.
Remove the protective sheet from the tray.
Open optical drive tray and re-install the disc properly.
Push on the front of the optical drive tray until it latches.
Install DVD Player software. (See “Using the Optical Drive
Software” on page 35 for more information.)
Verify the drive designator used by the application is the same as the one used by the operating system. When the operating system is booted from a DVD/CD, drive designa­tions are automatically adjusted.
DVD/CD disc is dirty or defective.
66
Wipe disc with non-abrasive cleaning cloth and reinsert. If it still will not work try a different disc.
Loading...
+ 46 hidden pages