Wistron NeWeb BT510 Users Manual

Bluetooth USB Adapter User’s Guide
BT-510
Copyright Statement
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise without the prior writing of the publisher. Windows
95/98SE/ME/2000/XP are trademarks of Microsoft® Corp. Pentium is trademark of Intel. Bluetooth and the Bluetooth logos are trademarks of Bluetooth SIG, Inc., U.S.A. All copyright reserved.
1
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: To assure continued compliance, (example - use only shielded interface cables when connecting to computer or peripheral devices) any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies wi th Par t 15 of the FCC Rules. Operati o n i s su bj ect t o the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. End-users must follow the specific oper ating i nstructi ons for satis fying RF exposure compliance.
This transmitter must not be co-located or operating in conjunction with any other antenna o r transmitter.
2
Table of Contents
TABLE OF CONTENTS.............................................................................................................. 3
1. INTRODUCTION..................................................................................................................... 5
BOUT BLUETOOTH DONGLE
1.1 A
IT CONTENTS
1.2 K
CONS USED
1.3 I
....................................................................................................................... 5
........................................................................................................................... 5
2. STEP-BY-STEP INSTALLATION GUIDE...........................................................................7
NSTALLATION
2.1 I
NINSTALLATION
2.2 U
........................................................................................................................ 7
................................................................................................................. 12
3. BASIC OPERATIONS...........................................................................................................13
INDING BLUETOOTH DEVICES
3.1 F
INDING A SERVICE
3.2 F
ONNECTION’S STATUS
3.3 C
.............................................................................................................. 14
................................................................................................ 5
............................................................................................ 13
........................................................................................................ 15
EW CONNECTION
3.4 N
LUETOOTH TRAY
3.5 B
AIRING DEVICES
3.6 P
REAKING A PAIRED DEVICE RELATIONSHIP
3.7 B
ETTING SECURITY FOR LOCAL SERVICES
3.8 S
ONNECTING TO A SECURED SERVICE
3.9 C
3.10 S
HARING SECURED LOCAL SERVICES
............................................................................................................... 16
............................................................................................................... 19
................................................................................................................ 20
....................................................................... 23
........................................................................... 24
.................................................................................. 26
................................................................................. 29
4. CLIENT APPLICATIONS .................................................................................................... 31
ETWORK ACCESS
4.1 N
............................................................................................................... 31
4.1.1 Network Access Server-side Setup (for Windows 2000).............................................. 31
4.1.2 Configuring the server................................................................................................. 31
LUETOOTH SERIAL PORT
4.2 B
IAL-UP NETWORKING
4.3 D
.................................................................................................... 31
........................................................................................................ 32
4.4 FAX...................................................................................................................................... 33
ILE TRANSFER
4.5 F
.................................................................................................................... 33
4.5.1 File Transfer Operations ............................................................................................. 34
NFORMATION EXCHANGE
4.6 I
NFORMATION SYNCHRONIZATION
4.7 I
.................................................................................................... 34
....................................................................................... 35
5. LOCAL SERVICES...............................................................................................................36
6. CONFIGURATION PANEL.................................................................................................. 37
3
CCESSIBILITY TAB
6.1 A
............................................................................................................. 37
6.1.1 Adding and Deleting Devices....................................................................................... 38
ISCOVERY TAB
6.2 D
ENERAL TAB
6.3 G
ARDWARE TAB
6.4 H
NFORMATION EXCHANGE TAB
6.5 I
OCAL SER VICES TAB
6.6 L
OTIFICATIONS TAB
6.7 N
ERSION INFO TAB
6.8 V
.................................................................................................................. 39
...................................................................................................................... 41
.................................................................................................................. 42
............................................................................................ 44
.......................................................................................................... 45
............................................................................................................. 47
.............................................................................................................. 48
7. SECURITY.............................................................................................................................. 49
UTHENTICATION
7.1 A
UTHORIZATION
7.2 A
NCRYPTION
7.3 E
EVELS OF SECURITY
7.4 L
INK KEY
7.5 L
AIRING DEVICES
7.6 P
............................................................................................................................. 50
................................................................................................................ 49
.................................................................................................................. 49
........................................................................................................................ 49
........................................................................................................... 50
................................................................................................................ 50
ASSKEY
7.7 P
ECURITY REQUEST DIALOG BOX
7.8 S
UTHORIZATION REQUEST DIALOG BOX
7.9 A
.............................................................................................................................. 50
....................................................................................... 50
DVANCED BUTTON
, A
........................................... 51
8. BLUEMUX.............................................................................................................................. 52
9. CONNECTION WITH MOBILE PHONE T68.................................................................. 55
10. SPECIFICATIONS............................................................................................................... 57
4
1. Introduction
1.1 About Bluetooth Dongle
Thank you for purchasing Bluetooth USB Adapter, Bluetooth Dongle. With the features of small, lightweight and easy plug-and play, Bluetooth USB Adapter enables the integration of Bluetooth technology into your personal computers.
Features:
! Bluetooth 1.1 Spec. Compliant ! Data Speed of up to 1Mbps ! Range of up to 10 meters ! Multiple functions such as Dial-up networking, File transfer, LAN Access… ! 2.4 GHz FHSS technology ! Easy to expand the network ! Small size and easy installation ! Extensive security: Authorization / Authentication / Encryption. ! Supports Windows 95/98SE, ME, 2000, and XP
As a Bluetooth Client, Bluetooth USB Adapter provides:
! To locate other Bluetooth-enabled devices in the vicinity ! To discover the services of those devices ! Connect to, use, and disconnect from those services.
As a Bluetooth Server, Bluetooth USB Adapter provides:
! To include or exclude individual services in the list of services provided to clients.
1.2 Kit Contents
! Bluetooth USB Adapter ! Installation Software CDROM
1.3 Icons Used
By changing color, Bluetooth icons help you to distinguish a device or service’s status.
Device icons
Icons with blue-color indicates “normal” state. Icons with green-color indicates “Connected” state. Icons with a check mark indicate that devices are paired with this computer.
5
Service icons
Icons with gray or yellow-color indicates “normal” state. Icons with green-color indicates “Connected” state.
Icons with a red “X” indicate “not available”.
6
2. Step-by-Step Installation Guide
This chapter shows you in details of installing and uninstalling Bluetooth USB Adapter.
2.1 Installation
Before installation, make sure the previous version of Bluetooth USB Adapter software has been uninstalled. See Chapter 2.2 Uninstallation.
1. Insert the installation software CDROM into the CDROM drive on the computer. The
auto-run option starts. You may manually start the setup process: click Start>Run>setup.exe. When the Welcome screen displays, click “Next”.
2. Read the License Agreement and tick “I accept the terms in the license agreement”.
Click “Next”.
7
3. Enter a name for your computer, and select a device type. Click “Next”.
4. Click “Next” to install to this folder, or click “Change” to install to a different folder.
8
5. Click “Install” to begin installation.
6. Installing…
9
7. Installation completed. Click “Finish” to exit the InstallShield Wizard.
8. Click “Yes” to restart your computer.
10
Additional Notes for Windows XP:
! For the first time inserting the BT510, the system will ask you to install the driver again.
Click “Next” and then “Finish”.
! If your laptop notebook has 2 USB ports, you have to install the driver again for the first
time inserting BT510 into either port. Click “Next” and then “Finish”.
11
2.2 Uninstallation
Two ways of uninstallation:
1. When installing an upgraded version, the InstallShield Wizard automatically uninstalls
the previous version.
2. Manually uninstall the software: a. Close any open applications. b. From the Windows taskbar, click Start>Settings>Control Panel. c. Double click “Add/Remove Programs”. d. On the Add/Remove Programs window, select the Software entry. e. Click “Change/Remove”. The InstallShield Wizard starts. f. On the Confirm File Deletion window, click “OK” to remove the software. g. Click “Restart” and then click “Finish”.
12
3. Basic Operations
3.1 Finding Bluetooth Devices
Follow the steps below to use the submenu “Search for Devices” to find any available Bluetooth devices in the vicinity:
1. Double click on “My Bluetooth Places” icon on the desktop.
2. Double click “Entire Bluetooth Neighborhood”. The devices found are displayed.
3. Click Bluetooth>Search for devices to search most recent available Bluetooth devices.
You may go to Bluetooth>Device Configuration>Discovery to make your computer to automatically search for devices on a regular basis. Doing so can guarantee you that the displayed list of devices in the neighborhood is current.
Note! If there are some devices within connection range not found in the list, it might because of:
1. Those devices are set to be non-discoverable. (From those unfound devices, go to
Bluetooth Configuration Panel and select “Accessibility” tab to change the
13
settings.)
2. Your device is configured to search for only specific types or classes of devices.
(From your device, go to Bluetooth Configuration Panel, and select “Discovery” tab to change the settings.)
3.2 Finding a Service
To find a service: In the Folders pane of My Bluetooth Places, double-click on the device, or right-click on the device and select “Discover Available Services” from the pop-up menu.
The followings are possible available services:
! Bluetooth Serial Port – allows two devices to build a Bluetooth wireless connection.
This service provides a wireless connection being used by applications as if a physical serial cable connected the devices.
! Dial-up networking – Allows a Bluetooth client to use a modem that is attached to the
Bluetooth server.
! Fax – Allows a Bluetooth client to send a fax using a device that is attached to the
Bluetooth server.
! File Transfer – Allows your computer to wirelessly perform file system operations
(browse, drag, open, copy, etc.) on another Bluetooth device.
! Information Exchange – Allows two Bluetooth devices to wirelessly exchange
personal information manager data such as email messages, notes, business cards and calendar items.
! Network Access – Allows a Bluetooth client to wireless connect to a server that is
physically connected to the LAN. If the client has user name and password for the LAN, the wireless connection can be used as though the client were hardwired to the LAN.
Note! Note every Bluetooth server provides all of these services.
14
3.3 Connection’s Status
Follow the steps below to open Bluetooth Connection Status dialog box that allows you to view the connection status or to disconnect an active connection:
1. In My Bluetooth Places, highlight a device.
2. In the right pane of My Bluetooth Places, right-click on a service name and select
“Status” from the pop-up menu.
The following information is provided:
! Status: Shows you the connected or disconnected status. ! Device Name: Shows you the name of the device with which this computer is
connected.
! Duration: Shows you the time it took to build the connection. The connection
may be disabled after a specific period of inactivity.
! Activity: Gives you the number of bytes sent and received over the connection. ! Signal Strength: Shows you the signal strength – Too Weak, Good or Too Strong.
15
To change the power transmission level of this computer:
1. Go to Bluetooth>Device Configuration>Hardware.
2. Click “Advanced”.
3. Change the setting in the Maximum Power Transmission drop-down list.
The following control buttons are provided:
! Properties: Click this button to display the Bluetooth Properties dialog box. ! Disconnect: Click this button to disable this connection (see status of “Network
Access” and “Dial-Up Networking”).
! Close: Click this button to close this dialog box.
3.4 New Connection
Connection Wizard helps you to easily set up a new Bluetooth connection with another device. To active the connection, double-click the shortcut that is placed in the right pane of My Bluetooth Places. Follow the steps below to set up a new connection:
1. In the Windows system tray, right-click on the Bluetooth icon , and select
“Services” from the pop-up menu. Select “Connection Wizard” from the submenu, and the first Connection Wizard screen displays.
16
2. From the “Select a Service” drop-down menu, choose the type of connection that will be
established. (You may select a specific service later.)
3. From the “Select a device that provides the service” drop-down menu, select the device
that will provide the service. (To update the list of devices found, follow the steps in Chapter 3.1 Finding Bluetooth Devices.)
4. Select the “Require secure encrypted connection” option to enable Authentication and
Encryption for this connection. Click “Next” to go to next screen.
5. If there is more than one service in the “Select a Service” drop-down menu of the
selected device, choose the specific service to be used. Click “OK” to close the dialog box. On the other hand, if there is only one service of the type selected in the drop­down menu, the next Connection Wizard screen appears.
6. If you choose “Require secure encrypted connection”, a security screen appears. You
need to enter your Personal ID Number in the PIN Code field of the security screen to establish a paired relationship with the remote device. Click “Next”. However, if this is the first time connection, leave the PIN Code field blank in the security screen, and click “Next”.
17
Loading...
+ 41 hidden pages