L i f e B o o k T 4 2 0 0 S e r i e s T a b l e t P C - A p p e n d i x A

the checkbox for the field [This is a computer to computer (ad hoc) network, wireless access points are not used.] must be checked.

Access Point (Infrastructure) Networks: The SSID must be identical to the SSID of the access point(s) and the checkbox for the following field must be unchecked [This is a computer to computer (ad hoc) network wireless access points are not used.] Refer to the access point manual, or contact your network administrator

9.Configure Wireless Network Key parameters (Net- work Authentication and Encryption).

a.Choose the Network Authentication method appropriate for your wireless LAN. Options include Open, Shared, WPA, and WPA-PSK.

Ad Hoc Networks: Network Authentication settings must be identical for all computers in the Ad Hoc network.

Access Point (Infrastructure Networks): Network Authentication setting must be config- ured to match the setting of the Access Point(s). Please contact your network administrator for this information.

b.Choose the Encryption method appropriate for your wireless LAN. Options for Open or Shared Authentication are None or WEP. Options for WPA or WPA-PSK are WEP or TKIP.

c.If using static WEP keys, clear the check mark from the [The key is provided for me automati- cally] check box. If using an authentication method that uses dynamic WEP (e.g., WPA, WPA-PSK, 802.1x/EAP), the check box should remain checked. Please contact your network administrator for the correct settings.

d.Static WEP keys (if applicable) are entered in the [Network Key] box. Configuration of the

[Network Key] is not required if the [The key is provided for me automatically] check box is checked.

Static WEP keys entered in ASCII code format will be either five characters (40-bit) or thirteen characters (104-bit) in length. Valid characters are 0 - 9, A - Z.

Static WEP keys entered in hexadecimal code format will be either ten characters (40-bit) or twenty-six characters (104-bit) in length. Valid characters are 0 - 9, A - F.

Ad Hoc Networks: Assign the same net-work key to all the personal computers to be connected.

Access Point (Infrastructure) Networks:

Assign the identical network key that is programmed into the access point. Please contact your network administrator for this information.

e. If using static WEP keys, confirm the Network key by re-entering the same data in the [Confirm network key:] field.

f. The Key index used must be identical to the transmit key used in the Access Point or other wireless device. This is only applicable when static WEP keys are used. Please contact your network administrator for this information.

10.Access Point (Infrastructure) Networks Only: If the wireless network you are establishing connec- tivity to implements an access control security mechanism, configuration of 802.1x parameters may be necessary. Please contact your network administrator for these settings. Configuration of these parameters is not applicable to home users.

11.Click [OK] to close the [Wireless Network] window which will cause the WLAN device to re-establish wireless network connectivity using the recently configured parameters.

CONFIGURATION USING

INTEL PROSET SOFTWARE

This section explains the procedure to properly configure the WLAN device using the Intel PROSet Soft- ware. Pre-defined parameters will be required for this procedure. Please consult with your network adminis- trator for these parameters:

Network Name - Also known as the SSID

Network Key (WEP) - Required if using static WEP keys.

Authentication Type - Open, Shared, WPA, or WPA-

PSK

Procedure

1.Activate the WLAN device using either the Wireless On/Off Switch or the Intel PROSet software.

2.Click the [Start] button first and then [Control Panel].

3.If the Control Panel is in Category view, switch to Classic view by clicking "Switch to Classic View" which can be found in the left frame of the Control Panel window.

4.Double-click the icon [Intel PROSet] to execute the Intel PROSet Software.

5.From the General page, click the Networks tab.

98

Page 106
Image 106
Fujitsu T4210, T4215 manual Configuration Using Intel Proset Software

T4210, T4215 specifications

The Fujitsu T4215 and T4210 are versatile tablet PCs designed to cater to the needs of mobile professionals and students alike. Known for their robust performance and innovative features, these devices stand out in the competitive landscape of portable computing. Both models are part of Fujitsu's LifeBook series, emphasizing durability, functionality, and cutting-edge technology.

One of the distinguishing characteristics of both the T4215 and T4210 is their 12.1-inch WXGA display. The screens offer a resolution of 1280 x 800 pixels, ensuring that users enjoy crisp, clear visuals whether they are reading documents, watching videos, or engaging with graphical content. The touchscreen capability enhances user interaction, providing seamless navigation for tasks ranging from note-taking to graphic design.

Performance-wise, the T4215 and T4210 are powered by Intel's dual-core processors, making them adept at handling multitasking and demanding applications. Coupled with ample RAM and storage options, these tablet PCs offer an efficient computing experience, allowing users to run various software applications simultaneously without lag.

One of the notable features of these models is their advanced input options. Both devices support pen input, allowing users to write or draw directly on the screen. This functionality is particularly beneficial for professionals who require precise control, such as graphic designers or architects. Additionally, the ergonomically designed touchscreen facilitates both stylus and finger input, enhancing versatility.

Connectivity is another strong point for the Fujitsu T4215 and T4210. Equipped with multiple USB ports, a built-in webcam, and Wi-Fi capabilities, users can easily connect to a variety of devices and the internet. This level of connectivity ensures that users can remain productive in various environments, from the office to the classroom.

Security features are also integral to these tablet PCs, which offer biometric fingerprint recognition and data encryption options. These capabilities not only protect sensitive information but also provide peace of mind to users who handle confidential data.

In conclusion, the Fujitsu T4215 and T4210 embody the essence of portable computing with their blend of performance, versatility, and security. Whether utilized for business, education, or creative endeavors, these tablet PCs deliver a compelling solution for those in need of a reliable, feature-rich mobile computing device.