ThinkCentre™
ꢀꢁꢂ
User Guide
Types 8424, 8425, 8428
Types 8171, 8172, 8173
ThinkCentre™
ꢀꢁꢂ
User Guide
Types 8424, 8425, 8428
Types 8171, 8172, 8173
Note
Before using this information and the product it supports, be sure to read the “Important safety information” on page v and
First Edition (April 2004)
© Copyright International Business Machines Corporation 2004. All rights reserved.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
© Copyright IBM Corp. 2004
iii
iv User Guide
Important safety information
This information can help you safely use your IBM® personal computer. Follow
and retain all information included with your IBM computer. The information in
this document does not alter the terms of your purchase agreement or the IBM
Statement of Limited Warranty.
Customer safety is important to IBM. Our products are developed to be safe and
effective. However, personal computers are electronic devices. Power cords, power
adapters, and other features can create potential safety risks that can result in
physical injury or property damage, especially if misused. To reduce these risks,
follow the instructions included with your product, observe all warnings on the
product and in the operating instructions, and review the information included in
this document carefully. By carefully following the information contained in this
document and provided with your product, you can help protect yourself from
hazards and create a safer computer work environment.
Note: This information includes references to power adapters and batteries. In
addition to mobile personal computers, IBM ships some products (such as speakers
or monitors) with external power adapters. If you have such a product, this
information applies to your product. In addition, your computer product may
contain a coin-sized internal battery that provides power to your system clock even
when the machine is unplugged, so the battery safety information applies to all
computers.
Conditions that require immediate action
Products can become damaged due to misuse or neglect. Some product damage
is serious enough that the product should not be used again until it has been
inspected and, if necessary, repaired by an authorized servicer.
As with any electronic device, pay close attention to the product when it is
turned on. On very rare occasions, you might notice an odor or see a puff of
smoke or sparks vent from your machine. Or you might hear sounds like
popping, cracking or hissing. These conditions might merely mean that an
internal electronic component has failed in a safe and controlled manner. Or,
they might indicate a potential safety issue. However, do not take risks or
attempt to diagnose the situation yourself.
Frequently inspect your computer and its components for damage or wear or
signs of danger. If you have any question about the condition of a component,
do not use the product. Contact the IBM Support Center® or the product
manufacturer for instructions on how to inspect the product and have it
repaired, if necessary.
In the unlikely event that you notice any of the conditions listed below, or if
you have any safety concerns with your product, stop using the product and
unplug it from the power source and telecommunication lines until you can
speak to the IBM Support Center for further guidance.
v Power cords, plugs, power adapters, extension cords, surge protectors, or power
supplies that are cracked, broken or damaged.
v Signs of overheating, smoke, sparks or fire.
© Copyright IBM Corp. 2004
v
v Damage to a battery (such as cracks, dents, creases), discharge from a battery, or
a buildup of foreign substances on the battery.
v A cracking, hissing or popping sound, or strong odor that comes from the
product.
v Signs that liquid has been spilled or an object has fallen onto the computer
product, the power cord or power adapter.
v The computer product, the power cord or power adapter has been exposed to
water.
v The product has been dropped or damaged in any way.
v The product does not operate normally when you follow the operating
instructions.
Note: If you notice these conditions with a non-IBM product (such as an extension
cord), stop using that product until you can contact the product manufacturer for
further instructions, or until you get a suitable replacement.
General safety guidelines
Always observe the following precautions to reduce the risk of injury and property
damage.
Service
Do not attempt to service a product yourself unless instructed to do so by the IBM
Support Center. Use only an IBM authorized service provider who is approved to
repair your particular product.
Note: Some parts can be upgraded or replaced by the customer. These parts are
referred to as Customer Replaceable Units, or CRUs. IBM expressly identifies CRUs
as such, and provides documentation with instructions when it is appropriate for
customers to replace those parts. You must closely follow all instructions when
performing such replacements. Always make sure that the power is turned off and
that the product is unplugged from any power source before you attempt the
replacement. If you have any questions or concerns, contact the IBM Support
Center.
Power cords and power adapters
Use only the power cords and power adapters supplied by the product
manufacturer.
Never wrap a power cord around the power adapter or other object. Doing so can
stress the cord in ways that can cause the cord to fray, crack or crimp. This can
present a safety hazard.
Always route power cords so that they will not be walked on, tripped over, or
pinched by objects.
Protect the cord and power adapters from liquids. For instance, do not leave your
cord or power adapter near sinks, tubs, toilets, or on floors that are cleaned with
liquid cleansers. Liquids can cause a short circuit, particularly if the cord or power
adapter has been stressed by misuse. Liquids can also cause gradual corrosion of
the power cord terminals and/or the connector terminals on the adapter which can
eventually result in overheating.
vi User Guide
Always connect power cords and signal cables in the correct order and ensure that
all power cord connectors are securely and completely plugged into receptacles.
Do not use any power adapter that shows corrosion at the ac input pins and/or
shows signs of overheating (such as deformed plastic) at the ac input or anywhere
on the power adapter.
Do not use any power cords where the electrical contacts on either end show signs
of corrosion or overheating or where the power cord appears to have been
damaged in any way.
Extension cords and related devices
Ensure that extension cords, surge protectors, uninterruptible power supplies, and
power strips that you use are rated to handle the electrical requirements of the
product. Never overload these devices. If power strips are used, the load should
not exceed the power strip input rating. Consult an electrician for more
information if you have questions about power loads, power requirements, and
input ratings.
Plugs and outlets
If a receptacle (power outlet) that you intend to use with your computer
equipment appears to be damaged or corroded, do not use the outlet until it is
replaced by a qualified electrician.
Do not bend or modify the plug. If the plug is damaged, contact the manufacturer
to obtain a replacement.
Some products are equipped with a three-pronged plug. This plug fits only into a
grounded electrical outlet. This is a safety feature. Do not defeat this safety feature
by trying to insert it into a non-grounded outlet. If you cannot insert the plug into
the outlet, contact an electrician for an approved outlet adapter or to replace the
outlet with one that enables this safety feature. Never overload an electrical outlet.
The overall system load should not exceed 80 percent of the branch circuit rating.
Consult an electrician for more information if you have questions about power
loads and branch circuit ratings.
Be sure that the power outlet you are using is properly wired, easily accessible,
and located close to the equipment. Do not fully extend power cords in a way that
will stress the cords.
Connect and disconnect the equipment from the electrical outlet carefully
Batteries
All IBM personal computers contain a non-rechargeable coin cell battery to provide
power to the system clock. In addition many mobile products such as Thinkpad
notebook PCs utilize a rechargeable battery pack to provide system power when in
portable mode. Batteries supplied by IBM for use with your product have been
tested for compatibility and should only be replaced with IBM approved parts.
Never attempt to open or service any battery. Do not crush, puncture, or incinerate
batteries or short circuit the metal contacts. Do not expose the battery to water or
other liquids. Only recharge the battery pack strictly according to instructions
included in the product documentation.
Important safety information vii
Battery abuse or mishandling can cause the battery to overheat, which can cause
gasses or flame to “vent” from the battery pack or coin cell. If your battery is
damaged, or if you notice any discharge from your battery or the buildup of
foreign materials on the battery leads, stop using the battery and obtain a
replacement from the battery manufacturer.
Batteries can degrade when they are left unused for long periods of time. For some
rechargeable batteries (particularly Lithium Ion batteries), leaving a battery unused
in a discharged state could increase the risk of a battery short circuit, which could
shorten the life of the battery and can also pose a safety hazard. Do not let
rechargeable Lithium-Ion batteries completely discharge or store these batteries in a
discharged state.
Heat and product ventilation
Computers generate heat when turned on and when batteries are charging.
Notebook PCs can generate a significant amount of heat due to their compact size.
Always follow these basic precautions:
v Do not leave the base of your computer in contact with your lap or any part of
your body for an extended period when the computer is functioning or when
the battery is charging. Your computer produces some heat during normal
operation. Extended contact with the body could cause discomfort or, potentially,
a skin burn.
v Do not operate your computer or charge the battery near flammable materials or
in explosive environments.
v Ventilation slots, fans and/or heat sinks are provided with the product for safety,
comfort, and reliable operation. These features might inadvertently become
blocked by placing the product on a bed, sofa, carpet, or other flexible surface.
Never block, cover or disable these features.
CD and DVD drive safety
CD and DVD drives spin discs at a high speed. If a CD or DVD is cracked or
otherwise physically damaged, it is possible for the disc to break apart or even
shatter when the CD drive is in use. To protect against possible injury due to this
situation, and to reduce the risk of damage to your machine, do the following:
v Always store CD/DVD discs in their original packaging
v Always store CD/DVD discs out of direct sunlight and away from direct heat
sources
v Remove CD/DVD discs from the computer when not in use
v Do not bend or flex CD/DVD discs, or force them into the computer or their
packaging
v Check CD/DVD discs for cracks before each use. Do not use cracked or
damaged discs
Additional safety information
DANGER
Electrical current from power, telephone, and communication cables is
hazardous.
To avoid a shock hazard:
v Do not connect or disconnect any cables or perform installation, maintenance,
or reconfiguration of this product during an electrical storm.
viii User Guide
v Connect all power cords to a properly wired and grounded electrical outlet.
v Connect to properly wired outlets any equipment that will be attached to this
product.
v When possible, use one hand only to connect or disconnect signal cables.
v Never turn on any equipment when there is evidence of fire, water, or
structural damage.
v Disconnect the attached power cords, telecommunications systems, networks,
and modems before you open the device covers, unless instructed otherwise
in the installation and configuration procedures.
v Connect and disconnect cables as described in the following table when
installing, moving, or opening covers on this product or attached devices.
To connect:
To disconnect:
1. Turn everything OFF.
2. First, attach all cables to devices.
3. Attach signal cables to connectors.
4. Attach power cords to outlet.
5. Turn device ON.
1. Turn everything OFF.
2. First, remove power cords from outlet.
3. Remove signal cables from connectors.
4. Remove all cables from devices.
DANGER
Le courant électrique provenant de l’alimentation, du téléphone et des câbles de
transmission peut présenter un danger.
Pour éviter tout risque de choc électrique :
v Ne manipulez aucun câble et n’effectuez aucune opération d’installation,
d’entretien ou de reconfiguration de ce produit au cours d’un orage.
v Branchez tous les cordons d’alimentation sur un socle de prise de courant
correctement câblé et mis à la terre.
v Branchez sur des socles de prise de courant correctement câblés tout
équipement connecté à ce produit.
v Lorsque cela est possible, n’utilisez qu’une seule main pour connecter ou
déconnecter les câbles d’interface.;
v Ne mettez jamais un équipement sous tension en cas d’incendie ou
d’inondation, ou en présence de dommages matériels.
v Avant de retirer les carters de l’unité, mettez celle-ci hors tension et
déconnectez ses cordons d’alimentation, ainsi que les câbles qui la relient aux
réseaux, aux systèmes de té lécommunication et aux modems (sauf instruction
contraire mentionnée dans les procédures d’installation et de configuration).
v Lorsque vous installez, que vous déplacez, ou que vous manipulez le présent
produit ou des périphériques qui lui sont raccordés, reportez-vous aux
instructions ci-dessous pour connecter et déconnecter les différents cordons.
Important safety information ix
Connexion:
Déconnexion:
1. Mettez les unités hors tension.
1. Mettez les unités hors tension.
2. Commencez par brancher tous les
2. Débranchez les cordons d’alimentation
cordons sur les unités.
des prises.
3. Branchez les câbles d’interface sur des
3. Débranchez les câbles d’interface des
connecteurs.
connecteurs.
4. Branchez les cordons d’alimentation sur 4. Débranchez tous les câbles des unités.
des prises.
5. Mettez les unités sous tension.
Lithium battery notice
CAUTION:
Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent
type battery recommended by the manufacturer. The battery contains lithium and
can explode if not properly used, handled, or disposed of.
Do not:
v Throw or immerse into water
v Heat to more than 100°C (212°F)
v Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION
Danger d’explosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type ou d’un type équivalent
recommandé par le fabricant. La batterie contient du lithium et peut exploser en
cas de mauvaise utilisation, de mauvaise manipulation ou de mise au rebut
inappropriée.
Ne pas :
v Lancer ou plonger dans l’eau
v Chauffer à plus de 100°C (212°F)
v Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Modem safety information
To reduce the risk of fire, electrical shock, or injury when using telephone
equipment, always follow basic safety precautions, such as:
v Never install telephone wiring during a lightning storm.
v Never install telephone jacks in wet locations unless the jack is specifically
designed for wet locations.
v Never touch uninsulated telephone wires or terminals unless the telephone line
has been disconnected at the network interface.
v Use caution when installing or modifying telephone lines.
x
User Guide
v Avoid using a telephone (other than a cordless type) during an electrical storm.
There may be a remote risk of electric shock from lightning.
v Do not use the telephone to report a gas leak in the vicinity of the leak.
Consignes de sécurité relatives au modem
Lors de l’utilisation de votre matériel téléphonique, il est important de respecter les
consignes ci-après afin de réduire les risques d’incendie, d’électrocution et d’autres
blessures :
v N’installez jamais de cordons téléphoniques durant un orage.
v Les prises téléphoniques ne doivent pas être installées dans des endroits
humides, excepté si le modèle a été conçu à cet effet.
v Ne touchez jamais un cordon téléphonique ou un terminal non isolé avant que
la ligne ait été déconnectée du réseau téléphonique.
v Soyez toujours prudent lorsque vous procédez à l’installation ou à la
modification de lignes téléphoniques.
v Si vous devez téléphoner pendant un orage, pour éviter tout risque de choc
électrique, utilisez toujours un téléphone sans fil.
v En cas de fuite de gaz, n’utilisez jamais un téléphone situé à proximité de la
fuite.
Laser compliance statement
Some IBM Personal Computer models are equipped from the factory with a
CD-ROM drive or a DVD-ROM drive. CD-ROM drives and DVD-ROM drives are
also sold separately as options. CD-ROM drives and DVD-ROM drives are laser
products. These drives are certified in the U.S. to conform to the requirements of
the Department of Health and Human Services 21 Code of Federal Regulations
(DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, these drives
are certified to conform to the requirements of the International Electrotechnical
Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser products.
When a CD-ROM drive or a DVD-ROM drive is installed, note the following
handling instructions.
CAUTION:
Use of controls or adjustments or performance of procedures other than those
specified herein might result in hazardous radiation exposure.
Removing the covers of the CD-ROM drive or DVD-ROM drive could result in
exposure to hazardous laser radiation. There are no serviceable parts inside the
CD-ROM drive or DVD-ROM drive. Do not remove the drive covers.
Some CD-ROM drives and DVD-ROM drives contain an embedded Class 3A or
Class 3B laser diode. Note the following statement.
DANGER
Laser radiation when open. Do not stare into the beam, do not view directly with optical
instruments, and avoid direct exposure to the beam.
DANGER:
Important safety information xi
Certains modèles d’ordinateurs personnels sont équipés d’origine d’une unité de
CD-ROM ou de DVD-ROM. Mais ces unités sont également vendues séparément
en tant qu’options. L’unité de CD-ROM/DVD-ROM est un appareil à laser. Aux
État-Unis, l’unité de CD-ROM/DVD-ROM est certifiée conforme aux normes
indiquées dans le sous-chapitre J du DHHS 21 CFR relatif aux produits à laser de
classe 1. Dans les autres pays, elle est certifiée être un produit à laser de classe 1
conforme aux normes CEI 825 et CENELEC EN 60 825.
Lorsqu’une unité de CD-ROM/DVD-ROM est installée, tenez compte des
remarques suivantes:
ATTENTION: Pour éviter tout risque d’exposition au rayon laser, respectez les
consignes de réglage et d’utilisation des commandes, ainsi que les procédures
décrites.
L’ouverture de l’unité de CD-ROM/DVD-ROM peut entraîner un risque
d’exposition au rayon laser. Pour toute intervention, faites appel à du personnel
qualifié.
Certaines unités de CD-ROM/DVD-ROM peuvent contenir une diode à laser de
classe 3A ou 3B. Tenez compte de la consigne qui suit:
DANGER
Rayonnement laser lorsque le carter est ouvert. Évitez toute exposition directe des yeux
au rayon laser. Évitez de regarder fixement le faisceau ou de l’observer à l’aide
d’instruments optiques.
xii User Guide
Chapter 1. Overview
Thank you for selecting an IBM® computer. Your computer incorporates many of
the latest advances in computer technology and can be upgraded as your needs
change.
Instructions for installing external and internal options are included in this
publication. When adding an option, use these instructions along with the
instructions that come along with the option.
Information resources
The Quick Reference that comes with your computer provides information for
setting up your computer, starting the operating system, troubleshooting, and
notices.
Access IBM provides a link to more information about your computer. Click Start →
Access IBM.
If you have Internet access, the most up-to-date manuals for your computer are
available from the World Wide Web. To access this information, point your browser
to:
Type your machine type and model number in the Quick Path field, and click Go.
© Copyright IBM Corp. 2004
1
Features
This section provides an overview of the computer features and preinstalled
software.
System summary
The following information covers a variety of models. For a listing of features
for your specific model, go to Chapter 3, “Using the IBM Setup Utility,” on
Microprocessor
v Intel Pentium® 4 processor with HyperThreading Technology
v Intel Pentium 4 processor
v Intel® Celeron™ processor
v Internal cache (size varies by model type)
Memory
Support for two 184-pin dual inline memory modules (DIMMs). Each DIMM
socket can support up to 1 GB of PC2700 double data rate (DDR) synchronous
dynamic random access memory (SDRAM) for a system maximum of 2 GB.
Internal drives
v 3.5-inch, half-inch (slim) diskette drive
v Hard disk drive
v CD-ROM, DVD-ROM, DVD-ROM/CD-RW Combo, CD-RW, or Rambo III, IV
DVD-RAM Multi-Burner optical drive (some models)
Video subsystem
Intel Graphics Media Accelerator 900 with dual display support
Audio subsystem
The integrated AC’97 audio controller provides four audio connectors.
v Microphone and headphone connectors on the front panel
v Line-in and line-out connectors on the rear panel
v Mono internal speaker
Connectivity
v 10/100/1000 Mbps integrated Intel Ethernet controller that supports the Wake
on LAN feature (some models)
v Peripheral Component Interconnect (PCI) V.90 Data/Fax modem (some models)
System management features
v Remote Program Load (RPL) and Dynamic Host Configuration Protocol (DHCP)
v Wake on LAN
v Wake on Serial port (RS232) from ACPI S1, S3, and S5
v Wake on USB from ACPI S1 and S3
v Wake on PS/2 Keyboard/Mouse from ACPI S1 and S3
v Remote Administration
v Automatic power-on startup
2
User Guide
v System Management (SM) BIOS and SM software
v Ability to store POST hardware test results
Input/output features
v 1 PCI Slot
v 1 PCI Express x1 slot with support for PCI-e DVI-D Connection Adapter
v 25-pin Parallel Port
v Two 9-pin serial connectors
v Eight USB 2.0 connectors (two on front panel and six on rear panel)
v PS/2® mouse connector
v PS/2 keyboard connector
v Ethernet connector
v VGA monitor connector
v Two audio connectors (line-in and line-out) on rear panel
v Two audio connectors (microphone and headphone) on front panel
Expansion
v One 132-bit PCI slot
v One PCI Express x1 slot with support for PCI-e DVI-D Connection Adapter
v Two DIMM memory connectors
Power
v 225 Watt power supply with manual voltage selection switch
v Automatic 50/60 Hz input frequency switching
v Advanced Power Management support
v Advanced Configuration and Power Interface (ACPI) support
Security features
The IBM Embedded Security Subsystem (ESS) is a security subsystem included on
IBM ThinkCentre PCs. It consists of a dedicated Hardware Security Module built
on to the motherboard and Client Security Software, a free, web-downloaded
application. ESS provides the following security values by enhancing the security
of:
v data stored on the PC by providing an encryption application (File and Folder
Encryption) or encryption products from ISVs (such as products from Utimaco
Safeware)
v digital certificates and other digital identity information stored on a PC
v VPN products from Cisco, Check Point and 3Com by increasing the protection
around login credentials these products use
v customer network by providing unique machine identifiers for PCs in the
network (by associating certificates with the built-in Hardware Security Module)
Other security features include:
v User and administrator passwords
v Support for the addition of a cable lock such as a Kensington lock
v Knockout holes for installing a rope clip (U-bolt)
v Optional keylock on top cover
v Startup sequence control
Chapter 1. Overview
3
v Startup without diskette drive, keyboard, or mouse
v Diskette and hard disk I/O control
v Serial and parallel port I/O control
v Security profile by device
IBM preinstalled software
Your computer comes with preinstalled software. An operating system, device
drivers to support built-in features, and other support programs are included.
4
User Guide
Operating systems (preinstalled) (varies by model)
Note: Not all countries or regions will have these operating systems.
v Microsoft® Windows® XP Home
v Microsoft Windows XP Professional
Available options
The following are some available options:
v External options
– Parallel port devices, such as printers and external drives
– Serial port devices, such as external modems and digital cameras
– Audio devices, such as external speakers for the sound system
– USB devices, such as printers, joysticks, and scanners
– Security devices, such as a cable lock
– Monitors
v Internal options
– System memory, called dual inline memory modules (DIMMs)
– Peripheral component interconnect (PCI) adapters
– PCI Express x1 adaptors
– CD-ROM, DVD-ROM, or CD-RW drive, hard disk drive, diskette drive, and
other removable media drives
For the latest information about available options, see the following World Wide
Web pages:
You can also obtain information by calling the following telephone numbers:
v Within the United States, call 1-800-IBM SERV (1-800-426-7378), your IBM
reseller, or IBM marketing representative.
v Within Canada, call 1-800-565-3344 or 1-800-IBM-4YOU.
v Outside the United States and Canada, contact your IBM reseller or IBM
marketing representative.
Chapter 1. Overview
5
Specifications
This section lists certain specifications for your computer. For the latest
specification information, see the User Guide for your computer model and type at:
Dimensions
Airflow
Width: 12.2 inches (310 mm)
Height: 3.35 inches (85 mm)
Depth: 14.1 inches (358 mm)
Approximately 14 cubic feet (0.45 cubic meters) per
minute
Acoustical noise-emission values
Note: In this computer, fan speed is controlled by
temperature, configuration, and software. Actual
noise-emission values might be different from the stated
values depending on the number of fans and the speed
of the fans.
Weight
Minimum configuration as shipped: 7.3 kg (16 lbs)
Maximum configuration: 8.5 kg (18.7 lbs)
Environment
Average sound-pressure levels for computers with a
microprocessor that runs at or below 2.8 GHz:
Air temperature:
Operating at 0 - 3000 ft (914.4 m): 10° to 35°C (50°
to 95°F)
At operator position - 0.5 meters:
Idle: 30 dBA
Operating at 3000 ft - 7000 ft (2134 m): 10° to 32°C
(50° to 89.6°F)
Operating: 34 dBA
At bystander position - 1 meter (3.3 ft):
Idle: 26 dBA
Non-operating: 10° to 43°C (50° to 110°F)
Humidity:
Operating: 29 dBA
Operating: 8% to 80%
Declared (upper limit) sound-power levels:
Idle: 4.0 bels
Non-operating: 8% to 80%
Transit: 8% to 90%
Operating: 4.3 bels
Maximum altitude: 7000 ft (2133.6 m)
Average sound-pressure levels for computers with a
microprocessor that runs at greater than 2.8 GHz:
Electrical input
Input voltage:
At operator position - 0.5 meters:
Idle: 31 dBA
Low range:
Minimum: 100 V ac
Operating: 34 dBA
Maximum: 127 V ac
At bystander position - 1 meter (3.3 ft):
Idle: 26 dBA
Input frequency range: 50–60 Hz
Voltage switch setting: 115 V ac
High range:
Operating: 29 dBA
Declared (upper limit) sound-power levels:
Idle: 4.0 bels
Minimum: 200 V ac
Maximum: 240V ac
Operating: 4.3 bels
Input frequency range: 50–60 Hz
Voltage switch setting: 230 V ac
Input kilovolt-amperes (kVA) (approximate):
Minimum configuration as shipped: 0.09 kVA
Maximum configuration: 0.23 kVA
Note: These levels were measured in controlled
acoustical environments according to the procedures
specified by the American National Standards Institute
(ANSI) S12.10 and ISO 7779 and are reported in
accordance with ISO 9296. Actual sound-pressure levels
in a given location might exceed the average values
stated because of room reflections and other nearby noise
sources. The declared sound-power levels indicate an
upper limit, below which a large number of computers
will operate.
Heat output (approximate) in British thermal units (Btu)
per hour:
Minimum configuration: 205.8 Btu/hr (60 watts)
Maximum configuration: 548.8 Btu/hr (160 watts)
6
User Guide
8
User Guide
Chapter 2. Installing options
This chapter provides instructions for installing optional memory, PCI adapters,
drives, and security features. When installing an option, use these instructions
along with the instructions that come with the option.
Important
Before you install or remove any option, read “Important safety information”
Handling static-sensitive devices
Static electricity, although harmless to you, can seriously damage computer
components and options.
When you add an option, do not open the static-protective package containing the
option until you are instructed to do so.
When you handle options and other computer components, take these precautions
to avoid static electricity damage:
v Limit your movement. Movement can cause static electricity to build up around
you.
v Always handle components carefully. Handle adapters and memory modules by
the edges. Never touch any exposed circuitry.
v Prevent others from touching components.
v When you install a new option, touch the static-protective package containing
the option to a metal expansion-slot cover or other unpainted metal surface on
the computer for at least two seconds. This reduces static electricity in the
package and your body.
v When possible, remove the option and install it directly in the computer without
setting the option down. When this is not possible, place the static-protective
package that the option came in on a smooth, level surface and place the option
on it.
v Do not place the option on the computer cover or other metal surface.
Installing external options
This section shows the various external connectors on your computer to which you
can attach external options, such as external speakers, a printer, or a scanner. For
some external options, you must install additional software in addition to making
the physical connection. When adding an external option, use the information in
this section to identify the required connector, and then use the instructions that
come with the option to help you make the connection and install any software or
device drivers that are required for the option.
© Copyright IBM Corp. 2004
9
Locating controls and connectors on the front of your
computer
The following illustration shows locations of the controls and connectors on the
front of your computer.
ꢀ1ꢁ
ꢀ2ꢁ
ꢀ3ꢁ
ꢀ4ꢁ
ꢀ5ꢁ
Cover keylock (some models)
CD or DVD drive
Hard disk drive activity indicator ꢀ8ꢁ
Power-on indicator
Power button
ꢀ6ꢁ
ꢀ7ꢁ
USB connectors (2)
Microphone connector (line in)
Headphone connector (line out)
Diskette drive
ꢀ9ꢁ
10 User Guide
Locating connectors on the rear of your computer
The following illustration shows locations of connectors on the rear of your
computer.
ꢀ1ꢁ
ꢀ2ꢁ
ꢀ3ꢁ
ꢀ4ꢁ
ꢀ5ꢁ
ꢀ6ꢁ
ꢀ7ꢁ
ꢀ8ꢁ
Power cord connector
Cable lock latch
Rope clip (U-bolt) holes
ꢀ9ꢁ
ꢀ10ꢁ
ꢀ11ꢁ
Parallel connector
Audio line-in connector
Audio line-out connector
USB connectors (4)
PS/2 keyboard connector
PS/2 mouse connector
LEDs
PCI and PCI express adapter slots ꢀ12ꢁ
Serial connectors (2)
Ethernet connector
USB connectors (2)
VGA monitor connector
ꢀ13ꢁ
ꢀ14ꢁ
ꢀ15ꢁ
Note: Some connectors on the rear of your computer are color-coded to help
determine where to connect the cables.
Obtaining device drivers
You can obtain device drivers for operating systems that are not preinstalled at
instructions are provided in README files with the device-driver files.
Chapter 2. Installing options 11
Opening the cover
Important
static-sensitive devices” on page 9 before opening the cover.
To open the cover:
1. Shut down your operating system, remove any media (diskettes, CDs, or tapes)
from the drives, and turn off all attached devices and the computer.
2. Unplug all power cords from electrical outlets.
3. Disconnect all cables attached to the computer. This includes power cords,
input/output (I/O) cables, and any other cables that are connected to the
computer.
4. Remove the floor stand, if attached.
5. If a cover lock is installed, unlock the cover.
6. Press inward on the two buttons and rotate the top cover upward as illustrated.
12 User Guide
Locating components
The following illustration will help you locate the various components in your
computer.
ꢀ1ꢁ
ꢀ2ꢁ
Diskette drive lock
DIMM (memory) connectors (2)
ꢀ5ꢁ
ꢀ6ꢁ
Power supply assembly
CD or DVD drive (hard disk drive is
under the CD drive)
ꢀ3ꢁ
ꢀ4ꢁ
Battery
PCI riser
ꢀ7ꢁ
CD or DVD drive lock
Chapter 2. Installing options 13
Accessing system board components and drives
You might need to rotate the drive bay assembly upward and remove the PCI riser
and adapters to access system board components such as memory, the battery, the
Clear CMOS/BIOS recovery jumper and to access the drives.
To access system board components and the drives:
1. Turn off the computer.
3. Rotate the drive bay assembly upward as illustrated.
Note: Make sure you note the location of any cables that you disconnect from
the drives or the system board.
4. If any PCI adapters are installed, remove the PCI riser and adapter cards. Do
not remove any adapters from the riser card. See “Installing PCI adapters” on
14 User Guide
Identifying parts on the system board
The system board (sometimes called the planar or motherboard) is the main circuit
board in your computer. It provides basic computer functions and supports a
variety of devices that are IBM-installed or that you can install later.
The following illustration shows the locations of parts on the system board.
ꢀ1ꢁ
ꢀ2ꢁ
Fan connectors (2)
Memory DIMM connectors (2)
ꢀ8ꢁ
ꢀ9ꢁ
Diskette drive connector
Power button and front LED assembly
connector
ꢀ3ꢁ
ꢀ4ꢁ
SATA IDE hard disk drive
connectors (2)
Riser connector
ꢀ10ꢁ Power supply connector
ꢀ11ꢁ PATA Primary IDE connector (hard disk
drive and CD-ROM drive)
ꢀ5ꢁ
ꢀ6ꢁ
CMOS Battery
Clear CMOS/BIOS recovery
jumper
ꢀ12ꢁ Power supply connector
ꢀ13ꢁ Microprocessor
ꢀ7ꢁ
Internal speaker connector
Chapter 2. Installing options 15
Installing memory
Your computer has two connectors for installing dual inline memory modules
(DIMMs) that provide up to a maximum of 2 GB of system memory.
When installing memory, the following rules apply:
v Use 2.5 V, 184-pin, double data rate synchronous dynamic random access
memory (DDR SDRAM), non-ECC DIMMs.
v Use 128 MB, 256 MB, 512 MB, or 1 GB DIMMs (when available) in any
combination.
Note: Only DDR SDRAM DIMMs can be used.
To install DIMMs:
3. Open the retaining clips.
4. Make sure the notch in the DIMM aligns with the tab on the connector. Push or
insert the memory module straight down into the connector until the retaining
clips close.
5. Replace the PCI riser and adapters if it was removed.
6. Place the drives back to the original position.
16 User Guide
Installing PCI adapters
This section provides information and instructions for installing and removing PCI
adapters. Your computer has a riser card with one PCI expansion slot and one PCI
Express x1 expansion slot.
To install a PCI adapter:
2. While holding the left rear of the computer chassis down, pull upward on the
handle provided, to remove the PCI riser and any adapters that are currently
installed.
3. Release the slot cover latch and remove the slot cover for the appropriate
expansion slot.
4. Remove the adapter from its static-protective package.
5. Install the adapter into the appropriate slot in the PCI riser.
Note: The top slot is for the PCI adaptor and the bottom slot is for the PCI
express adaptor.
Chapter 2. Installing options 17
6. Position the adapter-slot-cover latch to retain the adapters.
7. Reinstall the PCI riser and adapters.
What to do next:
v To work with another option, go to the appropriate section.
Removing and replacing the battery
Your computer has a special type of memory that maintains the date, time, and
settings for built-in features, such as parallel-port assignments (configuration). A
battery, sometimes called the CMOS battery, keeps this information active when
you turn off the computer.
The battery normally requires no charging or maintenance throughout its life;
however, no battery lasts forever. If the battery fails, the date, time, and
configuration information (including passwords) are lost. An error message is
displayed when you turn on the computer.
disposing of the battery.
Important
Before you install or remove any component, read “Important safety
information” on page v. These precautions and guidelines will help you work
safely.
To change the battery:
1. Turn off the computer and disconnect the power cord from the electrical outlet
and from the computer.
battery.
4. Remove the PCI riser and PCI adapters that impede access to the battery.
5. Remove the old battery.
18 User Guide
6. Install the new battery.
7. Install the PCI riser and adapters if removed.
Note: When the computer is turned on for the first time after battery
replacement, an error message might be displayed. This is normal after
replacing the battery.
9. Turn on the computer and all attached devices.
10. Use the IBM Setup Utility program to set the date and time and any
passwords.
Removing and replacing an optical drive
2. Rotate the drive bay assembly upward to gain access to the cable connections.
3. Disconnect the signal and power cables from the drive.
4. Slide the lockꢀ1ꢁto the unlocked position.
5. Open the door at the front of the drive and slide it out the front of the
computer.
6. Install the new drive into the bay from the front.
7. Slide the lock ꢀ1ꢁto the locked position and close the door at the front of the
drive.
Chapter 2. Installing options 19
8. If you are replacing an existing drive, place the master/slave jumper on the
drive in the same position as on the drive being replaced. Also refer to any
instructions that come with the drive.
9. Connect the signal cable and power cable to the drive.
procedure.
Removing and replacing a diskette drive
2. Slide the lockꢀ1ꢁto the unlocked position.
3. Slide the drive towards the rear of the computer far enough to gain access to
the flat cable connector on the drive and disconnect the flat cable from the
drive.
4. Rotate the drive bay assembly upward and remove the diskette drive.
To install a new diskette drive:
1. Slide the new drive partially into the bay from the rear.
2. Connect the flat cable to the new drive.
3. Slide the new drive completely into the bay and slide the lockꢀ1ꢁto the locked
position.
procedure.
Installing security features
To help prevent hardware theft and unauthorized access to your computer, several
security lock options are available. The following sections help you identify and
install the various types of locks that might be available for your computer. In
addition to physical locks, unauthorized use of your computer can be prevented by
a software lock that locks the keyboard until a correct password is typed in.
20 User Guide
Make sure that any security cables you install do not interfere with other computer
cables.
Identifying security locks
The following illustration will help you to identify the various types of security
locks that your computer might have.
ꢀ1ꢁ
ꢀ2ꢁ
ꢀ3ꢁ
Holes for Rope clip (U-bolt)
Slot for integrated cable lock (Kensington lock)
Cover lock
Integrated security cable
With an integrated cable lock (sometimes referred to as the Kensington lock), you
can secure your computer to a desk, table, or other non-permanent fixture. The
cable lock attaches to a security slot at the rear of your computer and is operated
with a key. This is the same type of lock used with many laptop computers. You
can order a security cable directly from IBM. Go to
Chapter 2. Installing options 21
®
22 User Guide
Rope clip
Using a 3/16 in (5 mm) security rope clip (sometimes referred to as a U-bolt), a
steel security cable, and a padlock you can secure your computer to a desk, table,
or other non-permanent fixture. For computers designed to accommodate the rope
clip, knockouts at the rear of the chassis are provided.
To install a rope clip:
2. Use a tool, such as a screwdriver, to remove the two metal knockouts.
3. Insert the rope clip through the rear of the chassis and install the nuts using
either an adjustable or an appropriate sized wrench.
4. Replace the cover.
5. Thread the security cable through the rope clip and around an object that is not
part of or permanently attached to the building structure or foundation, and
from which it cannot be removed; then fasten the cable together with a lock.
®
Cover lock
Your computer comes with a built-in key lock or a provision to install a key lock
such as those provided by the Illinois Lock Company. The mailing address is:
Illinois Lock Company
301 W. Hintz Road
Wheeling, IL 60090-5754 USA
Password protection
To deter unauthorized use of your computer, you can use the IBM Setup Utility
program to set a password. When you turn on your computer you are prompted to
type the password to unlock the keyboard for normal use.
Chapter 2. Installing options 23
Erasing a lost or forgotten password (clearing CMOS)
This section applies to lost or forgotten passwords. For more information about
lost or forgotten passwords, go to Access IBM.
To erase a forgotten password:
2. Locate the Clear CMOS/BIOS recovery jumper on the system board. See
3. Move the jumper from the standard position (pins 1 and 2) to the
maintenance or configure position (pins 2 and 3).
4. Install the PCI riser and adapters if removed.
5. Lower the drive bay assembly and reconnect any cables that were
disconnected.
7. Restart the computer, leave it on for approximately 10 seconds, and then turn
off the computer.
8. Repeat step 1.
9. Move the CMOS/BIOS recovery jumper back to the standard position (pins 1
and 2).
Closing the cover and connecting the cables
After working with options, you need to install any removed parts, close the cover,
and reconnect cables, including telephone lines and power cords. Also, depending
on the option that is installed, you might need to confirm the updated information
in the IBM Setup Utility program.
To close the cover and connect cables to your computer:
1. Ensure that all components have been reassembled correctly and that no tools
or loose screws are left inside your computer.
2. Clear any cables that might impede the replacement of the cover.
3. Make sure the drive bay assembly is lowered and that the drive locks are both
in the locked position. Otherwise, you cannot close the cover.
4. Close the cover.
5. If a cover lock is installed, lock the cover.
6. If your computer is being placed in the vertical position, attach the floor stand.
Attention: To prevent overheating and possible component damage, always
attach the floor stand when placing the computer in the vertical position.
24 User Guide
Chapter 3. Using the IBM Setup Utility
The IBM Setup Utility program is stored in the electrically erasable programmable
read-only memory (EEPROM) of your computer. The IBM Setup Utility program is
used to view and change the configuration settings of your computer, regardless of
which operating system you are using. However, the operating-system settings
might override any similar settings in the IBM Setup Utility program.
Starting the IBM Setup Utility program
To start the IBM Setup Utility program, do the following:
1. If your computer is already on when you start this procedure, shut down the
operating system and turn off the computer.
2. Turn on the computer and look for the following prompt on the logo screen:
(To interrupt normal startup, press Enter)
Press Enter when you see the prompt.
3. When the Startup Interrupt Menu displays, press F1.
Note: If a user password or an administrator password has been set, the IBM
Setup Utility program menu is not displayed until you type your
The IBM Setup Utility might start automatically when POST detects that hardware
has been removed or new hardware has been installed in your computer.
Viewing and changing settings
The IBM Setup Utility program menu lists items that identify system configuration
topics.
When working with the IBM Setup Utility program menu, you must use the
keyboard. The keys used to perform various tasks are displayed at the bottom of
each screen.
Exiting from the IBM Setup Utility program
When you finish viewing or changing settings, press Esc to return to the IBM
Setup Utility program menu (you might have to press Esc several times). If you
want to save the new settings, select Save Settings or Save and exit the Setup
Utility. Otherwise, your changes will not be saved.
Using passwords
By using the IBM Setup Utility program, you can set passwords to prevent
unauthorized persons from gaining access to your computer and data. The
following types of passwords are available:
v User Password
v Administrator Password
v IDE Drive User Password
v IDE Drive Master Password
© Copyright IBM Corp. 2004
25
You do not have to set any passwords to use your computer. However, if you
decide to set any passwords, read the following sections.
Password considerations
If you are setting any of the various types of passwords on your computer, you
should read and understand the following information:
v If you type an incorrect password, you will see an error message. If you type an
incorrect password three consecutive times, you must turn the computer off and
start again.
v If you set both a User Password and an IDE Drive User Password to the same
string, you will be prompted for the password only once when you turn on your
computer.
v Do not move an IDE hard disk drive to another computer if an IDE Drive User
Password has been set unless that computer also supports the IDE Drive User
password.
v If your computer is connected to a local area network (LAN), Wake on LAN will
not work unless both a User Password and an IDE Drive User Password are set
using the same password.
User Password
When a User Password is set, the user is prompted to type a valid password each
time the computer is turned on. The computer cannot be used until a valid
password is typed from the keyboard.
Administrator Password
Setting an Administrator Password deters unauthorized persons from changing
configuration settings. If you are responsible for maintaining the settings of several
computers, you might want to set an Administrator Password.
After you set an Administrator Password, a password prompt is displayed each
time you try to access the IBM Setup Utility program.
If both the user and administrator passwords are set, you can type either
password. However, to change any configuration settings, you must use your
administrator password.
IDE Drive User Password
The IDE Drive User Password is used to protect the data on the IDE hard disk
drive(s). When this password is set, you are prompted to type a valid password
before any hard disk drive can be used. This prompt is displayed each time you
turn on your computer. If your computer has multiple hard disk drives, they all
must use the same password.
Attention
If an IDE Drive User Password is set but no IDE Drive Master Password is
set, there is no recovery in the event that the IDE Drive User Password is lost
or forgotten. The hard disk drive must be replaced. See “IDE Drive Master
26 User Guide
IDE Drive Master Password
The IDE Drive Master Password is used to recover use of the hard disk drive in
the event that the IDE Drive User Password is lost or forgotten. Only the person
who knows the IDE Drive Master password can reset the IDE Drive User
Password.
Attention
Make sure that the IDE Drive Master password is stored in a safe place. If
both the IDE Drive User password and the IDE Drive Master password are
lost or forgotten, the IDE hard disk drive must be replaced.
If both the IDE Drive User Password and the IDE Drive Master Password are to be
set, the IDE Drive Master Password must be set before setting the IDE Drive User
Password.
Setting, changing, and deleting a password
To set, change, or delete a password, do the following:
Note: A password can be any combination of up to seven characters (A- Z, a-z,
and 0-9).
2. From the IBM Setup Utility program menu, select Security.
3. Select Set Passwords. Read the information displayed on the right side of the
screen.
Using Security Profile by Device
Security Profile by Device is used to enable or disable user access to the following
devices:
IDE controller
When this feature is set to Disable, all devices connected to the
IDE controller (such as hard disk drives or the CD-ROM drive)
are disabled and will not be displayed in the system
configuration.
Diskette Drive Access
Diskette Write Protect
When this feature is set to Disable, the diskette drive cannot be
accessed.
When this feature is set to Enable, all diskettes are treated as if
they are write-protected.
To set Security Profile by Device, do the following:
2. From the IBM Setup Utility program menu, select Security.
3. Select Security Profile by Device.
4. Select the desired devices and settings and press Enter.
5. Return to the IBM Setup Utility program menu and select Exit and then Save
Settings or Save and exit the Setup Utility.
Note: If you do not want to save the settings, select Exit the Setup Utility
without saving.
Chapter 3. Using the IBM Setup Utility 27
Selecting a startup device
If your computer does not start up (boot) from a device such as the CD-ROM,
diskette, or hard disk as expected, use one of the following procedures to select a
startup device.
Selecting a temporary startup device
Use this procedure to startup from any boot device.
Note: Not all CDs, hard disks, and diskettes are startable (bootable).
1. Turn off your computer.
2. Turn on your computer and look for the following prompt on the logo screen:
(To interrupt normal startup, press Enter)
Press Enter when you see the prompt.
3. When the Startup Interrupt Menu displays, press F12.
4. Select the desired startup device from the Startup Device menu and press Enter
to begin.
Note: Selecting a startup device from the Startup Device menu does not
permanently change the startup sequence.
Changing the startup device sequence
To view or permanently change the configured startup device sequence, do the
following:
2. Select Startup.
3. Select Startup Sequence. See the information displayed on the right side of the
screen.
4. Select the devices for the Primary Startup Sequence, the Automatic Startup
Sequence, and the Error Startup Sequence.
5. Select Exit from the IBM Setup Utility menu and then Save Settings or Save
and exit the Setup Utility.
If you have changed these settings and want to return to the default settings, select
Load Default Settings on the Exit menu.
Advanced settings
On some computer models the Advanced settings menu includes a setting to
Enable/Disable HyperThreading. This feature works only with
HyperThreading-aware operating systems such as Microsoft Windows XP. The
default setting for HyperThreading is Enabled. However, if you select Set Defaults
and are using an operating system other than Windows XP, your computer
performance might be degraded. Therefore, you should always set
HyperThreading to Disabled unless you are sure your operating system supports
HyperThreading.
28 User Guide
Appendix A. Updating POST/BIOS
This appendix contains information about updating POST/BIOS and how to
recover from a POST/BIOS update failure.
POST/BIOS
POST and BIOS are the basic layer of software that is built into your computer.
They include the power-on self-test (POST), the basic input/output system (BIOS)
code, and the IBM Setup Utility program. POST is a set of tests and procedures
that is performed each time you turn on your computer. BIOS is a layer of
software that translates instructions from other layers of software into electrical
signals that the computer hardware can understand. You can use the IBM Setup
Utility program to view and change the configuration and setup of your computer.
Your computer system board has a module called electrically erasable programmable
read-only memory (EEPROM, also referred to as flash memory). You can easily update
POST, BIOS, and the IBM Setup Utility program by starting your computer using a
flash update diskette or by running a special update program from your operating
system.
IBM might make changes and enhancements to the POST/BIOS. When updates are
released, they are available as downloadable files on the World Wide Web (see the
Quick Reference). Instructions for using the POST/BIOS updates are available in a
.txt file that is included with the update files. For most models, you can download
either an update program to create a system-program-update (flash) diskette or an
update program that can be run from the operating system.
Note: You can download a self starting bootable CD image (known as an .iso
to support systems without a diskette drive.
Updating (flashing) BIOS from a diskette
1. Insert a POST/BIOS update (flash) diskette into the diskette drive (drive A) in
your computer. POST/BIOS updates are available at
2. Turn on the computer. If it is on already, you must turn it off and back on
again. The update begins.
Updating (flashing) BIOS from your operating system
Note: Due to constant improvements being made to the IBM Web site, Web page
content (including the links referenced in the following procedure) is subject
to change.
and press Enter.
2. Locate Downloadable files for your type of computer.
3. Under Select your product, choose your machine type and click Go.
4. In Downloadable file by category, click BIOS.
5. Under Download files - BIOS by date, click your machine type.
© Copyright IBM Corp. 2004
29
6. Scroll down and look for a .txt file that has instructions for Flash BIOS update
from the operating system. Click the .txt file.
7. Print these instructions. This is very important since they are not on the screen
after the download begins.
8. From your browser, Click Back to return to the list of files. Carefully follow the
printed instructions to download, extract, and install the update.
Recovering from a POST/BIOS update failure
If power to your computer is interrupted while POST/BIOS is being updated (flash
update), your computer might not restart correctly. If this happens, perform the
following procedure commonly called Boot-block Recovery.
1. Turn off the computer and any attached devices, such as printers, monitors,
and external drives.
2. Unplug all power cords from electrical outlets, and open the cover. See
3. Locate the Clear CMOS/BIOS Recovery jumper on the system board. See
page 14 to gain access to the Clear CMOS/BIOS Recovery jumper.
5. Remove any cables or adapters that impede access to the Clear CMOS/BIOS
Recovery jumper.
6. Move the jumper from the standard position (pins 1 and 2) to pins 2 and 3.
7. Replace any cables or adapters that were removed.
9. Reconnect the power cords for the computer and monitor to electrical outlets.
10. Insert the POST/BIOS update (flash) diskette into drive A, and turn on the
computer and the monitor.
11. During the update session there will be no video. You will hear a long beep
when recovery is completed. Remove the diskette from the diskette drive, and
turn off the computer and monitor.
12. Unplug the power cords from electrical outlets.
14. Remove any cables or adapters that impede access to the Clear CMOS/BIOS
Recovery jumper.
15. Replace the Clear CMOS/BIOS Recovery jumper to its original position.
16. Replace any cables or adapters that were removed.
17. Close the cover and reconnect any cables that were disconnected.
18. Turn on the computer to restart the operating system.
30 User Guide
Appendix B. Cleaning the mouse
This appendix provides instructions on how to clean your mouse. The procedure
will be different depending on which type of mouse you have.
Cleaning an optical mouse
If you experience some problems with your optical mouse, check the following:
1. Turn the mouse over and look carefully at the lens area.
a. If there is a smudge on the lens, gently clean the area with a plain cotton
swab or plain q-tip.
b. If there is some debris in the lens, gently blow the debris away from the
area.
2. Check the surface you are using the mouse on. If you have a very intricate
picture or pattern beneath the mouse it is difficult for the digital signal
processor (DSP) to determine changes in the mouse position.
Cleaning a mouse with a ball
If the pointer on the screen does not move smoothly with the mouse, you might
need to clean the mouse.
Note: The following illustration might be slightly different from your mouse.
ꢀ1ꢁ Retainer ring
ꢀ2ꢁ Ball
ꢀ3ꢁ Plastic rollers
ꢀ4ꢁ Ball cage
© Copyright IBM Corp. 2004
31
To clean a mouse with a ball:
1. Turn off your computer.
2. Turn the mouse over, with the top side down, and look carefully at the bottom.
Twist the retainer ringꢀ1ꢁto the unlocked position to remove the ball.
3. Place your hand over the retainer ring and ballꢀ2ꢁ, and then turn the mouse
over, top side up, so that the retainer ring and ball fall out into your hand.
4. Wash the ball in warm, soapy water then dry it with a clean cloth. Blow air
carefully into the ball cageꢀ4ꢁto dislodge dust and lint.
5. Look for a build up of dirt on the plastic rollersꢀ3ꢁinside the ball cage. This
build up usually appears as a stripe running across the middle of the rollers.
6. If the rollers are dirty, clean them by using a cotton swab soaked in isopropyl
(rubbing) alcohol. Turn the rollers with your finger and continue swabbing
them until all the dirt is removed. Be sure the rollers are still centered in their
channels after you clean them.
7. Remove any fibers from the swab that might be remaining on the rollers.
8. Replace the ball and the retainer ring.
9. Turn your computer back on.
32 User Guide
Appendix C. Manual modem commands
The following section lists commands for manually programming your modem.
Commands are accepted by the modem while it is in Command Mode. Your
modem is automatically in Command Mode until you dial a number and establish
a connection. Commands may be sent to your modem from a PC running
communication software or any other terminal devices.
All commands sent to the modem must begin with AT and end with ENTER. All
commands may be typed in either upper or lower case, but not mixed. To make
the command line more readable, spaces may be inserted between commands. If
you omit a parameter from a command that requires one, it is just like specifying a
parameter of 0.
Example:
ATH [ENTER]
Basic AT commands
In the following listings, all default settings are printed in bold text.
Command
Function
A
Manually answer incoming call.
A/
Repeat last command executed. Do not
precede A/ with AT or follow with ENTER.
D_
0 - 9, A-D, # and *
last number redial
pulse dialing
L
P
Note: Pulse dialing is not supported for
Australia, New Zealand, Norway, and South
Africa.
T
W
,
touch-tone dialing
wait for second dial tone
pause
@
!
wait for five seconds of silence
flash
;
return to Command Mode after dialing
DS=n
E_
Dial one of the four telephone numbers
(n=0-3) stored in the modem non-volatile
memory.
E0
Commands are not echoed
E1
Commands are echoed
+++
Escape Characters - Switch from Data Mode
to Command Mode (T.I.E.S. Command)
H_
H0
Force modem on-hook (hang up)
© Copyright IBM Corp. 2004
33
Command
I_
Function
H1
Force modem off-hook (make busy)
Note: H1 command is not supported for Italy
Display product-identification code
Factory ROM checksum test
Internal memory test
I0
I1
I2
I3
Firmware ID
I4
Reserved ID
L_
L0
L1
L2
L3
M0
M1
M2
M3
Low speaker volume
Low speaker volume
Medium speaker volume
High speaker volume
M_
Internal speaker off
Internal speaker on until carrier detected
Internal speaker always on
Internal speaker on until carrier detected and
off while dialing
N_
O_
Included for compatibility only, provides no
effect
O0
O1
Return to Data Mode
Return to Data Mode and initiate an equalizer
retrain
P
Set Pulse dial as default
Modem sends responses
Read and display value in register r.
Set register r to value n (n = 0-255).
Set Tone Dial as default
Numeric responses
Q_
Sr?
Sr=n
T
Q0
V_
V0
V1
W0
W1
Word responses
W_
X_
Report DTE speed only
Report line speed, error correction protocol,
and DTE speed.
W2
X0
Report DCE speed only
Hayes Smartmodem 300 compatible
responses/blind dialing.
X1
Same as X0 plus all CONNECT
responses/blind dialing
X2
X3
X4
Same as X1 plus dial tone detection
Same as X1 plus busy detection/blind dialing
All responses and dial tone and busy signal
detection
Z_
Z0
Z1
Reset and retrieve active profile 0
Reset and retrieve active profile 1
34 User Guide
Extended AT commands
Command
&C_
Function
&C0
&C1
&D0
&D1
Force Carrier Detect Signal High (ON)
Turn on CD when remote carrier is present
Modem ignores the DTR signal
&D_
Modem returns to Command Mode after DTR
toggle
&D2
Modem hangs up, returns to the Command
Mode after DTR toggle
&D3
&F
Resets modem after DTR toggle
Recall factory default configuration
Guard tone disabled
&F_
&G_
&G0
&G1
&G2
&K0
&K3
&K4
&K5
&K6
Guard tone disabled
1800 Hz guard tone
&K_
Disable flow control
Enable RTS/CTS hardware flow control
Enable XON/XOFF software flow control
Enable transparent XON/XOFF flow control
Enable both RTS/CTS and XON/XOFF flow
control
&M_
&P_
&M0
&P0
&P1
&P2
Asynchronous operation
US setting for off-hook-to-on-hook ratio
UK and Hong Kong off-hook-to-on-hook ratio
Same as &P0 setting but at 20 pulses per
minute
&P3
Same as &P1 setting but at 20 pulses per
minute
&R_
&S_
&R0
&R1
&S0
&S1
Reserved
CTS operates per flow control requirements
Force DSR Signal High (ON)
DSR off in command mode, on in on-line
mode
&T_
&T0
&T1
&T3
&T4
Ends test in progress
Perform Local Analog Loopback Test
Perform Local Digital Loopback Test
Grant Remote Digital Loopback Test request
by remote modem
&T5
&T6
&T7
Deny Remote Digital Loopback Test request
Perform a Remote Digital Loopback Test
Perform a Remote Digital Loopback Test and
Self-Test
&T8
&V0
Perform Local Analog Loopback Test and
Self-Test
&V
Displays Active and Stored Profiles
Appendix C. Manual modem commands 35
Command
&W_
Function
&V1
&W0
&W1
%E0
%E1
Display Last Connection Statistics
Stores the active profile as Profile 0
Stores the active profile as Profile 1
Disable auto-retrain
%E_
Enable auto-retrain
+MS?
Displays the current Select Modulation
settings
+MS=?
Displays a list of supported Select Modulation
options
+MS=a,b,c,e,f
Select modulation where: a=0, 1, 2, 3, 9, 10, 11,
12, 56, 64, 69; b=0-1; c=300-56000; d=300-
56000; e=0-1; and f=0-1. A, b, c, d, e, f
default=12, 1, 300, 56000, 0, 0. Parameter “a”
specifies the modulation protocol desired
where: 0=V.21, 1=V.22, 2=V.22bis, 3=V.23,
9=V.32, 10=V.32bis, 11=V.34,
12=V.90,K56Flex,V.34......,56=K 56Flex,
V.90,V.34......, 64=Bell 103, and 69=Bell 212.
Parameter “b” specifies automode operations
where: 0=automode disabled, 1= automode
enabled with V.8/V.32 Annex A. Parameter
“c” specifies the minimum connection data
rate (300- 56000). Parameter “d” specifies the
maximum connection rate (300-56000);
Parameter “e” specifies the codec type (0=
Law, and 1=A-Law). Parameter “f” specifies
“robbed bit” signaling detection (0=detection
disabled 1=detection enabled)
MNP/V.42/V.42bis/V.44 commands
Command
Function
%C_
%C0
%C1
%C2
%C3
&Q0
&Q5
&Q6
Disable MNP Class 5 and V.42bis data compression
Enable MNP Class 5 data compression only
Enable V.42bis data compression only
Enable MNP Class 5 and V.42bis data compression
Direct data link only (same as \N1)
V.42 data link with fallback options
Normal data link only (same as \N0)
Disable V.44
&Q_
+DS44=0, 0
+DS44=3, 0
+DS44?
Enable V.44
Current values
+DS44=?
List of support values
36 User Guide
Fax Class 1 commands
+FAE=n
Data/Fax Auto Answer
Service Class
+FCLASS=n
+FRH=n
+FRM=n
+FRS=n
Receive data with HDLC framing
Receive data
Receive silence
+FTH=n
+FTM=n
+FTS=n
Transmit data with HDLC framing
Transmit data
Stop transmission and wait
Fax Class 2 commands
+FCLASS=n
+FAA=n
+FAXERR
+FBOR
+FBUF?
+FCFR
Services class.
Adaptive answer.
Fax error value.
Phase C data bit order.
Buffer size (read only).
Indicate confirmation to receive.
Service class.
+FCLASS=
+FCON
+FCIG
Facsimile connection response.
Set the polled station identification.
Report the polled station identification.
Capability to receive.
+FCIG:
+FCR
+FCR=
Capability to receive.
+FCSI:
Report the called station ID.
DCE capabilities parameters.
Report current session.
Current session results.
Report remote capabilities.
Current sessions parameters.
Begin or continue phase C receive data.
Data transmission.
+FDCC=
+FDCS:
+FDCS=
+FDIS:
+FDIS=
+FDR
+FDT=
+FDTC:
+FET:
Report the polled station capabilities.
Post page message response.
Transmit page punctuation.
Call termination with status.
Session termination.
+FET=N
+FHNG
+FK
+FLID=
+FLPL
Local ID string.
Document for polling.
+FMDL?
+FMFR?
Identify model.
Identify manufacturer.
Appendix C. Manual modem commands 37
+FPHCTO
+FPOLL
+FPTS:
Phase C time out.
Indicates polling request.
Page transfer status.
Page transfer status.
Identify revision.
+FPTS=
+FREV?
+FSPT
Enable polling.
+FTSI:
Report the transmit station ID.
Voice commands
#BDR
#CID
Select Baud Rate
Enable Caller ID detection and reporting format
Select Data, Fax or Voice/Audio
Identify Model
#CLS
#MDL?
#MFR?
#REV?
#TL
Identify Manufacturer
Identify Revision Level
Audio output transmit level
Query Buffer Size
#VBQ?
#VBS
#VBT
#VCI?
#VLS
#VRA
#VRN
#VRX
#VSDB
#VSK
#VSP
#VSR
#VSS
#VTD
#VTM
#VTS
#VTX
Bits per sample (ADPCM or PCM)
Beep Tone Timer
Identify Compression Method
Voice line select
Ringback goes away timer
Ringback never came timer
Voice Receive Mode
Silence deletion tuner
Buffer skid setting
Silence detection period
Sampling rate selection
Silence deletion tuner
DTMF tone reporting capability
Enable timing mark placement
Generate tone signals
Voice transmit mode
38 User Guide
Attention Switzerland User:
If your Swisscom phone line does not have Taxsignal switched OFF, modem
function may be impaired. The impairment may be resolved by a filter with
the following specifications:
Telekom PTT SCR-BE
Taximpulssperrfilter-12kHz
PTT Art. 444.112.7
Bakom 93.0291.Z.N
Appendix C. Manual modem commands 39
40 User Guide
Appendix D. Notices
IBM may not offer the products, services, or features discussed in this document in
all countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user’s responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may
not apply to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
The products described in this document are not intended for use in implantation
or other life support applications where malfunction may result in injury or death
to persons. The information contained in this document does not affect or change
IBM product specifications or warranties. Nothing in this document shall operate
as an express or implied license or indemnity under the intellectual property rights
of IBM or third parties. All information contained in this document was obtained
in specific environments and is presented as an illustration. The result obtained in
other operating environments may vary.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Any references in this publication to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product, and use of those Web sites is at your own risk.
© Copyright IBM Corp. 2004
41
Trademarks
The following terms are trademarks of the IBM Corporation in the United States or
other countries or both:
IBM
PS/2
ThinkCentre
Wake on LAN
Intel, Celeron, and Pentium are trademarks of Intel Corporation in the United
States, other countries, or both.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in
the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks
of others.
42 User Guide
P
password
power
R
removing and replacing
S
security
selecting
system board
U
updating BIOS
using
V
44 User Guide
ꢀꢁꢂꢃ
Part Number: 19R0474
Printed in USA
(1P) P/N: 19R0474
|