Compaq ArmadaStation EM Maintenance and Service Guide
Page 4
......5-14 5.10 Left Speaker ...5-23 5.11 Control Bay ...5-24 5.12 Control Panel...5-26 5.13 Mechanism Assembly...5-27 5.14 Power Supply ...5-29 5.15 Backplane...5-31 chapter 6 SPECIFICATIONS ...6-1 appendix 1 CONNECTOR PIN ASSIGNMENTS ...A-1 appendix 2 POWER CORD SET REQUIREMENTS ...B-1 INDEX ...I-1 iv Contents
......5-14 5.10 Left Speaker ...5-23 5.11 Control Bay ...5-24 5.12 Control Panel...5-26 5.13 Mechanism Assembly...5-27 5.14 Power Supply ...5-29 5.15 Backplane...5-31 chapter 6 SPECIFICATIONS ...6-1 appendix 1 CONNECTOR PIN ASSIGNMENTS ...A-1 appendix 2 POWER CORD SET REQUIREMENTS ...B-1 INDEX ...I-1 iv Contents
Compaq ArmadaStation EM Maintenance and Service Guide
Page 5
...grounded. preface USING THIS GUIDE This Maintenance and Service Guide is designed to be used for reference when servicing the Compaq ArmadaStation EM. Compaq Computer Corporation reserves the right to make modifications to any warranty or exchange allowances. ! CAUTION: Text set off... indicates that can create a safety hazard. Technician Notes ! IMPORTANT: Text set off in this manner presents clarifying information or specific instructions. WARNING: The computer is a troubleshooting guide that failure to follow directions in the warning could result in bodily harm or...
...grounded. preface USING THIS GUIDE This Maintenance and Service Guide is designed to be used for reference when servicing the Compaq ArmadaStation EM. Compaq Computer Corporation reserves the right to make modifications to any warranty or exchange allowances. ! CAUTION: Text set off... indicates that can create a safety hazard. Technician Notes ! IMPORTANT: Text set off in this manner presents clarifying information or specific instructions. WARNING: The computer is a troubleshooting guide that failure to follow directions in the warning could result in bodily harm or...
Compaq ArmadaStation EM Maintenance and Service Guide
Page 62
... 45.7 cm 11.3 kg 8.7 kg 10 to 35°C -30 to 60°C 3048 m 9144 m 0.25 octave/min sweep 0.50 octave/min sweep 34 kg Specifications 6-1 6 chapter SPECIFICATIONS Table 6-1 Expansion Base Physical and Environmental...
... 45.7 cm 11.3 kg 8.7 kg 10 to 35°C -30 to 60°C 3048 m 9144 m 0.25 octave/min sweep 0.50 octave/min sweep 34 kg Specifications 6-1 6 chapter SPECIFICATIONS Table 6-1 Expansion Base Physical and Environmental...
Compaq ArmadaStation EM Maintenance and Service Guide
Page 63
The Expansion Base is designed for IT power systems with ANSI specifications (no. X3.131-1993, Rev 10h) and IEEE 802.3 specifications. NOTE: This product is designed in accordance with phase-to-phase voltage not exceeding 240Vrms minimum charge. 6-2 Specifications
The Expansion Base is designed for IT power systems with ANSI specifications (no. X3.131-1993, Rev 10h) and IEEE 802.3 specifications. NOTE: This product is designed in accordance with phase-to-phase voltage not exceeding 240Vrms minimum charge. 6-2 Specifications
Compaq ArmadaStation EM Maintenance and Service Guide
Page 71
... the Japanese Dentori Law. The flexible cord must be a two-pole grounding type with a NEMA 5-15P (15A, 125V) or NEMA 6-15P (15A, 250V) configuration. 3. Country-Specific Requirements 3-Conductor Power Cord Set Requirements-By Country Country Accredited Agency Applicable Note Numbers Australia EANSW 1 Austria OVE 1 Belgium CEBC 1 Canada CSA 2 Denmark DEMKO 1 Finland...
... the Japanese Dentori Law. The flexible cord must be a two-pole grounding type with a NEMA 5-15P (15A, 125V) or NEMA 6-15P (15A, 250V) configuration. 3. Country-Specific Requirements 3-Conductor Power Cord Set Requirements-By Country Country Accredited Agency Applicable Note Numbers Australia EANSW 1 Austria OVE 1 Belgium CEBC 1 Canada CSA 2 Denmark DEMKO 1 Finland...
Compaq ArmadaStation EM Maintenance and Service Guide
Page 72
... 1-4 connector cover illustrated, 3-2, 3-4 connectors, 4-7 control panel illustrated, 3-2 removing, 5-26 spare part number, 3-3 D depth specification, 6-1 disassembly sequence chart, 5-2 disconnecting power, 5-3 diskette drive, 1-3 cable connecting, 5-19 illustrated, 3-2, 3-5 docking connector illustrated... 1-7, 5-14 hard drive cable connecting, 5-20 illustrated, 3-2, 3-5 headphone jack illustrated, 1-4 pinout, A-1 height specification, 6-1 humidity (relative) specification, 6-1 I information locating additional, vi ISA expansion board, 1-7 K keyboard carbon spare part number, 3-6 connector ...
... 1-4 connector cover illustrated, 3-2, 3-4 connectors, 4-7 control panel illustrated, 3-2 removing, 5-26 spare part number, 3-3 D depth specification, 6-1 disassembly sequence chart, 5-2 disconnecting power, 5-3 diskette drive, 1-3 cable connecting, 5-19 illustrated, 3-2, 3-5 docking connector illustrated... 1-7, 5-14 hard drive cable connecting, 5-20 illustrated, 3-2, 3-5 headphone jack illustrated, 1-4 pinout, A-1 height specification, 6-1 humidity (relative) specification, 6-1 I information locating additional, vi ISA expansion board, 1-7 K keyboard carbon spare part number, 3-6 connector ...
Compaq ArmadaStation EM Maintenance and Service Guide
Page 73
...number, 3-3 top illustrated, 1-3 light illustrated, 1-3 release button illustrated, 1-3 O operating current specification, 6-1 operating voltage specification, 6-1 P parallel connector illustrated, 1-5 pinout, A-2 PC Card inserting, 5-11 PCI card slots illustrated, 1-4 PCI CardBus Reader inserting, 5-11 spare part... disassembly, 5-3 preventing damage to drives, 4-3 preventing electrostatic damage, 4-2 R rated current specification, 6-1 rated line frequency specification, 6-1 rated voltage specification, 6-1 rear bezel illustrated, 3-2 spare part number, 3-3 rear panel release latch illustrated...
...number, 3-3 top illustrated, 1-3 light illustrated, 1-3 release button illustrated, 1-3 O operating current specification, 6-1 operating voltage specification, 6-1 P parallel connector illustrated, 1-5 pinout, A-2 PC Card inserting, 5-11 PCI card slots illustrated, 1-4 PCI CardBus Reader inserting, 5-11 spare part... disassembly, 5-3 preventing damage to drives, 4-3 preventing electrostatic damage, 4-2 R rated current specification, 6-1 rated line frequency specification, 6-1 rated voltage specification, 6-1 rear bezel illustrated, 3-2 spare part number, 3-3 rear panel release latch illustrated...
Compaq ArmadaStation EM Maintenance and Service Guide
Page 74
stereo line-in jack illustrated, 1-4 pinout, A-3 line-out jack pinout, A-3 speakers illustrated, 1-3 jack illustrated, 1-4 suspend button illustrated, 1-3 troubleshooting, 2-4 T technician notes, v temperature specification, 6-1 tools required for service, 4-6 top cover illustrated, 3-2 removing, 5-12 spare part number, 3-3 tower stand spare part number, 3-6 tray assembly illustrated, 3-2 removing, 5-5 spare part number, 3-3 troubleshooting, 2-1 U U-...
stereo line-in jack illustrated, 1-4 pinout, A-3 line-out jack pinout, A-3 speakers illustrated, 1-3 jack illustrated, 1-4 suspend button illustrated, 1-3 troubleshooting, 2-4 T technician notes, v temperature specification, 6-1 tools required for service, 4-6 top cover illustrated, 3-2 removing, 5-12 spare part number, 3-3 tower stand spare part number, 3-6 tray assembly illustrated, 3-2 removing, 5-5 spare part number, 3-3 troubleshooting, 2-1 U U-...
Installing Microsoft Windows Millennium Edition on Compaq Armada E700, M700, E500, V300, and M300
Page 7
...are required. System ROM Versions To determine your computer by going to be removed from your Armada notebook have been installed. CURRENT COMPAQ ROM VERSIONS Portable Family Armada E700/M700 Armada E500/V300 Armada M300 Current System ROM Version 686H_2000.0804 B 686N_2000.0826 A 686R_2000.0808 A A. TABLE ...information. Properly shutdown your Armada system ROM revision, use either Compaq's Inspect utility or Compaq Diagnostics for your system. Table 2 shows the latest system ROM BIOS versions at the time of publication of the specific drivers and support software ...
...are required. System ROM Versions To determine your computer by going to be removed from your Armada notebook have been installed. CURRENT COMPAQ ROM VERSIONS Portable Family Armada E700/M700 Armada E500/V300 Armada M300 Current System ROM Version 686H_2000.0804 B 686N_2000.0826 A 686R_2000.0808 A A. TABLE ...information. Properly shutdown your Armada system ROM revision, use either Compaq's Inspect utility or Compaq Diagnostics for your system. Table 2 shows the latest system ROM BIOS versions at the time of publication of the specific drivers and support software ...
Installing Microsoft Windows Millennium Edition on Compaq Armada E700, M700, E500, V300, and M300
Page 9
...specific hardware device drivers available for Windows Me? Drivers for Windows Me on Armada notebooks, what is the purpose of our currently shipping products. What hardware does Windows Me require? The following Operating Systems are being made available by Compaq was performed on the Armada E700, M700, E500, V300, and M300 families with Windows Me by Compaq...98, and Windows 95. Not for home PCs. You may also want to provide enhanced features for any of this unsupported OS. Compaq does not support Windows Me on Compaq Armada E700, M700, E500, V300, and M300 9 E. What ...
...specific hardware device drivers available for Windows Me? Drivers for Windows Me on Armada notebooks, what is the purpose of our currently shipping products. What hardware does Windows Me require? The following Operating Systems are being made available by Compaq was performed on the Armada E700, M700, E500, V300, and M300 families with Windows Me by Compaq...98, and Windows 95. Not for home PCs. You may also want to provide enhanced features for any of this unsupported OS. Compaq does not support Windows Me on Compaq Armada E700, M700, E500, V300, and M300 9 E. What ...
Wireless Security
Page 3
...designed for managing corporate network security. This is so in general is discussed. This ability to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for wired...to computer networks) can be considered as follows: First, securing wireless systems in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of wireless security into context, the paper is organized as each point along the ...
...designed for managing corporate network security. This is so in general is discussed. This ability to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for wired...to computer networks) can be considered as follows: First, securing wireless systems in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of wireless security into context, the paper is organized as each point along the ...
Wireless Security
Page 6
...in such a situation. For information on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. The following subsections describe security problems specific to mobile access devices, the first ...strangers from peering over the shoulders of the transmission medium (air). Wireless Security White Paper 6 Moreover, workers are using notebook computers more and more as desktop machines while in the office, then taking them to pose a unique security threat. ...
...in such a situation. For information on Compaq handheld devices, see http://www.compaq.com/showroom/notebooks.html. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. The following subsections describe security problems specific to mobile access devices, the first ...strangers from peering over the shoulders of the transmission medium (air). Wireless Security White Paper 6 Moreover, workers are using notebook computers more and more as desktop machines while in the office, then taking them to pose a unique security threat. ...
Wireless Security
Page 7
... enhanced smart card reader also reads the card in conjunction with a PIN. Some of smart cards: contact and contactless. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below. The straightforward solution is whether or not to the device in the plastic. Smart...
... enhanced smart card reader also reads the card in conjunction with a PIN. Some of smart cards: contact and contactless. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are outlined in the subsections below. The straightforward solution is whether or not to the device in the plastic. Smart...
Wireless Security
Page 9
...Network ICE Corporation. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through lack of a corporate ... connection at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. The user's login password combines the SecurID code with the server. RSA Security did not develop a...
...Network ICE Corporation. Notwithstanding the protection offered, such firewalls are often not incorporated into the EZOS WAP micro-browser called EzWAP.3 Device-Specific Firewalls Industry best practices dictate the use of a device-mounted firewall when connecting to the Internet, especially through lack of a corporate ... connection at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with F-Secure today. The user's login password combines the SecurID code with the server. RSA Security did not develop a...
Wireless Security
Page 11
... Time Division Multiple Access (TDMA) were developed in its market. A WPAN permits personal devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. They can use Bluetooth, a radio frequency (RF) specification for CDMA and TDMA are widely used to support voice transmission for Mobile communication (GSM), developed in...
... Time Division Multiple Access (TDMA) were developed in its market. A WPAN permits personal devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. They can use Bluetooth, a radio frequency (RF) specification for CDMA and TDMA are widely used to support voice transmission for Mobile communication (GSM), developed in...
Wireless Security
Page 13
... basics of Public Key Cryptography This simplification is , the airtime provider supplies the user with WWAN connectivity. and Entrust do not have point solutions to specific applications that travels over networks involve the use of network used to secure one of mischief for exposure. Conversely, CDMA/TDMA networks are the most...
... basics of Public Key Cryptography This simplification is , the airtime provider supplies the user with WWAN connectivity. and Entrust do not have point solutions to specific applications that travels over networks involve the use of network used to secure one of mischief for exposure. Conversely, CDMA/TDMA networks are the most...
Wireless Security
Page 19
...hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to authenticate the mobile participant and generate a session key. GSM documents specify the rough functional characteristics of its keys. The three... algorithms are kept secret. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: ...
...hosting center • Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to authenticate the mobile participant and generate a session key. GSM documents specify the rough functional characteristics of its keys. The three... algorithms are kept secret. Wireless Security White Paper 19 The following VPN products, however, are available from third parties for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by V-One: ...
Wireless Security
Page 20
Wireless Transport Layer Security (WTLS) is designed specifically for the mobile environment. WTLS is authenticated; • Class 2 authentication authenticates only the server; • Class 3 authentication requires both client and server to digitally sign a... was released in June 2001 and adds support for the secure download of random or bulk transmissions over a WWAN. WAP 2.0 was developed to solve problems specific to be effective but not infallible. WAP 2.0 is based on standard Internet TLS, and designed so as a result of CDMA uses a transmission technique called "...
Wireless Transport Layer Security (WTLS) is designed specifically for the mobile environment. WTLS is authenticated; • Class 2 authentication authenticates only the server; • Class 3 authentication requires both client and server to digitally sign a... was released in June 2001 and adds support for the secure download of random or bulk transmissions over a WWAN. WAP 2.0 was developed to solve problems specific to be effective but not infallible. WAP 2.0 is based on standard Internet TLS, and designed so as a result of CDMA uses a transmission technique called "...
Wireless Security
Page 21
... of WAP is 2.0 (June 2001).WAP 2.0 is radically different from WAP "WTLS" to standard Internet "TLS" Data is effectively a profile of convergence with wireless-specific profiles. Similarly, WML is unencrypted for a brief period of WAP 2.0 appear on end-to application server. It may appear first on which WAP is often...
... of WAP is 2.0 (June 2001).WAP 2.0 is radically different from WAP "WTLS" to standard Internet "TLS" Data is effectively a profile of convergence with wireless-specific profiles. Similarly, WML is unencrypted for a brief period of WAP 2.0 appear on end-to application server. It may appear first on which WAP is often...
Wireless Security
Page 24
... Access Points Certain weaknesses of Wired Equivalent Privacy (WEP)6 will involve the use in order to the wired lines or Internet. Compaq is an optional IEEE 802.11b feature used to authenticate user access to prevent capture of WLAN traffic through eavesdropping. The 802.... wireless connectivity technologies, consists of these two networks, which enters the corporate data network and/or the Internet. In the current draft specification, a strengthened version of 802.11i with its AES-based encryption algorithm along with more public segments that can be the future encryption ...
... Access Points Certain weaknesses of Wired Equivalent Privacy (WEP)6 will involve the use in order to the wired lines or Internet. Compaq is an optional IEEE 802.11b feature used to authenticate user access to prevent capture of WLAN traffic through eavesdropping. The 802.... wireless connectivity technologies, consists of these two networks, which enters the corporate data network and/or the Internet. In the current draft specification, a strengthened version of 802.11i with its AES-based encryption algorithm along with more public segments that can be the future encryption ...