Bluetooth Wireless Technology - Toshiba Tecra M3-105 User Manual

Portable personal computer
Table of Contents

Advertisement

Operating Basics
The numerical values for display are the theoretical maximums for
Wireless LAN standards. The actual values may differ.
The transmission speed over the wireless LAN and the distance over
which wireless LAN can reach may vary depending on surrounding
electromagnetic environment, obstacles, access point design and
configuration, and client design and software/hardware configurations.
The Transmit Rate (xx Mbit/s) is the theoretical maximum speed under
the IEEE802.11 (a/b/g) standard. The actual transmission speed will be
lower than the theoretical maximum speed. To use the Atheros
SuperAG
corresponding feature. Performance of these functions may vary
depending on the format of data transmitted.
Security
Be sure to enable WEP (encryption) function. Otherwise your computer
will allow the illegal access by outsider through Wireless LAN to cause
illegal intrusion, eavesdropping, and loss or destruction of stored data.
TOSHIBA strongly recommend the customer to enable the WEP
function.
TOSHIBA is not liable for the eavesdropping of data due to the use of
Wireless LAN and the damage thereof.

Bluetooth wireless technology

Bluetooth™ wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the built-in Bluetooth functions and an optional Bluetooth
SD card 2 simultaneously.
Bluetooth wireless technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
4-28
function, your client and access point must support the
TM
User's Manual

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tecra m3-336Tecra m3-138Tecra m3-sp719Tecra m3

Table of Contents