Bluetooth Wireless Technology - Toshiba TECRA M3 User Manual

Portable personal computer
Hide thumbs Also See for TECRA M3:
Table of Contents

Advertisement

The numerical values for display are the theoretical maximums for
Wireless LAN standards. The actual values may differ.
The transmission speed over the wireless LAN and the distance over
which wireless LAN can reach may vary depending on surrounding
electromagnetic environment, obstacles, access point design and
configuration, and client design and software/hardware configurations.
The Transmit Rate (at X Mbit/s) is the theoretical maximum speed
under the IEEE802.11 (a/b/g) standard. The actual transmission speed
will be lower than the theoretical maximum speed. To use the Atheros
SuperAG
corresponding feature. Performance of these functions may vary
depending on the format of data transmitted.
Security
Be sure to enable WEP (encryption) function. Otherwise your computer
will allow the illegal access by outsider through Wireless LAN to cause
illegal intrusion, eavesdropping, and loss or destruction of stored data.
TOSHIBA strongly recommend the customer to enable the WEP
function.
TOSHIBA is not liable for the eavesdropping of data due to the use of
Wireless LAN and the damage thereof.

Bluetooth wireless technology

Bluetooth™ wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the built-in Bluetooth functions and an optional Bluetooth
SD card 2 simultaneously.
Bluetooth wireless technology has the following features:
Worldwide operation
The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band,
which is license-free and compatible with radio systems in most countries
in the world.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.
User's Manual
TM
function, your client and access point must support the
Operating Basics
4-27

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ptm30

Table of Contents