Lenovo ThinkPad X1 Carbon (English) User Guide - Page 44

Establishing wireless LAN connections - delay

Page 44 highlights

Wireless WAN A wireless WAN covers a broader geographic area. Cellular networks are used for data transmission, and access is provided by a wireless service carrier. Bluetooth Bluetooth is one of a number of technologies used to create a wireless personal area network. Bluetooth can connect devices a short distance from one another, and is commonly used for connecting peripheral devices to a computer, transferring data between hand-held devices and a personal computer, or remotely controlling and communicating with devices such as mobile phones. Establishing wireless LAN connections Your computer comes with a small form factor built-in wireless network card and a configuration utility to help you make wireless connections and monitor the status of your connection, so that you can stay connected to your network while you are in the office, in a meeting room, or at home, with no need for a wired connection. Attention: • If you carry your computer with the wireless LAN feature into an airplane, check the services with the airline before boarding the airplane. • If there are restrictions on the use of computers on an airplane with the wireless feature, you need to disable it before boarding. Note: You can purchase a wireless network card as an option from Lenovo at http://www.lenovo.com/accessories/services/index.html. Tips for using the wireless LAN feature • Place your computer so that there are as few obstacles as possible between the wireless LAN access point and the computer. • To achieve the best wireless connection, open your computer display to an angle slightly greater than 90 degrees. • If you use the wireless feature (the 802.11 standard) of your computer simultaneously with a Bluetooth option, data transmission speed can be delayed and the performance of the wireless feature can be degraded. Wireless network setup To use the built-in wireless network card (the 802.11 standard) to communicate, start the Access Connections program. See "Accessing ThinkVantage programs" on page 12. Note: Before you start setting up wireless network connections by using the Access Connections program, obtain a Network Name (SSID) and your encryption information from your network administrator. Wireless security features Advances in wireless technology require that we manage your security more reliably than ever. Therefore, Lenovo has extended its Embedded Security Subsystem called the Trusted Platform Module (TPM) to encompass virtually all of our ThinkPad and desktop computer lines. This security subsystem helps protect data, hardware, network access and communications, both wired and wireless, on select ThinkPad and desktop PCs. The Embedded Security Subsystem provides hardware-based protection of critical security information, including passwords, encryption keys, and electronic credentials. It also helps identify computer users involved in transactions, and helps establish that data transmissions are authentic, confidential and intact. For both types of network, the Client Security Solution and TPM ensure data confidentiality and availability by providing a hardware- and software-based architecture for better protection of the sensitive keys, identity 30 User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

Wireless WAN
A wireless WAN covers a broader geographic area. Cellular networks are used for data transmission, and
access is provided by a wireless service carrier.
Bluetooth
Bluetooth is one of a number of technologies used to create a wireless personal area network. Bluetooth
can connect devices a short distance from one another, and is commonly used for connecting peripheral
devices to a computer, transferring data between hand-held devices and a personal computer, or remotely
controlling and communicating with devices such as mobile phones.
Establishing wireless LAN connections
Your computer comes with a small form factor built-in wireless network card and a configuration utility to help
you make wireless connections and monitor the status of your connection, so that you can stay connected to
your network while you are in the office, in a meeting room, or at home, with no need for a wired connection.
Attention:
If you carry your computer with the wireless LAN feature into an airplane, check the services with the
airline before boarding the airplane.
If there are restrictions on the use of computers on an airplane with the wireless feature, you need
to disable it before boarding.
Note:
You can purchase a wireless network card as an option from Lenovo at
Tips for using the wireless LAN feature
Place your computer so that there are as few obstacles as possible between the wireless LAN access
point and the computer.
To achieve the best wireless connection, open your computer display to an angle slightly greater than
90 degrees.
If you use the wireless feature (the 802.11 standard) of your computer simultaneously with a Bluetooth
option, data transmission speed can be delayed and the performance of the wireless feature can be
degraded.
Wireless network setup
To use the built-in wireless network card (the 802.11 standard) to communicate, start the Access
Connections program. See “Accessing ThinkVantage programs” on page 12.
Note:
Before you start setting up wireless network connections by using the Access Connections program,
obtain a Network Name (SSID) and your encryption information from your network administrator.
Wireless security features
Advances in wireless technology require that we manage your security more reliably than ever. Therefore,
Lenovo has extended its Embedded Security Subsystem called the Trusted Platform Module (TPM) to
encompass virtually all of our ThinkPad and desktop computer lines. This security subsystem helps protect
data, hardware, network access and communications, both wired and wireless, on select ThinkPad and
desktop PCs.
The Embedded Security Subsystem provides hardware-based protection of critical security information,
including passwords, encryption keys, and electronic credentials. It also helps identify computer users
involved in transactions, and helps establish that data transmissions are authentic, confidential and intact.
For both types of network, the Client Security Solution and TPM ensure data confidentiality and availability
by providing a hardware- and software-based architecture for better protection of the sensitive keys, identity
30
User Guide