HP ENVY 17-3095ca HP Notebook Reference Guide - Windows 7 - Page 16

Roaming to another network, Using GPS (select models only), Using Bluetooth wireless devices

Page 16 highlights

generate a new key for every packet, and they also generate a different set of keys for each computer network. To accomplish this: ◦ WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP) ◦ WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is a new AES protocol. ● Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without the correct key, others will not be able to use the WLAN. Roaming to another network When you move your computer within range of another WLAN, Windows attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If Windows does not recognize the new network, follow the same procedure you used initially to connect to your WLAN. Using GPS (select models only) Your computer may be equipped with a Global Positioning System (GPS). GPS satellites deliver location, speed, and direction information to GPS-equipped systems. For more information, refer to the HP GPS and Location software Help. Using Bluetooth wireless devices A Bluetooth device provides short-range wireless communications that replace the physical cable connections that traditionally link electronic devices such as the following: ● Computers ● Phones ● Imaging devices (cameras and printers) ● Audio devices ● Mouse Bluetooth devices provide peer-to-peer capability that allows you to set up a personal area network (PAN) of Bluetooth devices. For information on configuring and using Bluetooth devices, refer to the Bluetooth software Help. Bluetooth and Internet Connection Sharing (ICS) HP does not recommend setting up one computer with Bluetooth as a host and using it as a gateway through which other computers may connect to the Internet. When two or more computers are connected using Bluetooth, and Internet Connection Sharing (ICS) is enabled on one of the computers, the other computers may not be able to connect to the Internet using the Bluetooth network. The strength of Bluetooth is in synchronizing information transfers between your computer and wireless devices including cellular phones, printers, cameras, and PDAs. The inability to consistently 6 Chapter 2 Networking (select models only)

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71

generate a new key for every packet, and they also generate a different set of keys for each
computer network. To accomplish this:
WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol
(TKIP)
WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which
is a new AES protocol.
Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without
the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, Windows attempts to connect to that
network. If the attempt is successful, your computer is automatically connected to the new network. If
Windows does not recognize the new network, follow the same procedure you used initially to
connect to your WLAN.
Using GPS (select models only)
Your computer may be equipped with a Global Positioning System (GPS). GPS satellites deliver
location, speed, and direction information to GPS-equipped systems.
For more information, refer to the HP GPS and Location software Help.
Using Bluetooth wireless devices
A Bluetooth device provides short-range wireless communications that replace the physical cable
connections that traditionally link electronic devices such as the following:
Computers
Phones
Imaging devices (cameras and printers)
Audio devices
Mouse
Bluetooth devices provide peer-to-peer capability that allows you to set up a personal area network
(PAN) of Bluetooth devices. For information on configuring and using Bluetooth devices, refer to the
Bluetooth software Help.
Bluetooth and Internet Connection Sharing (ICS)
HP does
not
recommend setting up one computer with Bluetooth as a host and using it as a gateway
through which other computers may connect to the Internet. When two or more computers are
connected using Bluetooth, and Internet Connection Sharing (ICS) is enabled on one of the
computers, the other computers may not be able to connect to the Internet using the Bluetooth
network.
The strength of Bluetooth is in synchronizing information transfers between your computer and
wireless devices including cellular phones, printers, cameras, and PDAs. The inability to consistently
6
Chapter 2
Networking (select models only)