Toshiba Satellite E100 PSE10C Users Manual Canada; English - Page 93
Bluetooth, Wireless Technology, Security, Worldwide Operation, Radio Links
View all Toshiba Satellite E100 PSE10C manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 93 highlights
Operating Basics ■ Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit encryption algorithm (Atheros module type). ■ 11a, 11b, 11g and 11n wireless are based on IEEE 802.11a, 802.11b, 802.11g and 802.11n respectively. The IEEE 802.11n specification has not been finalized and is currently in draft release. The TOSHIBA 11a/b/g/n Wireless LAN Adaptors are based on the draft release version 2.0, of the IEEE 802.11n specification. An adaptor with 11a/b, 11a/b/g or 11a/b/g/n can communicate on any of its supported formats; the actual connection will be based on the access point to which it connects. ■ Connection compatibility with the wireless equipment in draft 11n mode is not guaranteed. ■ The draft 11n function cannot be used with WEP/TKIP. Draft 11n mode can be used only with WPA-PSK(AES) mode or no security mode. Security ■ Be sure to enable encryption function. Otherwise your computer will allow the illegal access by outsider through Wireless LAN to cause illegal instruction, eavesdropping, and loss or destruction of stored data. TOSHIBA strongly recommends the customer to enable the encryption function. ■ TOSHIBA is not liable for the eavesdropping of data due to the use of Wireless LAN and the damage thereof. BluetoothTM Wireless Technology BluetoothTM wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the built-in Bluetooth functions and an optional Bluetooth Adaptor simultaneously. BluetoothTM wireless technology has the following features: Worldwide Operation The Bluetooth radio transmitter and receiver operates in the 2.45 GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio Links You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. User's Manual 4-34