Toshiba Satellite E100 PSE10C Users Manual Canada; English - Page 93

Bluetooth, Wireless Technology, Security, Worldwide Operation, Radio Links

Page 93 highlights

Operating Basics ■ Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit encryption algorithm (Atheros module type). ■ 11a, 11b, 11g and 11n wireless are based on IEEE 802.11a, 802.11b, 802.11g and 802.11n respectively. The IEEE 802.11n specification has not been finalized and is currently in draft release. The TOSHIBA 11a/b/g/n Wireless LAN Adaptors are based on the draft release version 2.0, of the IEEE 802.11n specification. An adaptor with 11a/b, 11a/b/g or 11a/b/g/n can communicate on any of its supported formats; the actual connection will be based on the access point to which it connects. ■ Connection compatibility with the wireless equipment in draft 11n mode is not guaranteed. ■ The draft 11n function cannot be used with WEP/TKIP. Draft 11n mode can be used only with WPA-PSK(AES) mode or no security mode. Security ■ Be sure to enable encryption function. Otherwise your computer will allow the illegal access by outsider through Wireless LAN to cause illegal instruction, eavesdropping, and loss or destruction of stored data. TOSHIBA strongly recommends the customer to enable the encryption function. ■ TOSHIBA is not liable for the eavesdropping of data due to the use of Wireless LAN and the damage thereof. BluetoothTM Wireless Technology BluetoothTM wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones. You cannot use the built-in Bluetooth functions and an optional Bluetooth Adaptor simultaneously. BluetoothTM wireless technology has the following features: Worldwide Operation The Bluetooth radio transmitter and receiver operates in the 2.45 GHz band, which is license-free and compatible with radio systems in most countries in the world. Radio Links You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight. Security Two advanced security mechanisms ensure a high level of security: ■ Authentication prevents access to critical data and makes it impossible to falsify the origin of a message. ■ Encryption prevents eavesdropping and maintains link privacy. User's Manual 4-34

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195

User’s Manual
4-34
Operating Basics
Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit
encryption algorithm (Atheros module type).
11a, 11b, 11g and 11n wireless are based on IEEE 802.11a, 802.11b,
802.11g and 802.11n respectively. The IEEE 802.11n specification has
not been finalized and is currently in draft release. The TOSHIBA
11a/b/g/n Wireless LAN Adaptors are based on the draft release version
2.0, of the IEEE 802.11n specification. An adaptor with 11a/b, 11a/b/g or
11a/b/g/n can communicate on any of its supported formats; the actual
connection will be based on the access point to which it connects.
Connection compatibility with the wireless equipment in draft 11n mode
is not guaranteed.
The draft 11n function cannot be used with WEP/TKIP. Draft 11n mode
can be used only with WPA-PSK(AES) mode or no security mode.
Security
Be sure to enable encryption function. Otherwise your computer will
allow the illegal access by outsider through Wireless LAN to cause
illegal instruction, eavesdropping, and loss or destruction of stored data.
TOSHIBA strongly recommends the customer to enable the encryption
function.
TOSHIBA is not liable for the eavesdropping of data due to the use of
Wireless LAN and the damage thereof.
Bluetooth
TM
Wireless Technology
Bluetooth
TM
wireless technology eliminates the need for cables between
electronic devices such as desktop computers, printers and mobile phones.
You cannot use the built-in Bluetooth functions and an optional Bluetooth
Adaptor simultaneously.
Bluetooth
TM
wireless technology has the following features:
Worldwide Operation
The Bluetooth radio transmitter and receiver operates in the 2.45 GHz
band, which is license-free and compatible with radio systems in most
countries in the world.
Radio Links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
Encryption prevents eavesdropping and maintains link privacy.