Operating Basics

11a, 11b, 11g and 11n wireless are based on IEEE 802.11a, 802.11b, 802.11g and 802.11n respectively. The IEEE 802.11n specification has not been finalized and is currently in draft release. The TOSHIBA 11a/b/g/n Wireless LAN Adapters are based on the Draft Release, Version 1.0, of the IEEE 802.11n specification. An Adapter with 11a/b, 11a/b/g or 11a/b/g/n can communicate on any of its supported formats; the actual connection will be based on the access point to which it connects.

Connection compatibility with the wireless equipment in Draft 11n mode is not guaranteed.

The Draft 11n function cannot be used with WEP/TKIP. Draft 11n mode can be used only with WPA-PSK (AES) mode or no security mode.

Security

1.TOSHIBA strongly recommends that you enable the WPA encryption function otherwise your computer could be left open to illicit access via the wireless LAN connection which may result in an intrusion that can lead to the theft or loss of stored data among other things. In addition, the owner of an Internet connection is responsible for all browsing, downloading, and uploading activities on that connection. Therefore, an unsecured wireless network connected directly to the Internet is an open invitation for outsiders to abuse your ISP account and privileges.

2.TOSHIBA is not liable for the eavesdropping on your data due to the use of the wireless LAN connection and any damage that may occur thereof.

Bluetooth wireless technology

Bluetooth® wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones.

Bluetooth wireless technology has the following features:Worldwide operation

The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band, which is license-free and compatible with radio systems in most countries in the world.

Radio links

You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight.

Security

Two advanced security mechanisms ensure a high level of security:

Authentication prevents access to critical data and makes it impossible to falsify the origin of a message.

Encryption prevents eavesdropping and maintains link privacy.

User’s Manual

4-9