Operating Basics

The numerical values for display are the theoretical maximums for Wireless LAN standards. The actual values may differ.

The transmission speed over the Wireless LAN and the distance over which Wireless LAN can reach may vary depending on surrounding electromagnetic environment, obstacles, access point design and configuration, and client design and software/hardware configurations. The Transmit Rate (at X Mbit/s) is the theoretical maximum speed under the IEEE802.11 (a/b/g) standard. The actual transmission speed will be lower than the theoretical maximum speed.

The Wake-up on Wireless LAN function is effective only when it is connected with AP. This function becomes invalid when the connection is cut.

Wake-up on Wireless LAN function is not available in battery mode.Security

TOSHIBA strongly recommend that you enable WEP (encryption) functionality, otherwise your computer will be open to illegal access by an outsider using a wireless connection. If this occurs, the outsider may illegally access your system, eavesdrop, or cause the loss or destruction of stored data.

TOSHIBA is not liable for the loss of data due to eavesdropping or illegal access through the wireless LAN and the damage thereof.

Bluetooth wireless technology

Bluetooth™ wireless technology eliminates the need for cables between electronic devices such as desktop computers, printers and mobile phones.

You cannot use the built-in Bluetooth functions and an optional Bluetooth SD card 3 simultaneously.

Bluetooth wireless technology has the following features:Worldwide operation

The Bluetooth radio transmitter and receiver operate in the 2.4 GHz band, which is license-free and compatible with radio systems in most countries in the world.

Radio links

You can easily establish links between two or more devices. The link is maintained even if the devices are not within line of sight.

Security

Two advanced security mechanisms ensure a high level of security:

Authentication prevents access to critical data and makes it impossible to falsify the origin of a message.

Encryption prevents eavesdropping and maintains link privacy.

4-32

User’s Manual