User's Manual
IVT BlueSoleilâ„¢ User Manual
All specifications are preliminary and subject to change without notice.
94
Bluetooth LAN Access This is the implementation of the Bluetooth LAN Access profile (LAP).
Using LAP, Bluetooth devices can access Local Area Network via LAN access points.
Bluetooth Object Push This is the implementation of the Bluetooth Object Push profile (OPP).
Using OPP, Bluetooth devices can transfer messages, notes, calendars and cards with each other.
Bluetooth Passkey In the Bluetooth authentication procedure, a Bluetooth passkey is requested on
both connection sides. The same Bluetooth passkey should be input on both sides. If the passkeys
are the same, the authentication procedure is successful and connections can be setup. If the
passkeys are different, the connection and authentication will fail.
Bluetooth Peripheral Device This is the implementation of the Bluetooth Human Interface
Device profile (HID). By using HID, Bluetooth peripheral input devices such as a Bluetooth mouse
or keyboard, can remotely interface with the host computer.
Bluetooth Personal Area Networking This is the implementation of the Bluetooth Personal Area
Networking profile (PAN). Using PAN, Bluetooth devices can connect to each other to form ad-hoc
networks. They can form a TCP/IP network or connect to a Local Area Network and the Internet.
Bluetooth Printer This is the implementation of the Bluetooth Hard-copy Cable Replacement
profile (HCRP) as a printer. Bluetooth Printer allows Bluetooth devices to wirelessly print
documents to a Bluetooth printer.
Bluetooth Security Bluetooth security is an important part of the Bluetooth wireless
communication technology. Bluetooth security enables illegal access to your computer to be
rejected. There are three levels of security: Low, Medium and High. In Low level, there is no
security check. In Medium level, remote Bluetooth devices can browse your services. Security is set
on every service. The service can be set to request or not to request for authentication and
authorization. If you request for authentication, the remote device will be asked to enter the same
passkey as the one in your computer. Otherwise, the Bluetooth passkey is not requested. If
authorization is set, the remote device has to be in the authorized devices list.
Bluetooth Service A Bluetooth device may offer certain functions for other Bluetooth devices to
use. These functions are called Bluetooth services. For example, a Bluetooth mobile phone can
offer four services, which include synchronization, dial-up networking, file transfer and serial port.
In BlueSoleilâ„¢, all services need to be started manually before use..
Bluetooth Service Browse A remote Bluetooth device can provide one or more Bluetooth
services. To use the services that the remote device provides, the user has to first find the services.
This is called service browse.
Bluetooth Serial Port This is the implementation of the Bluetooth Serial Port profile (SPP). SPP
emulates a serial port over Bluetooth, for the Bluetooth device.
Bonding Bonding is the creation of a relationship between two devices, which are known to each
other prior to the bonding procedure. A user initiates the bonding procedure and enters a passkey to
create a bond between two devices. This differs from the authentication procedure where the user is
requested to enter a passkey during the establishment of the link.
Connectable Bluetooth devices can be connectable or non-connectable. When the device is
connectable, other devices can connect to it.
DHCP The Dynamic Host Configuration Protocol (DHCP) is an Internet protocol for automating
the configuration of computers that use TCP/IP.
Bluetooth Dongle A Bluetooth device which can be added onto a computer or notebook to make it
Bluetooth enabled, A Bluetooth dongle is typically a USB device.
General Discoverable Bluetooth devices have three modes: General discoverable, Limited
discoverable and Non-discoverable mode. A Bluetooth device will respond to a General Inquiry if it
is in general discoverable or limited discoverable mode.
HID A Human Interface device such as a keyboard or mouse.
ICS (Internet Connection Sharing) For more detailed information about ICS, please refer to the
Microsoft Windows help topic: Internet Connection Sharing.