User's Manual
4
Introduction
Introduction To Bluetooth
The term “Bluetooth” refers to a worldwide standard for the wireless exchange of data
between two devices.
In order to exchange data, two Bluetooth devices must establish a connection.
Before a connection is established, one device must request a connection with another.
The second device accepts (or rejects) the connection.
The originator of the request is known as the client.
The device that accepts (or rejects) the request is known as the server.
Many Bluetooth devices can act as both client and server.
A client Bluetooth device runs a software program that requests a connection to another
device as part of its normal operation. For example, the program may request a
connection to a remote computer, a printer, or a modem.
Becoming a Bluetooth client normally requires an action by the device operator, such as
an attempt to browse a remote computer, print a file, or dial out on a modem.
Every Bluetooth device that provides a service must be prepared to respond to a connection
request. Bluetooth software is always running in the background on the server, ready to
respond to connection requests.
Introduction To The Bluetooth USB Dongle
The Bluetooth USB Dongle is the best solution for quick and easy connection and access to
your Ethernet Local Area Network (LAN) and other shared resources without cables or
wires.
Class 2/3 is low power Bluetooth USB Dongle. Class 1 is high power Bluetooth USB Dongle.
Each Bluetooth Dongle is bundled with Bluetooth Access Point Software. The significant
difference between the high power and low power is the transmission range. The
transmission range of class 1 (high power) is up to 50 meters; however, the class 2/3 (low
power) is about 10-20 meters. You can choose a suitable Bluetooth USB Dongle depends
on your working environment. The PC configured as the Bluetooth server can support up to
7 Bluetooth client devices with IP addresses automatically assigned when they connect.
The Access Point Software also provides Internet sharing and security access between the
server and clients.
After finishing these steps outlined in this manual, you will have the ability to share
information, Network Access and take the full advantage of a “connected” environment.