EasyManua.ls Logo

Fujitsu STYLISTIC V535 - Universal Charging Cradle (optional); Chip and Pin shell (optional); Magnetic Stripe Reader shell (optional); Smart Card shell (optional)

Fujitsu STYLISTIC V535
106 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Technical da ta
Actual throughput may vary depending on environmental factors:
Extended Low Temperatu re Restrictions:
1. LCD response time maybe slower at or below C (+32° F).
2. Battery will not charge below C (+32° F).
3. Battery life will be signicantly reduced (> 50%) when un it is
operated at or below C (+32° F).
4. Unit should not be operated below C ( +32° F).
Extended High Temperature R estrictions:
1. Unit should not be opera ted above +50° C (+122° F).
2. Depending on its load, CPU performance may be reduced at
temperatures greater than +35° C ( +95° F).
3. Camera noise may occur a t temperatures greate r than +35° C (+95° F).
4. Battery charging will be limited at te mperatures greater than +35° C (+95° F).
WLAN specications
Type of network Broadcom Dual Band 11a/b/g/n
Transf er rate (Automatic switch
ing) IEEE802.11 a an d g: 54
Mbps max. data rate
; IEEE802.11n: 300 Mbps
max. data rate, IE
EE802.11ac: 867 Mbps max.
data rate
Active frequency 802.11n: 2.4 GHz or 5 G Hz
802.11b/g: 2400~2482 MHz
802.11a: 5150~5850 MH z
Number o f channels
802.11a: 24 independent channels
802.11b/g: 1 3 channels, 3 non-overlapping
channels
802.11n: Channel bonding takes two of
the non-overlapping 20MHz channels and
combines them into one 40MH z channel. It
is actually 12 non-overlapping c han nels with
channel bonding and 24 without. Also it is 2
non-overlapping channel in 2.4GHz when
channel bonding is used.
Security
Encryption types: compatible with WEP, TKIP,
AES*, WPA 1.0 and WPA 2.0
Encryption key, lengths supported: 64 bits and
128 bits
Maximum recommended number of computers
to be connected over wireless LAN (during ad
hoc connection)
10 units or less **
*Net
work key encryption (WEP) occurs with the number of bits given above, after deduction of the
xe
d length o f 24 bits the user may however also se t 40 or 104 bits.
** D
epending on the particular practical application, the number of computers which can be
ne
tworked is reduced if necessary.
Fujitsu 77

Table of Contents

Other manuals for Fujitsu STYLISTIC V535

Related product manuals