February 2005
vi Contents
U sing Configuration Profiles ...........................................................................................4-1
Connecting to an Access P oint in Infrastructure M ode ............................................4-2
H ow to Configure an Infrastructure M ode P rofile .....................................................4-3
Connecting to Another P C in Ad-hoc M ode ....................................................................4-4
H ow to Configure an Ad-hoc M ode P rofile ...............................................................4-5
H ow to Start a C omputer-to-Computer (Ad-H oc) N etwork .......................................4-7
E nabling W ireless Security Features ..............................................................................4-8
Identifying the W ireless N etwork N ame (SSID ) and W EP Security Settings ...........4-8
H ow to Configure W EP E ncryption Security ............................................................4-9
Statistics Page ........................................................................................................4-11
Advanced Settings P age ........................................................................................4-1 2
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
W ireless N etworking O verview ...................................................................................... B-1
Infrastructure M ode ................................................................................................. B-1
Ad H oc M ode (P eer-to-P eer W orkgroup) ................................................................ B-2
N etwork N ame: Extended Service Set Identification (ESSID ) ................................ B-2
Authentication and W E P ................................................................................................ B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of W E P Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-5
W E P Configuration Options .................................................................................... B-6
W ireless Channels ......................................................................................................... B-7
Appendix C
Preparing Your PCs for Network Access
P reparing Your Computers for TCP /IP N etworking ....................................................... C-1
Configuring W indows 95, 98, and M e for TCP /IP N etworking ....................................... C-2
Installing or Verifying W indows N etworking Components ....................................... C-2
E n a b l in g D H C P to A u to m a ti ca l ly C on fi g u re T C P /I P S e tti n g s i n
W indows 95B, 98, and M e ...................................................................................... C-3
Selecting the W indows’ Internet Access M ethod .................................................... C-5
Verifying TCP /IP P roperties .................................................................................... C-5