June 2005
vi Contents
How to Start a Computer-to-Computer (Ad Hoc) Network ..... ... ... ............................3-7
Hidden Networks ............................................................................................................3-7
Enabling Wireless Security Features ..................... .................... ................... ..................3-9
Identifying the Wireless Network Name (SSID) and WEP Security Settings .........3-10
How to Configure WEP Encryption Security ..........................................................3-11
How to Configure WPA-PSK Security ....................................................................3-12
Advanced Settings Button ......................................................................................3-13
Networks Page .............................................................................................................3-14
Using the Connection Wizard to Connect to a Network .........................................3-15
Statistics Page ..............................................................................................................3-16
About Page ...................................................................................................................3-17
Chapter 4
Troubleshooting
Troubleshooting Tips ......................................................................................................4-1
Frequently Asked Questions ..........................................................................................4-2
XP Professional and XP Home occasional connection problems ..................................4-3
Appendix A............................................................................................................................A1
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview ..................... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... .... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ........................ .... ... ................................. B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Authentication and WEP ........................ ... .... ... ... ... ....................................... ................. B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ........................... ... .... ... ... .................................... ... ... . B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-6
WEP Configuration Options ...... ... ... ... .... ... ... ... ... ....................................... .............. B-6
Wireless Channels .................... ... .... ... ... ... .... ................................................................. B-7
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? .......................................................... B-9