February 2005
vi Contents
Using Configuration Profiles ...........................................................................................4-1
Connecting to an Access Point in Infrastructure Mode ............................................4-2
How to Configure an Infrastructure Mode Profile ..................................................... 4-3
Connecting to Another PC in Ad-hoc Mode ....................................................................4-4
How to Configure an Ad-hoc Mode Profile ...... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..4-5
How to Start a Computer-to-Computer (Ad-Hoc) Network .......................................4-7
Enabling Wireless Security Features ..................... .................... ................... ..................4-8
Identifying the Wireless Network Name (SSID) and WEP Security Settings ...........4-8
How to Configure WEP Encryption Security ............................................................4-9
Statistics Page ........................................................................................................4-11
Advanced Settings Page ........................................................................................4-12
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview ..................... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... .... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ........................ .... ... ................................. B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Authentication and WEP ........................ ... .... ... ... ... ....................................... ................. B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ........................... ... .... ... ... .................................... ... ... . B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-5
WEP Configuration Options ................... ... ....................................... ....................... B-6
Wireless Channels .................... ... .... ... ... ... .... ................................................................. B-7
Appendix C
Preparing Your PCs for Network Access
Preparing Your Computers for TCP/IP Networking ...................................... ... ... .... ... ... . C-1
Configuring Windows 95, 98, and Me for TCP/IP Networking ....................................... C-2
Installing or Verifying Windows Networking Components ....................................... C-2
Enabling DHCP to Automatically Configure TCP/IP Settings in
Windows 95B, 98, and Me ..................... ... ................................... .... ... ... ... ... .... ... ... . C-3
Selecting the Windows’ Internet Access Method .................................................... C-5
Verifying TCP/IP Properties ....................................................................................C-5