February 2005
vi Contents
Using Configuration Profiles ...........................................................................................4-1
Connecting to an Access Point in Infrastructure Mode ............................................4-2
How to Configure an Infrastructure M ode Profile .....................................................4-3
Connecting to Another PC in Ad-hoc M ode ....................................................................4-4
How to Configure an Ad-hoc M ode Profile ...............................................................4-5
How to Start a Computer-to-Computer (Ad-Hoc) Network .......................................4-7
Enabling Wireless Security Features ..............................................................................4-8
Identifying the Wireless Network Name (SSID ) and WEP Security Settings ...........4-8
How to Configure WEP Encryption Security ............................................................4-9
Statistics Page ........................................................................................................4-11
Advanced Settings Page ........................................................................................4-12
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure M ode ................................................................................................. B-1
Ad Hoc M ode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID ) ................................ B-2
Authentication and WEP ................................................................................................ B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-5
WEP Configuration Options .................................................................................... B-6
Wireless Channels ......................................................................................................... B-7
Appendix C
Preparing Your PCs for Network Access
Preparing Your Computers for TCP/IP N etworking .......................................................C-1
Configuring Windows 95, 98, and M e for TCP/IP N etworking .......................................C-2
Installing or Verifying Windows Networking Components .......................................C-2
E n a b lin g D H C P to A u tom a tica lly C on figu re T C P /I P S e ttin gs in
Windows 95B, 98, and M e ......................................................................................C-3
Selecting the Windows’ Internet Access Method ....................................................C-5
Verifying TCP/IP Properties ....................................................................................C-5