June 2005
vi Contents
How to Start a Computer-to-Computer (Ad Hoc) Network .......................................3-7
Hidden Networks ............................................................................................................3-7
Enabling Wireless Security Features ..............................................................................3-9
Identifying the Wireless Network Name (SSID) and WEP Security Settings .........3-10
How to Configure WEP Encryption Security ..........................................................3-11
How to Configure WPA-PSK Security ....................................................................3-12
Advanced Settings Button ......................................................................................3-13
Networks Page .............................................................................................................3-14
Using the Connection Wizard to Connect to a Network .........................................3-15
Statistics Page ..............................................................................................................3-16
About Page ...................................................................................................................3-17
Chapter 4
Troubleshooting
Troubleshooting Tips ......................................................................................................4-1
Frequently Asked Questions ..........................................................................................4-2
XP Professional and XP Home occasional connection problems ..................................4-3
Appendix A............................................................................................................................A1
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Authentication and WEP ................................................................................................ B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-6
WEP Configuration Options .................................................................................... B-6
Wireless Channels ......................................................................................................... B-7
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? .......................................................... B-9