February 2005 (202-10034-03)
x
Contents
Verifying TCP/IP Properties for Windows XP, 2000, and NT4 .............................. C-15
Configuring the Macintosh for TCP/IP Networking ...................................................... C-16
MacOS 8.6 or 9.x .................................................................................................. C-16
MacOS X ............................................................................................................... C-16
Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17
Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20
Restarting the Network ................................................................................................ C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ................................................................................................. D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................ D-2
Wireless Channels .................................................................................................. D-2
WEP Wireless Security .................................................................................................. D-4
WEP Authentication ................................................................................................ D-4
WEP Open System Authentication ......................................................................... D-5
WEP Shared Key Authentication ............................................................................ D-6
Key Size and Configuration .............................................................................. D-7
How to Use WEP Parameters ................................................................................. D-8
Glossary
List of Glossary Terms ................................................................................................... G-1
Index