![Cisco WPC54GX Скачать руководство пользователя страница 22](http://html.mh-extra.com/html/cisco/wpc54gx/wpc54gx_user-manual_63573022.webp)
18
Chapter 6: Using the Wireless Network Utility
Using the Utility
Wireless-G Notebook Adapter with SRX
•
The Re-Scan button is disabled while scanning takes place. When the scan is complete, the Site Survey
list
displays all the discovered networks.
Working with Profiles
Profiles store configuration information about how your Adapter connects to specific wireless networks. Use the
Profile Editor
to create new profiles or modify existing ones.
Profile Editor
SSID. Service Set Identifier (SSID) is a name that uniquely identifies a wireless local area network. Each device in
the wireless network must have the same SSID configured in order to participate in the network.
BSSID. Basic Service Set (BSS) is the collection of wireless devices operating with an individual access point in
infrastructure mode or without an access point in ad-hoc mode.
Network Type. The Network Type indicates the type of network arrangement.
•
Infrastructure. Refers to an existing wireless network, usually with an interface to a wired network, for
Internet and email access, file sharing, and print and other services.
•
Ad Hoc. Refers to a temporary wireless network that has been set up by another user.
•
Start Ad-Hoc Network. Permits you to set up a new ad-hoc network to communicate with other PCs
without using an access point.
Channel. In infrastructure networks, the channel used for radio communications is determined at the access
point and for ad-hoc networks, the channel is determined by the user who starts the network. It is necessary to
select a channel only if you are starting a new ad-hoc network.
Authentication. The authentication and encryption settings provide options for configuring a secure connection
between your PC and access point. The following authentication options are available:
•
Open. No authentication.
•
Share. Authentication based on shared keys.
Encryption Type. The following encryption options are available:
•
None. No encryption.
•
WEP. Encryption based on shared WEP keys.
Figure 6-4: Profile Editor