background image

Wireless Notebook Adapter

21

To use WEP encryption, select 64-bit or 128-bit WEP from the drop-down
menu (recommended).

If you select 64-bit or 128-bit WEP, you have two choices. Enter the
passphrase of your wireless network in the Passphrase field, or enter the
WEP key of your wireless network in the Key 1 field. Click the Next but-
ton to continue or the Back button to return to the previous screen.

Passphrase - This passphrase must match the passphrase of your wireless
network. This is the code used when logging a wireless device onto the
wireless network. The passphrase is case-sensitive and should not be longer
than 16 alphanumeric characters. Based upon the passphrase created by
you, WEP key settings are automatically generated. This passphrase is
compatible only with other Linksys wireless products.

Key 1 - This WEP key must match the WEP key of your wireless network.
If you are using 64-bit WEP encryption, then the key must consist of exact-
ly  10 hexadecimal characters in length. If you are using 128-bit WEP
encryption, then the key must consist of exactly 26 hexadecimal characters
in length. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

6. The Confirm New Settings screen, shown in Figure 5-14, will appear next.

To save the new settings, click the Yes button. To cancel the settings and
return to the Profiles screen, click the No button. To edit the new settings,
click the Back button.

Figure 5-14

20

Network Everywhere

Series

Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired
network’s Subnet Mask. Enter the Subnet Mask in this format:
xxx.xxx.xxx.xxx (the x’s represent your actual Subnet Mask).

Default Gateway - Enter the IP address of your network’s Gateway here.
Enter the Default Gateway in this format: xxx.xxx.xxx.xxx (the x’s repre-
sent your actual Default Gateway).

DNS - Enter the DNS address of your Ethernet (wired) network here. Enter
the DNS address in this format: xxx.xxx.xxx.xxx (the x’s represent your
actual DNS address).

Click the Next button to continue or the Back button to return to the previ-
ous screen.

5. The Security Settings screen, shown in Figure 5-13, will appear next. Set

the Wired Equivalent Privacy (WEP) encryption for your wireless network
by selecting a WEP configuration method.

WEP (Disabled/64-bit WEP/128-bit WEP) - If you do not want to use
WEP encryption, choose Disabled. Then click the Next button to continue
or the Back button to return to the previous screen. 

Figure 5-13

Содержание NWP11B

Страница 1: ......

Страница 2: ...ETWORK EVERYWHERE OFFERS NO REFUNDS FOR ITS PRODUCTS Network Everywhere makes no warranty or repre sentation expressed implied or statutory with respect to its products or the contents or use of this...

Страница 3: ...by step Then just slide it into your notebook s PC Card slot and enjoy network access with your notebook computer while retaining true mobility Once you re connected you can keep in touch with your e...

Страница 4: ...ad hoc configuration is wireless equipped computers com municating directly with each other Choosing between these two modes depends on whether or not the wireless network needs to share data or peri...

Страница 5: ...or the Exit button to close this screen You opened this User Guide by clicking the User Guide button Before You Start Figure 3 1 Important forWindows XP users Do NOT run theWireless Notebook Adapter s...

Страница 6: ...play the Network Everywhere End User License Agreement Read this and click the Next button to pro ceed or the Cancel button to close the Setup Wizard 3 When the screen shown in Figure 3 3 appears you...

Страница 7: ...pter into your computer you will install the driver and configure the Adapter 1 Windows XP will automatically detect the Adapter Insert the Setup Wizard CD ROM into your CD ROM drive Click the radio b...

Страница 8: ...creen to configure the Adapter See Chapter 4 Driver Installation and Configuration for Windows XP Starting the WLAN Monitor Overview 10 Network Everywhere Series 2 The screen that appears Figure 4 4 w...

Страница 9: ...ion from 0 to 100 Click the X Close button in the upper right corner to exit the WLAN Monitor Figure 5 3 Network Everywhere Series The Link Information screen graphically displays the Adapter s curren...

Страница 10: ...Rate The data transfer rate of the current connection 1Mbps 2Mbps 1 or 2Mbps 5 5Mbps 11Mbps or Auto in Auto mode the Adapter dynamically shifts to the fastest data transfer rate possible at any given...

Страница 11: ...er to exit the WLAN Monitor Figure 5 8 Figure 5 9 Note If you want to export more than one profile you have to export them one at a time Network Everywhere Series Connect To connect to a wireless netw...

Страница 12: ...does not have a DHCP server click the radio button next to Specify the IP address Then enter the following information IP Address This IP Address must be unique to your network Enter the IP Address i...

Страница 13: ...ecimal characters are 0 to 9 and A to F 6 The Confirm New Settings screen shown in Figure 5 14 will appear next To save the new settings click the Yes button To cancel the settings and return to the P...

Страница 14: ...detected prop erly If you see a yellow question mark the resources are conflicting Right click on My Computer and select Properties Select the device man ager and click the Network Adapter You will f...

Страница 15: ...main taining a continuous connection to the wireless network stations and Wireless Network Access Points What is ISM band The FCC and their counterparts outside of the U S have set aside bandwidth for...

Страница 16: ...liable secure mission critical communica tions systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the cas...

Страница 17: ...is extremely difficult 29 Boot To cause the computer to start executing instructions Personal comput ers contain built in instructions in a ROM chip that are automatically executed on startup These i...

Страница 18: ...aking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet Hardware Hardware is the physical aspect of computers telecommunica tions...

Страница 19: ...ook Adapter Network Everywhere Series and at meetings A notebook computer sometimes called a laptop computer typically weighs less than five pounds and is three inches or less in thickness Packet A un...

Страница 20: ...k are connected and the distances between them The most common network devices include hubs switches routers and gateways Most large networks contain several levels of interconnection the most impor t...

Страница 21: ...PACKAGING ON HAND WHEN CALLING RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE IN NO EVENT SHALL NETWORK EVERYWHERE S LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT INDI RE...

Страница 22: ...Copyright 2002 Network Everywhere All rights reserved http www NetworkEverywhere com...

Отзывы: