Connectivity
There are several different connectivity types you can
use with your device. You can use wireless connectivity
methods such as wireless LAN, Bluetooth or infrared, or
a USB (Universal Serial Bus) cable connection for PC
Suite or IP passthrough.
Wireless LAN
You can define access points for wireless LAN to use it
for Internet access for applications that need to connect
to the Internet. See Wireless LAN on page 95.
Setting up an ad hoc network
With 3rd party applications, ad hoc networks allow
wireless stations to communicate directly with each
other without any wireless LAN access points. One user
creates the ad hoc network and other users then join
the network.
You must first create an Internet access point for the ad
hoc network.
To create an Internet access point for an ad hoc
network
1. Select
Desk
→
Tools
→
Control panel
, and select
Connections
→
Internet setup
.
2. Press
New
. You can use an existing access point as a
basis for the new one: after you have pressed
New
,
press
Yes
, choose the access point from the list, and
press
OK
.
3. Define the settings.
•
Internet settings name
— Give a descriptive
name for the connection.
•
Internet settings type
— Select wireless LAN as
the connection type.
•
Network ID
— Select the network ID according
to the destination network you want to access
with the Internet access point. You can rename,
and create new network IDs. Using the correct
network ID ensures that the data traffic is routed
directly to the desired destination network.
Especially VPN (virtual private network) software
may restrict data traffic for a certain destination
network.
•
Network mode
— Select
Ad hoc
.
•
Network name
— Give the network a name.
•
Security mode
— Select
WEP
if you want to use
a WEP (wired equivalent privacy) key for
authentication.
4. If you selected
WEP
as a security mode, you need to
configure these settings, too.
•
WEP key index
— Select the a number for the
WEP key.
•
WEP key length
— Select the appropriate key
length. Supported key lengths are 40, 104, and
232 bits. The more bits there are in the key, the
higher the level of security.
104
Connectivity
file:///C:/USERS/MODEServer/tkoikkal/864507/RA-2_Erin/en/issue_1/ra-2_erin_en-us_1.xml
Page 104
Jul 2, 2004 11:32:12 AM