Connecting to the Internet 59
applied (however, encryption is supported). When you select Shared Key, a
WEP key is used for authentication. The default setting is Open System.
-
Data encryption (WEP)
: The IEEE 802.11 WEP (Wired Equivalent Privacy)
standard defines two levels of encryption, a 64-bit key (this is sometimes
represented by 40bits) and a 128-bit key.
-
Key index
: Select the current encryption key index used by the access point
out of 1 to 4.
-
To use encryption key
: Click
Use pass phrase
to activate, and enter 5 (for
64-bit) or 13 (for 128-bit) alphanumeric characters (represented by 0-9, a-z, or
A-Z).
6.
The Done window appears, click
OK
.
When a wireless connection to an access point is established, the connection icon (
)
appears in front of the name of the connected profile.
To create a computer-to-computer (Ad Hoc) network:
To create a new computer-to-computer (Ad Hoc) network or to connect to a hidden
access point (Stealth/Closed Mode), refer to the following procedures.
A hidden access point is an access point that exists, but is configured not to
be detected by the scan operation to prevent access attempts from
unauthorized users.
1.
In Profiles, click on
Add
.
2.
Enter
Profile Name
and
Network name (SSID)
, select
Operating Mode
, then
click
Next
.
What is a network name (SSID)?
Network name (SSID) is a name that a wireless adapter uses for identifying
connection. Enter the name of computer-to-computer network to create (e.g.,
samsung) or the name of access point to connect. The network name
identifies cases. (capital and lowercase) For the name of access point, check
the settings of the access point, or ask your wireless network administrator.
Operating Mode:
-
Network (Infrastructure) - Connect to an Access Point
: Select to
connect to an access point.
-
Device to device (Ad hoc) - Connect directly to other computers
: Select
to create a computer-to-computer (Ad Hoc) network.
Содержание NP-P40
Страница 171: ...1 16 Manual...
Страница 198: ...Connecting to the Internet This chapter provides instructions on connecting to the Internet Chapter 4 Chapter 4...
Страница 227: ...4 30 Manual...
Страница 228: ...System Management This chapter provides information on efficient computer management Chapter 5 Chapter 5...
Страница 239: ...5 12 Manual...
Страница 253: ...6 14 Manual...
Страница 282: ...Appendix System specifications software types and safety instructions are provided here Appendix Appendix...