User's Manual
Table Of Contents
- Creative Sound Blaster Wireless Entertainment
- Contents
- Introduction
- Your Sound Blaster Wireless Entertainment At A Glance
- Getting Started
- Using Your Remote Control
- About Music Files
- Frequently Asked Questions
- Maintenance and Safety Advice
- Technical Specifications
- Glossary
- Ad-hoc mode
- Antenna
- Access Point (AP)
- Bandwidth
- BSS (Basic Service Set)
- DHCP (Dynamic Host Configuration Protocol)
- Dynamic IP address
- Encryption
- IEEE 802.11
- IEEE 802.11b
- IEEE 802.11g
- Infrastructure mode
- IP (Internet Protocol)
- IP address
- LAN (Local Area Network)
- MAC (Media Access Control) address
- Router
- SSID (Service Set Identity)
- Static IP address
- TCP/IP (Transmission Control Protocol/ Internet Protocol)
- USB (Universal Serial Bus)
- WEP (Wired Equivalent Privacy)
- Wi-Fi
Getting Started 3-1
Getting Started
Step 1: Install
Wireless
Entertainment
1. Before you begin, turn on your computer and make sure your wireless router
or access point is set up and working properly.
2. Turn on your computer and connect your Wireless Entertainment to your
computer’s USB port using the supplied USB cable.
3. Insert the Installation CD into your CD-ROM/DVD-ROM drive.
The disc supports Windows Autoplay mode and starts running automatically. If
not, you need to enable the Windows auto-insert notification feature for your
CD-ROM/DVD-ROM drive. For more details, see "Installation" on page B-1.
4. Select the Wireless Entertainment Setup Wizard option and click the OK
button.
5. In the Wireless Entertainment Configuration — Network dialog box, select a
network from the list available networks, and click the Next button.
If your network is not listed, click the Scan button to refresh the list of
available networks, or select the Use this SSID option and enter the SSID of
the network you want to connect to.
6. If the selected network is WEP encrypted, enter the encryption information,
and click the Next button. Refer to the User’s Guide of your wireless router or
access point to learn how to view your network’s encryption information.
Figure 3-1










