User's Manual

Wireless Network Overview
Device-to-Device mode, also called Ad Hoc mode, works without access points and
allows wireless computers to send information directly to other wireless computers. You
can use Peer-to-Peer mode to network computers in a home or small office or to set up a
temporary wireless network for a meeting.
Configuring a Wireless Network
There are three basic components that must be configured for an 802.11 wireless
network to operate properly:
Network Name—Each wireless network uses a unique Network Name to identify the network. This
name is called the Service Set Identifier (SSID). When you set up your wireless adapter, you specify the
SSID. If you want to connect to an existing network, you must use the name for that network. If you are
setting up your own network you can make up your own name and use it on each computer. The name
can be up to 32 characters long and contain letters and numbers.
Profiles—When you set up your computer to access a wireless network, Intel(R)PROSet/Wireless
creates a profile for the wireless settings that you specify. If you want to connect to another network,
you can scan for existing networks and make a temporary connection, or create a new profile for that
network. After you create profiles, your computer will automatically connect when you change locations.
Security—The 802.11b wireless networks use encryption to help protect your data. Wired equivalent
privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer
transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this
same key to unscramble the data. If you are connecting to an existing network, use the encryption key
provided by the administrator of the wireless network. If you are setting up your own network you can
make up your own key and use it on each computer.
file:///C|/CX2%20Muroc%20UG/6-15-04/wlan.htm (2 of 3) [6/15/2004 3:40:15 PM]