Wistron Corporation MS2146 Manuale Utente
A wireless network connects computers without using network cables. Computers use radio
communications to send data between each other. You can communicate directly with other
wireless computers, or connect to an existing network through a wireless access point. When you
set up your wireless adapter, you select the operating mode for the kind of wireless network you
want. You can use your Intel(R) PRO/Wireless adapter to connect to other similar wireless
devices that comply with the 802.11 standard for wireless networking.
communications to send data between each other. You can communicate directly with other
wireless computers, or connect to an existing network through a wireless access point. When you
set up your wireless adapter, you select the operating mode for the kind of wireless network you
want. You can use your Intel(R) PRO/Wireless adapter to connect to other similar wireless
devices that comply with the 802.11 standard for wireless networking.
Choosing a Wireless LAN Mode
Wireless LANs can operate with or without access points, depending on the number of users in
the network. Infrastructure mode uses access points to allow wireless computers to send and
receive information. Wireless computers transmit to the access point, the access point receives
the information and rebroadcasts it to other computers. The access point can also connect to a
wired network or to the Internet. Multiple access points can work together to provide coverage
over a wide area.
the network. Infrastructure mode uses access points to allow wireless computers to send and
receive information. Wireless computers transmit to the access point, the access point receives
the information and rebroadcasts it to other computers. The access point can also connect to a
wired network or to the Internet. Multiple access points can work together to provide coverage
over a wide area.
Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless
computers to send information directly to other wireless computers. You can use Peer-to-Peer
mode to network computers in a home or small office or to set up a temporary wireless network
for a meeting.
computers to send information directly to other wireless computers. You can use Peer-to-Peer
mode to network computers in a home or small office or to set up a temporary wireless network
for a meeting.
Configuring a Wireless LAN
There are three basic components that must be configured for a wireless LAN to operate
properly:
properly:
• Network Name—Each wireless network uses a unique Network Name to identify the
network. This name is called the Service Set Identifier (SSID). When you set up your
wireless adapter, you specify the SSID. If you want to connect to an existing network, you
must use the name for that network. If you are setting up your own network you can
make up your own name and use it on each computer. The name can be up to 32
characters long and contain letters and numbers.
wireless adapter, you specify the SSID. If you want to connect to an existing network, you
must use the name for that network. If you are setting up your own network you can
make up your own name and use it on each computer. The name can be up to 32
characters long and contain letters and numbers.
• Profiles—When you set up your computer to access a wireless network, Intel(R)
PROSet creates a profile for the wireless settings that you specify. If you want to connect
to another network, you can scan for existing networks and make a temporary
connection, or create a new profile for that network. After you create profiles, your
computer will automatically connect when you change locations.
to another network, you can scan for existing networks and make a temporary
connection, or create a new profile for that network. After you create profiles, your
computer will automatically connect when you change locations.
• Security—The 802.11 wireless networks use encryption to help protect your data. Wired
equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble
data. Before a computer transmits data, it scrambles the data using the secret encryption
key. The receiving computer uses this same key to unscramble the data. If you are
connecting to an existing network, use the encryption key provided by the administrator
of the wireless network. If you are setting up your own network you can make up your
own key and use it on each computer.
data. Before a computer transmits data, it scrambles the data using the secret encryption
key. The receiving computer uses this same key to unscramble the data. If you are
connecting to an existing network, use the encryption key provided by the administrator
of the wireless network. If you are setting up your own network you can make up your
own key and use it on each computer.
Identifying a Wireless Network
Depending on the size and components of a wireless LAN, there are many ways to identify a
wireless LAN:
wireless LAN:
• The Network Name or Service Set Identifier (SSID)—Identifies a wireless network. All
wireless devices on the network must use the same SSID.