Contents
xi
202-10006-05, June 2005
Verifying TCP/IP Properties
....................................................................................
C-6
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
C-7
Installing or Verifying Windows Networking Components
.......................................
C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
......................................
C-8
DHCP Configuration of TCP/IP in Windows XP
.....................................................
C-8
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-10
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-15
Configuring the Macintosh for TCP/IP Networking
......................................................
C-16
MacOS 8.6 or 9.x
..................................................................................................
C-16
MacOS X
...............................................................................................................
C-16
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-17
Verifying the Readiness of Your Internet Account
.......................................................
C-18
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP Data Encryption
.....................................................................
D-2
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-3
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
WPA Wireless Security
..................................................................................................
D-8
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to IEEE 802.11i?
........................................................
D-10