NETGEAR WG311 manual Authentication and WEP, Ad-Hoc Mode Peer-to-Peer Workgroup

Page 50

Installation Guide for the NETGEAR 54 Mbps Wireless PCI Adapter WG311

Ad-Hoc Mode (Peer-to-Peer Workgroup)

In an ad-hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems. Some vendors also refer to ad-hoc networking as peer-to-peer group networking.

In this configuration, network packets are directly sent and received by the intended transmitting and receiving stations. As long as the stations are within range of one another, this is the easiest and least expensive way to set up a wireless network.

Network Name: Extended Service Set Identification (ESSID)

The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification (SSID). In an ad-hoc wireless network with no access points, the Basic Service Set Identification (BSSID) is used. In an infrastructure wireless network that includes an access point, the ESSID is used, but may still be referred to as SSID.

An SSID is a thirty-two character (maximum) alphanumeric key identifying the name of the wireless local area network. Some vendors refer to the SSID as network name. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID.

Authentication and WEP

The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless PC can join any network and receive any messages that are not encrypted. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network.

Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. There are two shared key methods implemented in most commercially available products, 64-bit and 128-bit WEP data encryption.

B-2

Wireless Networking Basics

Image 50
Contents NETGEAR, Inc Technical Support FCC Information to User Export Restrictions Page Page Contents Appendix C Preparing Your PCs for Network Access Glossary Contents About the Netgear 54 Mbps Wireless PCI Adapter WG311 Key Features and Related Netgear ProductsRoad Map for ‘How to Get There From Here’ What’s in the Box?Road Map for How to Get There From Here Netgear 54 Mbps Exchange files Use printers What You Will Need Before You Begin Verify System RequirementsTwo Basic Operating Modes Observe Location and Range GuidelinesWG311 Default Wireless Configuration Settings Install the WG311 software Basic Installation InstructionsFor Windows XP Users Installing a WG311 Install the Netgear 54 Mbps Wireless PCI Adapter WG311 Configure your WG311 Verify wireless connectivity to your network Open the WG311 utility by clicking on the iconFor Windows 2000 & 98/Me Users Installing a WG311 Task bar Configure your WG311 and save ProfileVerify wireless connectivity to your network WG311 Wireless Connection Indicators Interpreting System Tray Icon ColorsBasic Troubleshooting Tips About About page shows the following informationBasic Setup Basic Setup Understanding the Configuration Options Using Configuration ProfilesNetworks Networks page displays the following fieldsRun the WG311 Configuration Utility Connect to an Access Point in Infrastructure ModeHow to Configure an Infrastructure Mode Profile Configure the wireless Network settings Save your settings in a ProfileConnecting to Another PC in Ad-Hoc Mode How to Configure an Ad-Hoc Mode ProfileConfigure the PC network settings How to Start a Computer-to-Computer Ad-Hoc Network Enabling Wireless Security Features Ad-Hoc SettingConfiguration How to Configure WEP Encryption Security Configure the Security settingsSave your settings in a Profile Statistics Statistics tabAdvanced Settings Advanced SettingsConfiguration Appendix a Technical Specifications Technical Specifications Wireless Networking Overview Infrastructure ModeNetwork Name Extended Service Set Identification Essid Authentication and WEPAd-Hoc Mode Peer-to-Peer Workgroup Authentication Open System AuthenticationPoint This process is illustrated in below Authentication Shared Key Steps WEP Configuration Options Key SizeWireless Channels Radio frequency channels used are listed in Table Preparing Your Computers for TCP/IP Networking Configuring Windows 98 and Me for TCP/IP NetworkingInstall or Verify Windows Networking Components Preparing Your PCs for Network Access Choose Settings, and then Control Panel Locate your Network Neighborhood iconPrimary Network Logon is set to Windows logon Selecting the Internet Access Method Verifying TCP/IP PropertiesConfiguring Windows 2000 or XP for TCP/IP Networking Dhcp Configuration of TCP/IP in Windows XP or Dhcp Configuration of TCP/IP in Windows XPTCP/IP details are presented on Support tab Right click on Local Area Connection and select Properties Dhcp Configuration of TCP/IP in WindowsVerify that Obtain an IP address Obtain an IP address automatically is selected Verifying TCP/IP Properties for Windows XP or Preparing Your PCs for Network Access Glossary List of Glossary TermsDSL Internet service provider Ssid Wins Glossary Numerics Bssid Essid