generate a new key for every packet, and they also generate a different set of keys for each computer on the network. To accomplish this:
◦WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP).
◦WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is a new AES protocol.
●Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, the operating system attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If the operating system does not recognize the new network, follow the same procedure you used initially to connect to your WLAN.
Using Bluetooth wireless devices (select models only)
A Bluetooth device provides
●Computers
●Phones
●Audio devices
The strength of Bluetooth is in synchronizing information transfers between your computer and wireless devices. The inability to consistently connect two or more computers to share the Internet through Bluetooth is a limitation of Bluetooth and the operating system.
Bluetooth devices provide
Connecting to a wired network
Connecting to a local area network (LAN) (select models only)
Connecting to a local area network (LAN) requires an
Using Bluetooth wireless devices (select models only) 17