generate a new key for every packet, and they also generate a different set of keys for each computer network. To accomplish this:
◦WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP)
◦WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is a new AES protocol.
●Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, Windows attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If Windows does not recognize the new network, follow the same procedure you used initially to connect to your WLAN.
Using GPS (select models only)
Your computer may be equipped with a Global Positioning System (GPS). GPS satellites deliver location, speed, and direction information to
For more information, refer to the HP GPS and Location software Help.
Using Bluetooth wireless devices
A Bluetooth device provides
●Computers
●Phones
●Imaging devices (cameras and printers)
●Audio devices
●Mouse
Bluetooth devices provide
Bluetooth and Internet Connection Sharing (ICS)
HP does not recommend setting up one computer with Bluetooth as a host and using it as a gateway through which other computers may connect to the Internet. When two or more computers are connected using Bluetooth, and Internet Connection Sharing (ICS) is enabled on one of the computers, the other computers may not be able to connect to the Internet using the Bluetooth network.
The strength of Bluetooth is in synchronizing information transfers between your computer and wireless devices including cellular phones, printers, cameras, and PDAs. The inability to consistently
6 | Chapter 2 Networking (select models only) |