Contents 5
M-10153-01
Verifying TCP/IP Properties ...................................... .............................................. C-6
Configuring Windows NT4, 2000 or XP for IP Networking .... ........................................C-7
Install or Verify Windows Networking Components .................................................C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4 ............................... C-8
DHCP Configuration of TCP/IP in Windows XP ..................................................... C-8
DHCP Configuration of TCP/IP in Windows 2000 ................................................ C-10
DHCP Configuration of TCP/IP in Windows NT4 .................................................. C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4 .............................. C-15
Configuring the Macintosh for TCP/IP Networking ...................................................... C-16
MacOS 8.6 or 9.x ............................................ ... .... ............................................... C-16
MacOS X .......................................................................................................... ... .. C-17
Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17
Verifying the Readiness of Your Internet Account .......................................................C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? ............................................... ............... C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers .....................C-20
Restarting the Network ....................................................... .........................................C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ...................................................................... ........................... D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................D-2
Authentication and WEP ................................................................................................ D-3
802.11 Authentication .............................................................................................. D-3
Open System Authentication ................................................................................... D-4
Shared Key Authentication ...................................................................................... D-4
Overview of WEP Parameters ................................................................................ D-5
Key Size ....................................................................... ........................................... D-6
WEP Configuration Options ............................................ .... ... ... ... .... ... ... ... ... .... .......D-7
Wireless Channels ......................................................................................................... D-7
WPA Wireless Security .................................................................................................. D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i? ........................................................D-10