¡ÒÃÊÃéÒ§à¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì (Ad Hoc)
¡ÒÃÊÃéÒ§à¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì(Ad Hoc) ËÃ×Í¡ÒÃàª×èÍÁµèÍä»Âѧ¨Ø´àª×èÍÁµèÍ·Õè«è͹äÇé(Stealth/Closed Mode) ãËé·ÓµÒÁ¢Ñ鹵͹µèÍ仹Õé
¨Ø´àª×èÍÁµèÍ·Õè«è͹ ¤×ͨشàª×èÍÁµèÍ·ÕèÁÕÍÂÙè áµèä´éÃѺ¡ÒáÓ˹´¤èҤ͹¿Ô¡ãËéäÁèÊÒÁÒöµÃǨËÒä´éâ´Â¡ÒÃãªé¤ÓÊÑè§Ê᡹à¾×èÍ»éͧ¡Ñ¹¤ÇÒÁ¾ÂÒÂÒÁ㹡ÒÃà¢éÒã ªé§Ò¹¨Ò¡¼Ùéãªé·ÕèäÁèä´éÃѺ͹Ø−Òµ
1.ã¹ÇÔ¹â´ÇìÃÒ¡Òà Profile ãËé¤ÅÔ¡ New
2.»é͹¢éÍÁÙÅ Profile Name áÅÐ Network Name
ª×èÍà¹çµàÇÔÃ졤×ÍÍÐäÃ?
ª×èÍà¹çµàÇÔÃì¡ ¤×ͪ×èÍ·ÕèäÇÃìàÅÊÍÐá´»àµÍÃìãªéà¾×èÍÃкءÒÃàª×èÍÁµèÍ ãËé»é͹ª×èÍà¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì·Õè µéͧ¡ÒÃÊÃéÒ§ (àªè¹ P2P) ËÃ×ͪ×èͧ͢¨Ø´àª×èÍÁµèÍ ·Õèµéͧ¡ÒÃàª×èÍÁµèÍ ª×èÍÊÓËÃѺÃкØà¹çµàÇÔÃì¡ (ÁÕ¤ÇÒÁµèÒ§
ÃÐËÇèÒ§ÍÑ¡ÉþÔÁ¾ìãË−áÅÐàÅç¡)è ÊÓËÃѺª×èͧ͢¨Ø´àª×èÍÁµèÍ ãËéµÃǨÊͺ¡ÒõÑ駤èÒ¨Ò¡¨Ø´àª×èÍÁµèÍ ËÃ×Í Êͺ¶ÒÁ¨Ò¡¼Ùé´ÙáÅÃкºäÇÃìàÅÊà¹çµàÇÔÃ졢ͧ¤Ø³
3.ã¹ÇÔ¹â´ÇìAdvanced ãËé¡Ó˹´¤èÒ Network type
âËÁ´¢Í§à¹çµàÇÔÃì¡:
Ad- Hoc - àÅ×Í¡à¾×èÍàª×èÍÁµè͡Ѻà¹çµàÇÔÃì¡ Ad Hoc
Access Point - àÅ×Í¡à¾×èÍàª×èÍÁµè͡Ѻ¨Ø´àª×èÍÁµèÍ
4.ã¹ÇÔ¹â´ÇìSecurity ãËéàÅ×Í¡ Set Security Method ÊÓËÃѺà¹çµàÇÔÃì¡ Ad Hoc à¾×èÍàª×èÍÁµèÍ ¡ÒÃàª×èÍÁµèÍä»Âѧ¨Ø´àª×èÍÁµèÍ ãËéàÅ×Í¡ Set Security Method µÒÁ¡ÒõÑ駤èÒ㹨شàª×èÍÁµèÍ
á¹Ð¹ÓãËé¡Ó˹´¤èҤ͹¿Ô¡ WEP Key à¾×èÍ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂàÁ×èÍÁÕ¡ÒÃÊÃéÒ§â»Ãä¿Åìà¹çµàÇÔÃì¡áºº Ad Hoc
5.ËÅѧ¨Ò¡ÊÃéÒ§â»Ãä¿ÅìáÅéÇ â»Ãä¿ÅìãËÁè¨Ð»ÃÒ¡¯¢Öé¹ã¹ÃÒ¡Òà Profile ´ÑºàºÔŤÅÔ¡·Õèâ»Ãä¿Åì·Õèàª×èÍÁµè͡Ѻà¹çµàÇÔÃì¡â´Âãªéâ»Ãä¿Åì¹Ñé¹
¡ÒÃàª×èÍÁµè͡ѺÍÔ¹àµÍÃìà¹çµ 51