¡ÒÃÊÃéÒ§à¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì (Ad Hoc)

¡ÒÃÊÃéÒ§à¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì(Ad Hoc) ËÃ×Í¡ÒÃàª×èÍÁµèÍä»Âѧ¨Ø´àª×èÍÁµèÍ·Õè«è͹äÇé(Stealth/Closed Mode) ãËé·ÓµÒÁ¢Ñ鹵͹µèÍ仹Õé

1.

2.

¨Ø´àª×èÍÁµèÍ·Õè«è͹ ¤×ͨشàª×èÍÁµèÍ·ÕèÁÕÍÂÙè áµèä´éÃѺ¡ÒáÓ˹´¤èҤ͹¿Ô¡ãËéäÁèÊÒÁÒöµÃǨËÒä´éâ´Â¡ÒÃãªé¤ÓÊÑè§Ê᡹à¾×èÍ»éͧ¡Ñ¹¤ÇÒÁ¾ÂÒÂÒÁ㹡ÒÃà¢éÒã ªé§Ò¹¨Ò¡¼Ùéãªé·ÕèäÁèä´éÃѺ͹ØÒµ

ã¹ÇÔ¹â´ÇìÃÒ¡Òà Profile ãËé¤ÅÔ¡ New»é͹¢éÍÁÙÅ Profile Name áÅÐ Network Nameª×èÍà¹çµàÇÔÃ졤×ÍÍÐäÃ?

ª×èÍà¹çµàÇÔÃì¡ ¤×ͪ×èÍ·ÕèäÇÃìàÅÊÍÐá´»àµÍÃìãªéà¾×èÍÃкءÒÃàª×èÍÁµèÍ ãËé»é͹ª×èÍà¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì·Õè µéͧ¡ÒÃÊÃéÒ§ (àªè¹ P2P) ËÃ×ͪ×èͧ͢¨Ø´àª×èÍÁµèÍ ·Õèµéͧ¡ÒÃàª×èÍÁµèÍ ª×èÍÊÓËÃѺÃкØà¹çµàÇÔÃì¡ (ÁÕ¤ÇÒÁµèÒ§

ÃÐËÇèÒ§ÍÑ¡ÉþÔÁ¾ìãËáÅÐàÅç¡)è ÊÓËÃѺª×èͧ͢¨Ø´àª×èÍÁµèÍ ãËéµÃǨÊͺ¡ÒõÑ駤èÒ¨Ò¡¨Ø´àª×èÍÁµèÍ ËÃ×Í Êͺ¶ÒÁ¨Ò¡¼Ùé´ÙáÅÃкºäÇÃìàÅÊà¹çµàÇÔÃ졢ͧ¤Ø³

3.ã¹ÇÔ¹â´ÇìAdvanced ãËé¡Ó˹´¤èÒ Network typeâËÁ´¢Í§à¹çµàÇÔÃì¡:Ad- Hoc - àÅ×Í¡à¾×èÍàª×èÍÁµè͡Ѻà¹çµàÇÔÃì¡ Ad HocAccess Point - àÅ×Í¡à¾×èÍàª×èÍÁµè͡Ѻ¨Ø´àª×èÍÁµèÍ

4.ã¹ÇÔ¹â´ÇìSecurity ãËéàÅ×Í¡ Set Security Method ÊÓËÃѺà¹çµàÇÔÃì¡ Ad Hoc à¾×èÍàª×èÍÁµèÍ ¡ÒÃàª×èÍÁµèÍä»Âѧ¨Ø´àª×èÍÁµèÍ ãËéàÅ×Í¡ Set Security Method µÒÁ¡ÒõÑ駤èÒ㹨شàª×èÍÁµèÍ

á¹Ð¹ÓãËé¡Ó˹´¤èҤ͹¿Ô¡ WEP Key à¾×èÍ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂàÁ×èÍÁÕ¡ÒÃÊÃéÒ§â»Ãä¿Åìà¹çµàÇÔÃì¡áºº Ad Hoc

5.ËÅѧ¨Ò¡ÊÃéÒ§â»Ãä¿ÅìáÅéÇ â»Ãä¿ÅìãËÁè¨Ð»ÃÒ¡¯¢Öé¹ã¹ÃÒ¡Òà Profile ´ÑºàºÔŤÅÔ¡·Õèâ»Ãä¿Åì·Õèàª×èÍÁµè͡Ѻà¹çµàÇÔÃì¡â´Âãªéâ»Ãä¿Åì¹Ñé¹

¡ÒÃàª×èÍÁµè͡ѺÍÔ¹àµÍÃìà¹çµ 51