List of Figures
Figure 254 Windows XP: Control Panel: Network Connections: Properties
......................................... 440
Figure 255 Windows XP: Local Area Connection Properties ...............................................................
440
Figure 256 Windows XP: Advanced TCP/IP Settings ..........................................................................
441
Figure 257 Windows XP: Internet Protocol (TCP/IP) Properties ..........................................................
442
Figure 258 Macintosh OS 8/9: Apple Menu ..........................................................................................
443
Figure 259 Macintosh OS 8/9: TCP/IP .................................................................................................
Figure 260 Macintosh OS X: Apple Menu ............................................................................................
444
Figure 261 Macintosh OS X: Network ..................................................................................................
445
Figure 262 Pop-up Blocker ...................................................................................................................
447
Figure 263 Internet Options: Privacy ....................................................................................................
448
Figure 264 Internet Options: Privacy ....................................................................................................
449
Figure 265 Pop-up Blocker Settings .....................................................................................................
Figure 266 Internet Options: Security ...................................................................................................
450
Figure 267 Security Settings - Java Scripting .......................................................................................
451
Figure 268 Security Settings - Java ......................................................................................................
Figure 269 Java (Sun) ..........................................................................................................................
452
Figure 270 Network Number and Host ID ............................................................................................
454
Figure 271 Subnetting Example: Before Subnetting ............................................................................
456
Figure 272 Subnetting Example: After Subnetting ...............................................................................
457
Figure 273 Peer-to-Peer Communication in an Ad-hoc Network .........................................................
461
Figure 274 Basic Service Set ...............................................................................................................
462
Figure 275 Infrastructure WLAN ...........................................................................................................
463
Figure 276 RTS/CTS ...........................................................................................................................
464
Figure 277 WPA(2) with RADIUS Application Example .......................................................................
471
Figure 278 WPA(2)-PSK Authentication ...............................................................................................
472
31
P-2602HWLNI User’s Guide