
WiFi connection utility can easily help you set up a security method for your WLAN.
Common security methods for WLANs use keys or passwords, where the computer
requesting access must provide the key or password to get access. WLANs can also use
encryption to encode the data. With encryption, before a computer transmits data it uses a
secret encryption key to scramble the data. The receiving computer uses this same key to
unscramble the data. If you connect to an existing network, use the encryption key provided
by the administrator of the wireless network. If you set up your own network, you can make
up your own key and use it on each computer. The WiFi connection utility can help you do
this. The security method used by your computer to get WLAN access is stored in the profile.
See Security for more helpful information.
Identify a Wireless Network
Depending on the size and components of a wireless network, there are different ways to
identify a wireless network:
● The Network Name or Service Set Identifier (SSID): Identifies a wireless
network. All wireless devices on the network must use the same SSID. This is
probably the most common method.
● Basic Service Set (BSS): Consists of two or more wireless nodes, or stations, which
have recognized each other and have established communications.
● Broadcast SSID: An access point can respond to computers sending probe packets
with the broadcast SSID. If this feature is enabled on the access point, any wireless
user can associate with the access point by using a blank (null) SSID.
● Basic Service Set Identifier (BSSID): A unique identifier for each wireless device.
The BSSID is the Ethernet MAC address of the device.
● Extended Service Set Identifier (ESSID): A special case of SSID used to identify a
wireless network that includes access points.
● Independent Basic Service Set (IBSS): A mode of operation in an 802.11 system
that allows direct communication between 802.11 devices without the need to set up
a communication session with an access point.
● Independent Basic Service Set Identifier (IBSSID): A special case of SSID used
to identify a network of wireless computers configured to communicate directly with
one another without using an access point.
Select a Wireless Network Mode
Wireless networks can operate with or without access points, depending on the number of
users in the network. Infrastructure mode uses access points to allow wireless computers to
send and receive information. Wireless computers transmit to the access point, the access
point receives the information and rebroadcasts it to other computers. The access point can
also connect to a wired network or to the Internet. Multiple access points can work together
to provide coverage over a wide area.
Device-to-Device mode, also called ad hoc mode, works without access points and allows
Comentarios a estos manuales