NETGEAR MR814v2 User Manual

Page 9

Advertising
background image

Contents

ix

DHCP Configuration of TCP/IP in Windows XP ..................................................... C-8
DHCP Configuration of TCP/IP in Windows 2000 ................................................ C-10
DHCP Configuration of TCP/IP in Windows NT4 .................................................. C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4 .............................. C-15

Configuring the Macintosh for TCP/IP Networking ...................................................... C-16

MacOS 8.6 or 9.x .................................................................................................. C-16
MacOS X ............................................................................................................... C-16
Verifying TCP/IP Properties for Macintosh Computers ......................................... C-17

Verifying the Readiness of Your Internet Account ....................................................... C-18

Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20

Restarting the Network ................................................................................................ C-21

Appendix D

Wireless Networking Basics

Wireless Networking Overview ...................................................................................... D-1

Infrastructure Mode ................................................................................................. D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................ D-2

Authentication and WEP ................................................................................................ D-3

802.11b Authentication ............................................................................................ D-3
Open System Authentication ................................................................................... D-4
Shared Key Authentication ...................................................................................... D-4
Overview of WEP Parameters ................................................................................ D-5
Key Size .................................................................................................................. D-6
WEP Configuration Options .................................................................................... D-7

Wireless Channels ......................................................................................................... D-7

Glossary

Index

Advertising