Hardware-Software Guide
Page 143
...separate critical network functions. ■ A home or small office WLAN typically uses a wireless router, which enables several wireless and wired computers to share an Internet connection, a printer, and files without additional pieces of 3 IEEE physical layer standards: ■ 802.11a ■ 802.11b ...■ 802.11g Hardware and Software Guide 11-3 Wireless access point and wireless router are often used interchangeably. Notebooks with 802....
...separate critical network functions. ■ A home or small office WLAN typically uses a wireless router, which enables several wireless and wired computers to share an Internet connection, a printer, and files without additional pieces of 3 IEEE physical layer standards: ■ 802.11a ■ 802.11b ...■ 802.11g Hardware and Software Guide 11-3 Wireless access point and wireless router are often used interchangeably. Notebooks with 802....
Hardware-Software Guide
Page 145
... provider (ISP) 1. ■ An optional wireless router (purchased separately) 2. ■ Your wireless notebook 3. The illustration below shows an example of a completed wireless network installation that is connected to the Internet. As this network grows, additional wireless and wired computers can be connected to the network to access the Internet. ✎ If you need technical...
... provider (ISP) 1. ■ An optional wireless router (purchased separately) 2. ■ Your wireless notebook 3. The illustration below shows an example of a completed wireless network installation that is connected to the Internet. As this network grows, additional wireless and wired computers can be connected to the network to access the Internet. ✎ If you need technical...
Hardware-Software Guide
Page 147
If you do not enable security on your WLAN, an unauthorized wireless user can access your notebook data and use one or more information about WLAN security, refer to use your Internet connection without your Web browser. ■ Enable MAC address filtering on your knowledge. The most common security levels are protecting the... When you set up your own WLAN or access an existing WLAN, always ensure that security features are Wi-Fi Protected Access (WPA)-Personal and Wired Equivalent Privacy (WEP).
If you do not enable security on your WLAN, an unauthorized wireless user can access your notebook data and use one or more information about WLAN security, refer to use your Internet connection without your Web browser. ■ Enable MAC address filtering on your knowledge. The most common security levels are protecting the... When you set up your own WLAN or access an existing WLAN, always ensure that security features are Wi-Fi Protected Access (WPA)-Personal and Wired Equivalent Privacy (WEP).