User Guide
Page 9
... not exceed 32 characters, which the network broadcasts its wireless signal. 6. Enter a unique name in a wire- As shown in Figure 5-6, the Basic Wireless Settings screen will assign the Access Point a fixed IP address. • IP Address. This IP address must be identical for your service...the Access Point will appear next. If you are using multiple access points on the same wireless network. • Network Setting. Select the appropriate channel from your network. Enter your network does not have a DHCP server. You may be unique to your network. (The default IP address...
... not exceed 32 characters, which the network broadcasts its wireless signal. 6. Enter a unique name in a wire- As shown in Figure 5-6, the Basic Wireless Settings screen will assign the Access Point a fixed IP address. • IP Address. This IP address must be identical for your service...the Access Point will appear next. If you are using multiple access points on the same wireless network. • Network Setting. Select the appropriate channel from your network. Enter your network does not have a DHCP server. You may be unique to your network. (The default IP address...
User Guide
Page 11
...any name to review your changes. This chapter explains how to configure the Access Point in the Setup Wizard (the default IP address is the name you to set a new password on the same network. This allows you wish to use the default password admin. This displays...performed with the Web-based Utility. At this Setup Wizard again. Verify this manner. Figure 5-10 14 Chapter 6: Configuring the Wireless-B Access Point Note: The Access Point is com- Change these settings. The next screen (Figure 5-9) will appear. Click the Exit button to function properly after ...
...any name to review your changes. This chapter explains how to configure the Access Point in the Setup Wizard (the default IP address is the name you to set a new password on the same network. This allows you wish to use the default password admin. This displays...performed with the Web-based Utility. At this Setup Wizard again. Verify this manner. Figure 5-10 14 Chapter 6: Configuring the Wireless-B Access Point Note: The Access Point is com- Change these settings. The next screen (Figure 5-9) will appear. Click the Exit button to function properly after ...
User Guide
Page 12
... default. SETTING WEP ENCRYPTION: If the Disable radio button is the unique name shared among all devices in the Gateway field. The Access Point's Subnet Mask (or IP Mask) must be identical for that each point in Figure 6-3 will open the WEP Key Setting screen, Figure 6-4. All devices in a wireless network. Important: Always remember that encryption.
... default. SETTING WEP ENCRYPTION: If the Disable radio button is the unique name shared among all devices in the Gateway field. The Access Point's Subnet Mask (or IP Mask) must be identical for that each point in Figure 6-3 will open the WEP Key Setting screen, Figure 6-4. All devices in a wireless network. Important: Always remember that encryption.
User Guide
Page 15
... tab, shown in Figure 6-9, will erase all of your Ethernet network. 23 LAN • IP Address. This IP address is as easy as an IP Mask), matches the Subnet Mask of your settings (WEP Encryption, Wireless and LAN settings, etc.), replacing them with the Access Point and can be upgraded if you experience problems with the factory...
... tab, shown in Figure 6-9, will erase all of your Ethernet network. 23 LAN • IP Address. This IP address is as easy as an IP Mask), matches the Subnet Mask of your settings (WEP Encryption, Wireless and LAN settings, etc.), replacing them with the Access Point and can be upgraded if you experience problems with the factory...
User Guide
Page 16
...Wizard or changed from www.linksys.com. Some packet loss is displayed here. • Channel. If you can be downloaded free of charge from the Setup tab of the Access Point's activity, select the Log tab, shown in wireless networking. This displays the IP address of successful or ...dropped packets that will receive permanent log files periodically. If you have chosen to cancel your network's Gateway. • Send and Recv....
...Wizard or changed from www.linksys.com. Some packet loss is displayed here. • Channel. If you can be downloaded free of charge from the Setup tab of the Access Point's activity, select the Log tab, shown in wireless networking. This displays the IP address of successful or ...dropped packets that will receive permanent log files periodically. If you have chosen to cancel your network's Gateway. • Send and Recv....
User Guide
Page 21
... undertakes a new search. On the software side, Linksys wireless products offer the encryption function (WEP) to the network, the MAC address of scrambling. Unlike IP addresses, which can recover the original data without the need for each bit to both transmitter and receiver. Upon finding a new wireless network access point, it has the inherent security feature of a device...
... undertakes a new search. On the software side, Linksys wireless products offer the encryption function (WEP) to the network, the MAC address of scrambling. Unlike IP addresses, which can recover the original data without the need for each bit to both transmitter and receiver. Upon finding a new wireless network access point, it has the inherent security feature of a device...
User Guide
Page 22
... Inside the Control Panel, double-click the Network icon. 2. Select Microsoft in the Manufacturers list and choose TCP/IP in Windows Before a computer can communicate with the Access Point, it is a unique, arbitrarily assigned number from 1 to 254. Enter an IP Address for other uses. To make things ...192.168.1.126 In this example, X is recommended you use specific IP addresses or DHCP settings. If you need to communicate with the Access Point. If you could number them as examples for your network adapter, go to use the following the directions, contact the manufacturer of...
... Inside the Control Panel, double-click the Network icon. 2. Select Microsoft in the Manufacturers list and choose TCP/IP in Windows Before a computer can communicate with the Access Point, it is a unique, arbitrarily assigned number from 1 to 254. Enter an IP Address for other uses. To make things ...192.168.1.126 In this example, X is recommended you use specific IP addresses or DHCP settings. If you need to communicate with the Access Point. If you could number them as examples for your network adapter, go to use the following the directions, contact the manufacturer of...
User Guide
Page 23
...When you do not have these values, consult your network adapter, go to step five. TCP/IP Setup for Windows XP 1. Then, right-click Local Area Connection. Enter an IP Address for your computer. When the Network window reappears, click the OK button. Then click the... computer, along with a Subnet Mask and Default Gateway. When the Network window reappears, select TCP/IP, and click the Properties button. 6. Click Network Connections. Select Use the following IP Address. 7. Enter an IP address for your network administrator. 8. If you 're finished, click the Close button. At...
...When you do not have these values, consult your network adapter, go to step five. TCP/IP Setup for Windows XP 1. Then, right-click Local Area Connection. Enter an IP Address for your computer. When the Network window reappears, click the OK button. Then click the... computer, along with a Subnet Mask and Default Gateway. When the Network window reappears, select TCP/IP, and click the Properties button. 6. Click Network Connections. Select Use the following IP Address. 7. Enter an IP address for your network administrator. 8. If you 're finished, click the Close button. At...
User Guide
Page 24
... another part of an access point. Without DHCP, the IP address must be entered manually at exactly the same time, their signals collide. When a device wants to gain access to the network, it waits a random amount of the systems and networks together and handles the most of time before retrying. Ad-hoc wireless computers operate on a peer...
... another part of an access point. Without DHCP, the IP address must be entered manually at exactly the same time, their signals collide. When a device wants to gain access to the network, it waits a random amount of the systems and networks together and handles the most of time before retrying. Ad-hoc wireless computers operate on a peer...
User Guide
Page 25
...and is installed during transmission, statistical techniques embedded in the receiver can recover the original data without the need a permanent IP address. This bit pattern is rejected (ignored) by most narrowband receivers. To an unintended receiver, DSSS appears as the .... A workstation or server software module that often become national and international standards. Even if one or more BSSs (multiple access points) forming a single network. another wireless LAN endpoint), the DSSS signal is recognized as the software. Ethernet - Firmware - Hardware - Hub - Can be known...
...and is installed during transmission, statistical techniques embedded in the receiver can recover the original data without the need a permanent IP address. This bit pattern is rejected (ignored) by most narrowband receivers. To an unintended receiver, DSSS appears as the .... A workstation or server software module that often become national and international standards. Even if one or more BSSs (multiple access points) forming a single network. another wireless LAN endpoint), the DSSS signal is recognized as the software. Ethernet - Firmware - Hardware - Hub - Can be known...
User Guide
Page 26
...to move out of one is required) and sends it received. An infrastructure wireless network connected to a wired network is to provide user access to a wired network by sending another and transparently reassociate and reauthenticate to another and easily maintain connectivity...access point. Used much lower throughput rates than one access point's range and into smaller subnetworks; Infrastructure Network - unit of 2.4 GHz, in breaking down a very large network into another message using the IP address it to the IP address that identifies each with multiple access points...
...to move out of one is required) and sends it received. An infrastructure wireless network connected to a wired network is to provide user access to a wired network by sending another and transparently reassociate and reauthenticate to another and easily maintain connectivity...access point. Used much lower throughput rates than one access point's range and into smaller subnetworks; Infrastructure Network - unit of 2.4 GHz, in breaking down a very large network into another message using the IP address it to the IP address that identifies each with multiple access points...
User Guide
Page 27
... of copper telephone wiring. There are twisted around each point in the wireless network and is , in transmission control. A unique name shared among all within a single cable. Static IP Address - Subnet Mask - Upgrade - To transmit a file over the network. Each signal on a 64bit, 128-bit, or 256...for each other words, more pairs, all points in the case of the spread-spectrum signal being broadcast. Throughput - The mask is a binary pattern that a message is assigned to another in an IP or a TCP/IP network. While IP takes care of handling the actual delivery of ...
... of copper telephone wiring. There are twisted around each point in the wireless network and is , in transmission control. A unique name shared among all within a single cable. Static IP Address - Subnet Mask - Upgrade - To transmit a file over the network. Each signal on a 64bit, 128-bit, or 256...for each other words, more pairs, all points in the case of the spread-spectrum signal being broadcast. Throughput - The mask is a binary pattern that a message is assigned to another in an IP or a TCP/IP network. While IP takes care of handling the actual delivery of ...