HP ProBook 4545s HP Notebook User Guide - Linux - Page 32

Roaming to another network, Using Bluetooth wireless devices (select models only)

Page 32 highlights

NOTE: HP recommends that you select WPA2, which is the most advanced of the three encryption protocols. The use of WEP encryption is not recommended, because it can be overcome with little effort. ● Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) use security standards to encrypt and decrypt data transmitted over the network. Both WPA and WPA2 dynamically generate a new key for every packet, and they also generate a different set of keys for each computer on the network. To accomplish this: ◦ WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP). ◦ WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is a new AES protocol. ● Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without the correct key, others will not be able to use the WLAN. Roaming to another network When you move your computer within range of another WLAN, the operating system attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If the operating system does not recognize the new network, follow the same procedure you used initially to connect to your WLAN. Using Bluetooth wireless devices (select models only) A Bluetooth device provides short-range wireless communications that replace the physical cable connections that traditionally link electronic devices such as the following: ● Computers ● Phones ● Audio devices The strength of Bluetooth is in synchronizing information transfers between your computer and wireless devices. The inability to consistently connect two or more computers to share the Internet through Bluetooth is a limitation of Bluetooth and the operating system. Bluetooth devices provide peer-to-peer capability that allows you to set up a personal area network (PAN) of Bluetooth devices. For information on configuring and using Bluetooth devices, refer to the Bluetooth software Help. Connecting to a wired network Connecting to a local area network (LAN) (select models only) Connecting to a local area network (LAN) requires an 8-pin, RJ-45 network cable (purchased separately). If the network cable contains noise suppression circuitry (1), which prevents interference from TV and radio reception, orient the circuitry end of the cable (2) toward the computer. 22 Chapter 3 Networking

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100

NOTE:
HP recommends that you select WPA2, which is the most advanced of the three encryption
protocols. The use of WEP encryption is not recommended, because it can be overcome with little
effort.
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) use security standards to
encrypt and decrypt data transmitted over the network. Both WPA and WPA2 dynamically
generate a new key for every packet, and they also generate a different set of keys for each
computer on the network. To accomplish this:
WPA uses Advanced Encryption Standard (AES) and Temporal Key Integrity Protocol
(TKIP).
WPA2 uses Cipher Block Chaining Message Authentication Code Protocol (CCMP), which
is a new AES protocol.
Wired Equivalent Privacy (WEP) encrypts data with a WEP key before it is transmitted. Without
the correct key, others will not be able to use the WLAN.
Roaming to another network
When you move your computer within range of another WLAN, the operating system attempts to
connect to that network. If the attempt is successful, your computer is automatically connected to the
new network. If the operating system does not recognize the new network, follow the same procedure
you used initially to connect to your WLAN.
Using Bluetooth wireless devices (select models only)
A Bluetooth device provides short-range wireless communications that replace the physical cable
connections that traditionally link electronic devices such as the following:
Computers
Phones
Audio devices
The strength of Bluetooth is in synchronizing information transfers between your computer and
wireless devices. The inability to consistently connect two or more computers to share the Internet
through Bluetooth is a limitation of Bluetooth and the operating system.
Bluetooth devices provide peer-to-peer capability that allows you to set up a personal area network
(PAN) of Bluetooth devices. For information on configuring and using Bluetooth devices, refer to the
Bluetooth software Help.
Connecting to a wired network
Connecting to a local area network (LAN) (select models only)
Connecting to a local area network (LAN) requires an 8-pin, RJ-45 network cable (purchased
separately). If the network cable contains noise suppression circuitry
(1)
, which prevents interference
from TV and radio reception, orient the circuitry end of the cable
(2)
toward the computer.
22
Chapter 3
Networking