Netgear WGT624 WGT624v1 Reference Manual - Page 11
Appendix D, Wireless Networking Basics, Glossary, Index - as extender
UPC - 606449030020
View all Netgear WGT624 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 11 highlights
Are Login Protocols Used C-18 What Is Your Configuration Information C-18 Obtaining ISP Configuration Information for Windows Computers C-19 Obtaining ISP Configuration Information for Macintosh Computers C-20 Restarting the Network C-21 Appendix D Wireless Networking Basics Wireless Networking Overview D-1 Infrastructure Mode D-1 Ad Hoc Mode (Peer-to-Peer Workgroup D-2 Network Name: Extended Service Set Identification (ESSID D-2 Authentication and WEP D-3 802.11 Authentication D-3 Open System Authentication D-4 Shared Key Authentication D-4 Overview of WEP Parameters D-5 Key Size ...D-6 WEP Configuration Options D-7 Wireless Channels ...D-7 Glossary List of Glossary Terms G-1 Index Contents xi M-10153-01
Contents
xi
M-10153-01
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP
................................................................................................
D-3
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-4
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
Glossary
List of Glossary Terms
...................................................................................................
G-1
Index