Contents
iii
November 2004 202-10038-01
Connecting to the Rhapsody Server
...............................................................................
6-4
Playing Media
.................................................................................................................
6-4
Firewalls
.........................................................................................................................
6-5
Glossary
List of Glossary Terms
...................................................................................................
G-1
Appendix A
Technical Specifications
....................................................................................................
A-1
Appendix B
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
B-1
Infrastructure Mode
.................................................................................................
B-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
B-2
Network Name: Extended Service Set Identification (ESSID)
................................
B-2
Wireless Channels
..................................................................................................
B-2
WEP Wireless Security
..................................................................................................
B-4
WEP Authentication
................................................................................................
B-4
WEP Open System Authentication
.........................................................................
B-5
WEP Shared Key Authentication
............................................................................
B-6
How to Use WEP Parameters
.................................................................................
B-8
WPA Wireless Security
..................................................................................................
B-8
How Does WPA Compare to WEP?
........................................................................
B-9
How Does WPA Compare to IEEE 802.11i?
........................................................
B-10
What are the Key Features of WPA Security?
......................................................
B-10
Is WPA Perfect?
....................................................................................................
B-16
Product Support for WPA
......................................................................................
B-16
Index