April 2004, 202-10018-02
x Contents
Install or Verify Windows Networking Components ................................................. C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4  ............................... C-8
DHCP Configuration of TCP/IP in Windows XP  ..................................................... C-8
DHCP Configuration of TCP/IP in Windows 2000  ................................................ C-10
DHCP Configuration of TCP/IP in Windows NT4 .................................................. C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4  .............................. C-15
Configuring the Macintosh for TCP/IP Networking ...................................................... C-16
MacOS 8.6 or 9.x  .................................................................................................. C-16
MacOS X ............................................................................................................... C-16
Verifying TCP/IP Properties for Macintosh Computers  ......................................... C-17
Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used?  ................................................................................... C-18
What Is Your Configuration Information?  .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers  ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers  ..................... C-20
Restarting the Network ................................................................................................ C-21
Appendix D  
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ................................................................................................. D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................D-2
Authentication and WEP Data Encryption ..................................................................... D-2
802.11 Authentication .............................................................................................. D-3
Open System Authentication ................................................................................... D-3
Shared Key Authentication ...................................................................................... D-4
Overview of WEP Parameters  ................................................................................ D-5
Key Size .................................................................................................................. D-6
WEP Configuration Options  .................................................................................... D-7
Wireless Channels ......................................................................................................... D-7
WPA Wireless Security .................................................................................................. D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i?  ........................................................ D-10
What are the Key Features of WPA Security? ...................................................... D-10
WPA Authentication: Enterprise-level User  
Authentication via 802.1x/EAP and RADIUS .................................................. D-12