List of Figures
P-870HW-51a v2 User’s Guide
20
Figure 125 Ubuntu 8: Network Settings > Connections ........................................................................ 188
Figure 126 Ubuntu 8: Network Settings > Properties ........................................................................... 189
Figure 127 Ubuntu 8: Network Settings > DNS ...................................................................................189
Figure 128 Ubuntu 8: Network Tools .................................................................................................... 190
Figure 129 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 191
Figure 130 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 191
Figure 131 openSUSE 10.3: YaST Control Center .............................................................................. 192
Figure 132 openSUSE 10.3: Network Settings .................................................................................... 192
Figure 133 openSUSE 10.3: Network Card Setup ............................................................................... 193
Figure 134 openSUSE 10.3: Network Settings .................................................................................... 194
Figure 135 openSUSE 10.3: KNetwork Manager ................................................................................. 195
Figure 136 openSUSE: Connection Status - KNetwork Manager ........................................................ 195
Figure 137 Pop-up Blocker ................................................................................................................... 197
Figure 138 Internet Options: Privacy .................................................................................................... 198
Figure 139 Internet Options: Privacy .................................................................................................... 199
Figure 140 Pop-up Blocker Settings ..................................................................................................... 199
Figure 141 Internet Options: Security ................................................................................................... 200
Figure 142 Security Settings - Java Scripting ....................................................................................... 201
Figure 143 Security Settings - Java ...................................................................................................... 201
Figure 144 Java (Sun) .......................................................................................................................... 202
Figure 145 Mozilla Firefox: Tools > Options ......................................................................................... 203
Figure 146 Mozilla Firefox Content Security ......................................................................................... 203
Figure 147 Network Number and Host ID ............................................................................................ 206
Figure 148 Subnetting Example: Before Subnetting ............................................................................ 208
Figure 149 Subnetting Example: After Subnetting ............................................................................... 209
Figure 150 Conflicting Computer IP Addresses Example .................................................................... 213
Figure 151 Conflicting Computer IP Addresses Example .................................................................... 213
Figure 152 Conflicting Computer and Router IP Addresses Example .................................................. 214
Figure 153 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 215
Figure 154 Basic Service Set ............................................................................................................... 216
Figure 155 Infrastructure WLAN ........................................................................................................... 217
Figure 156 RTS/CTS ........................................................................................................................... 218
Figure 157 WPA(2) with RADIUS Application Example ....................................................................... 225
Figure 158 WPA(2)-PSK Authentication ............................................................................................... 226