3
Overview..............................................................................................................................................15
(Infrastructure mode) .................................................................................................................15
(Ad-hoc mode)...........................................................................................................................16
SSID ..........................................................................................................................................18
Channels ...................................................................................................................................18
Authentication methods .............................................................................................................19
Encryption methods...................................................................................................................19
Network key...............................................................................................................................20
for a wireless network....................................................................................................................25
4
®
only) .......................................................................................................................12
®
®
®
.....................................................................................................13
®
...................................................................................................14
TM
software to configure your machine
®
only) .......................................................................................................................26
®
®
®
.....................................................................................................28
®
...................................................................................................29
®
viii