How a Wireless NetWorks



How a Wireless NetWorks
R V N E T W O R K I N G. C O M
A Wireless Net Works!
February 2004
A Wireless Net Works!
Version 1.0
Palm Springs, California
Copyright Notices
Licensee agrees that on all copies of the Materials it shall affix the following notice:
© RVNETWORKING.COM 2001-2004. All Rights Reserved. Unauthorized use or distribution is
strictly prohibited.
The Materials delivered hereunder are provided "AS IS", without any warranty of any kind. ALL
2 -Wa y S ate l l it e U s er s
N etw o r k Dia g r a ms
R al l y
2 00 4
Table of Contents
A Wireless Net Works! i
Overview 2
Using a Network to Increase Productivity
Ethernet and Hubs 4
And, Then Came Bridges 4
Arrival of the Router 5
Networking Terminology and Concepts 6
Three Essential Elements of Networking 6
What is a Network? 7
Addressing Network Addressing 8
How Does Data Flow? 10
Demo Network 11
What is an Ethernet LAN? 13
Media Access Control 13
Ethernet/802.3 Variations 14
What is Wi-Fi? 15
IEEE 802.11 - Wireless LANs (WLANs)
WLAN Types - Operating Modes 16
Security 16
WLAN MAC and Collisions 17
Other 802.11 Details 18
Wi-Fi Alphabet Soup
Roaming in a WLAN 20
Reusing 802.11b and 802.11g Channels 21
Reusing 802.11a Channels 22
Increasing the Available Bandwidth 23
Identifying Wi-Fi Devices 24
Wireless Adapter 24
Access Point 25
Residential Gateway 25
Part 2 - Configuration
Configuring Wireless LANs 2
Configuring an Ad Hoc Client 2
Configuring an Infrastructure Client 6
Using Windows Services for Wireless Networks
Configuring an Access Point 11
Example Satellite Users’ Networks 15
Using a DW4000 - Example 1 15
Using a DW6000 - Example 2 16
Using a DW6000 - Example 3 17
Using a DW4020 - Example 4 18
Table of Contents iii
Miscellaneous Topics 19
Domain Name Services (DNS) 19
Address Resolution Protocol (ARP) 19
Private Addresses and Network Address (Port)Translation (NAT/NAPT)
Proxy Servers 20
Windows Miscellany 20
Windows Warnings 21
Q & A and Hands-on Session
iv A Wireless Net Works!
A Wireless Net Works!
and Wi-Fi!
(Maybe a bit about IP, too)
February 2004
BJ Consulting, Inc.
The purpose of this document is to first provide a little information about networks and why they are
used. Then, the focus will be on understanding what a Local Area Network (LAN) is, how Ethernet
and wireless LANs work, and how to set them up.
Connecting to the Internet and sharing the connection with everyone on the LAN - even if that LAN
consists of only two users - is something that more-and-more people are doing these days. This
document should be of interest to anyone in that group.
Why Use a Network?
Networking Terminology and Concepts
What is an Ethernet LAN?
What is Wi-Fi?
Wi-Fi Alphabet Soup
What is an Access Point? A Residential Gateway?
Configuring Wireless LANs (WLANs)
Example Configurations
Miscellaneous Stuph
Hands-on Lab
The following topics will be covered:
• Why are networks used? - The short answer is: so you can both be online, at the same time.
• Networking terminology - A few important terms are defined, to provide a common foundation
for understanding.
• How does an Ethernet LAN work? - The function of Ethernet LANs will be briefly discussed.
• How does a WLAN work? - The function of Wi-Fi/wireless LANs (WLANs) will be discussed.
• Wi-Fi alphabet soup - The different “flavors” of WLANs will be described and compared.
• Access points and gateways - An access point and a residential gateway device will be described
and contrasted with legacy network devices including hubs, bridges, switches, and routers.
• Configuring WLANs - The parameters that can be changed and how to set them are covered.
• Example configuration - Examples will be shown for each of the two types of WLANs.
• Miscellaneous topics - Things discussed here include DHCP (Dynamic Host Configuration
Protocol), NAT (Network Address Tranlation), Proxy servers, and certain error messages.
• Hands-on Lab - Setting up a wireless infrastructure LAN will be the objective of the session. You
should bring a fully-charged laptop and a wireless NIC (I have 3 to loan). You will follow a lab
sheet, to configure a laptop and surf the Internet.
Why Use a Network? – Productivity!
Using a Network to Increase Productivity
When Local Area Networks (LANs) started appearing in the workplace, it didn’t take management
long to figure out that if you put all the PCs and the (expensive) peripherals on a cable, then everyone
could access the resources — without ever leaving their desk! Not only that, but they could now
cost-justify the resource across all members of the LAN.
Networks went from being a “nice” frill, to a “necessary” investment” to a “business essential”!
And, of course, networks allow you to both be online, at the same time!
Then Came Hubs, Bridges and
Multiple Collision Domains
One Broadcast Domain
One Collision Domain
Multiple Collision Domains
Multiple Broadcast Domains
Ethernet and Hubs
As PCs proliferated and the value of networks became common knowledge, more and more PCs
were put onto local networks (LANs). Ethernet LANs dominated the landscape and Ethernet LANs
can only support a limited number of users. When there are too many users on the LAN, the number
of data “collisions” becomes excessive, sometimes to the point of the LAN becoming almost useless.
At best, the network works, but very slowly. Everyone is said to be in the same collision domain.
This means that if more than one PC transmits at a time, a collision will occur. Then, all
transmissions become garbage.
When Ethernet networks started using Unshielded Twisted Pair (UTP) cable, which is just higher
grade telephone cable, devices called hubs were used to interconnect all the devices on the LAN.
They were all plugged into the hub. Everyone was still in the same collision domain, cause a hub
will repeat every transmission that comes in, out every other port. So, everyone still hears the
And, Then Came Bridges
When users started complaining about the network being too slow, bridges were developed. Bridges
segment the network into multiple collision domains, one per port. This means one PC on each port
can transmit at the same time without problems. Bridges typically have two or three ports. Switches,
which came much later, have many ports: at least 8, typically, and perhaps hundreds. Bridges and
switches use the same undelying technology: bridging. Switches just have a lot more “bells and
There is one type of message called a broadcast. A broadcast is for all hosts on the network. Bridges
and switches will always forward broadcasts out all ports. When bridged networks grew to be quite
complex, and especially if there were backup (redundant) bridges in place, a new problem arose in
the network environment: broadcast storms. Because all bridges forwarded all broadcasts out all
ports, these messages to everyone could sometimes hog all of the available bandwidth. This tended
to happen in the mornings, when many employees all turned on their PCs at about the same time and
their PCs all started sending out broadcast messages, to try and locate network resources.
As said earlier, each port of a bridge defines a collision domain. However, all ports are said to be in
the same broadcast domain.
Arrival of the Router
One of the primary reasons for the creation of the router was to contain broadcasts – to eliminate
broadcast storms. Each port or interface of a router defines both a collision domain and a broadcast
domain. Broadcast messages on one port are not forwarded out any other interfaces, by default.
As it turns out, routers can also provide additional security. In fact, the original firewall was nothing
more than filters configured on a router.
A router’s primary goal is to forward packets - from one IP subnet (broadcast domain) to another!
Three Essential Elements
Data Services
Something to Share - Data
Rules - For Sending and Receiving Data
Pathway – UTP or the Air
Networking Terminology and Concepts
This section will provide definitions and descriptions of some important networking concepts and
terms. Later sections will use these terms to furrther clarify the understanding. Let’s start by defining
the essential elements for networking.
Three Essential Elements of Networking
One good description of a network and networking says that there are three essential elements:
• Something to Share – In the case of a computer data network, this is data. In the Public Switched
Telephone Network (PSTN), it is voice.
• Pathway – There must be a pathway connecting the entities that have something to share. For
computer networks, this is the media and all intervening devices. For the PSTN, it is the twisted
pair wires that connect each home to the central-office telephone switch at each end, and all
connecting wires and switches in-between.
• Rules – Rules, or protocols, define how something is accomplished. At a presentation such as
this, for example, the usual protocol is that a listener will raise his/her hand or otherwise get the
presenter’s attention if there is a question, rather than just blurt it out. For computer networks,
there are many, many protocols in use, many of which have commonly used TLAs (Three-Letter
Acronyms), like TCP (Transmission Control Protocol) and FTP (File Transfer Protocol). Some,
of course, have only two, or more than three letters, like IP (Internet Protocol) and SMTP (Simple
Mail Transfer Protocol). These acronyms and others will be covered later.
What is a Network?
A collection of connected devices
An Ethernet LAN
An IP subnet
An internetwork
The Internet
The segment
The wire
What is a Network?
There are many ways this term is used. At its simplest, a network is a collection of connected
devices. If it is a Local Area Network (LAN), then the devices are connected to a common medium,
such as coaxial cable or Unshielded Twisted Pair (UTP) or the air. A network is often called the wire,
and sometimes the segment. But, watch out, because those terms are used in other ways, also.
If a bridge connects multiple Ethernet LANs, all of the connected LANs are part of the same IP
network or subnet, though each is a complete local network.
If a router connects multiple Ethernet LANs, each of the connected LANs is a separate IP network
or subnet.
An internetwork is most frequently defined as multiple networks interconnected by routers, though
the term network is also sometimes used for this definition. In fact, the entire Internet is sometimes
referred to as the Net(work).
Today, the terms IP network and IP subnet are frequently used interchangeably. Though there are
some technical distinctions, it is not usually necessary to be aware of them.
Addressing Network Addressing
• Physical (Local) Addresses
• IP (Network) Addresses
Network Address
Postal Address
Zip Code
Postal Route
Person in House
Addressing Network Addressing
Just as a postal address denotes a physical location in the world, a network addresses denotes a
physical location on the network. Just as a package might be temporarily enclosed inside a shipping
container, addressed to the next major stop along the delivery path, a packet is temporarily enclosed
inside a frame, addressed to the next router along the message delivery path.
Layers 1 and 2 - Physical Addresses – Local
On a LAN, every device has a unique identifier that is called many things, including physical
address, node address, Data Link (Layer) address, MAC (Media Access Control) address, and
Burned-in address (BIA). This address is local to the directly connected environment.
Layer 3 - IP Network Addresses – End-to-end
Think of a network address as very similar in purpose to the address on an envelope that goes
through the US Mail. The complete address uniquely identifies a single individual at a single home,
somewhere in the world. Different parts of the address identify different levels in the hierarchy of
worldwide addresses: the country, the state or province, the city, the street, the house, and the
Similarly, an application on a single device anywhere on a routed IP network, including the Internet,
is uniquely identified by its IP address and a port number. Like a postal address, a complete network
address, has different parts that identify different levels in the network hierarchy: On the Internet,for
example, only the domain is of concern. When the packet reaches the domain,, for
example, the next level (the subnet) will then be looked at, by Direcway’s routers, in this case.
Unlike the Data Link Layer, the Network Layer goes end-to-end. Whereas the MAC address is local
to a single hop of the path, the IP address goes on at the source of the data and is removed only when
the packet reaches the final destination. Packet delivery is the most important job of the Network
A Domain Name Server (DNS) will translate the domain name, such as, to the actual
IP address, that is used for routing:
Unicast, broadcast, and multicast
For both MAC addresses and IP addresses, the intended destination can be a single host, a group of
hosts, or all hosts. These address types are called, respectively, unicast, multicast, and broadcast.
Host-to-Host Communications
Host #1
Data Link
Host #2
Data Link
How Does Data Flow?
The animation shows how data can flow from one host, on its way to another. Within the source and
destination computers exists many layers of functionality, which will be described with an example:
• An application creates the data - Perhaps, you have used Outlook Express, to write an email.
• A process layer protocol - Preparing the email text to send would call upon the Simple Mail
Transfer Protocol (SMTP). SMTP will add information that will be used by the SMTP process
on the receiving computer.
• Transmission Control Protocol (TCP) - TCP will set up a connection and then ask IP to send the
• Internet Protocol (IP) - IP will send the packet, after determining the destination IP address. This
unit of data, often called a datagram, will remain intact until the packet is delivered to the
destination. The IP address and the IP datagram go end-to-end.
• Data link and physical protocols - Perhaps you are sending via your WLAN, to your gateway PC,
which is connected to the Direcway modems. Regardless of whether it is a dial-up link, an
Ethernet LAN, or wireless, this part of the trip differs, hop-by-hop. It is local to each leg of the
journey. Perhaps the local link is wireless, to the host system, satellite, to the Network Operations
Center (NOC), in Virginia, and via leased line, out to the Internet backbone.
After traversing one or more Internet backbone links, the packet will again get off the “Interstate”
and onto the final links at the other end. The packet will be unwrapped completely on the destination,
until the email text (the data) has been reached, within the destination user’s mail program.
A Local Network – Local Addresses
Demo Network
Layers 1 - A Physical Connection
We’re going to describe a demo network, for the purpose of clarifying how a computer data network
works. Let’s start by defining the Physical Layer of our network. Reach out an grab your neightbor’s
hand on each side of you. If you are at the end of a row, then after we add routers to the networks,
you can “connect” with the end person on the row just in front or in back of you with one hand,
depending on which end of the row you are sitting.
This, remember, is one of the essential elements of networking: A physical path from sender to
Layer 2 - A Local Network
Let’s say that each chair in a row has a number associated with it. The number uniquely identifies
that chair in the row that it is in, though the same number may also exist in the next row.
Some protocols have what is called a handshake: a series of messages that must be exchanged,
before data can be sent. Shaking the hand of your neighbor and asking permission to send data,
before passing a message would be the equivalent in our network.
Looking at the graphic, you can see that, within each row (network), if you just knew in which
direction any given seat number was located, it would be pretty straight-forward to forward data to
anyone in your row. The seat numbers are analogous to MAC address on a LAN.
An Internetwork – End-to-end
(Network) Addresses
Network 1
Network 3
Network 2
Layer 3 - An End-to-end Internetwork
There is only one path through our internetwork. However, the same basic things need to happen
here, as on the Internet: A message created by any user on one network, needs to be able to reach
any user on the other network. The rest of this page is a detailed example that depicts this process.
Let’s say that user 8, in Network 2 has written a note to user 4, in Network 1 and put the note in an
envelope that says: “From: Network 2, Seat 8, To: Network 1, Seat 4. With computers, the
networking software on the source computer will determine the destination IP address and whether
it is on the local network or on a different subnet. The datagram will be addressed to the destination.
If the destination is on the local network, the message will be addressed directly to the destination.
If on a different network, it will be addressed to the local router, to forward. In our example, since it
is for the other network, the envelope will be placed inside a larger “local” envelope (a frame) that
says “From Seat 8 to Seat 1”. As the envelope is passed down the row towards the router in seat 1,
each user will look at the local address, see that it is not for them, and pass it down.
When the router in seat 1 receives the envelope, the smaller envelope is removed from the larger one,
which is discarded. A router must know which way to send a packet, based on the the row number
(network). This time, the local envelope will be addressed “From Seat 2 to Seat 1” and sent on
Network 3.
The router in Network 1, after removing and discarding the outer envelope, will put the message in
a new larger envelope that says, “ From Seat 1 to Seat 4” and pass it down the row. The packet will
then pass from seat to seat, with each host checking to see if it is addressed to it. When it gets to Seat
4, that person will recognize their own address, take the smaller envelope (packet) out of the larger
envelope (frame) and then take the message out of the packet and read it.
An Ethernet LAN
Media Access Control (MAC)
What is an Ethernet LAN?
In the Internet Model, the lower two layers of functionality are often referred to simply as “network
access”. This is where the local frame is created and sent, hop-by-hop. Different protocols and
frames are used for different link types, though all are similar. Ethernet is the most widely use local
area network (LAN) type, with wireless LANs second, at least in the home or small office
Media Access Control
When there is only a single device at each end of a communication link, there aren’t many rules
needed for the communication. However, when there are many devices connected to the media, it
becomes more important to have an orderly way of sharing the media, so that everyone gets a chance
to transmit. The protocols that define this are called Media Access Control or MAC protocols. The
MAC protocol of Ethernet (802.3) is called CSMA/CD — Carrier Sense (always monitor the cable
for transmissions), Multiple Access (you can see that part - all devices are connected to the same
cable or hub)/Collision Detection (this part means to keep monitoring the cable, and, if a collision
occurs, follow the collision procedure, to deal with it).
CSMA/CD is a form of contention, which is also used by wireless LANs. Contention means that a
device will just start transmitting, whenever it has data to send, IF the media is inactive - that is, as
long as nobody else is transmitting.
Only one device can transmit at a time, or a collision will occur. Each device creates a voltage change
on the cable when it transmits. If a second transmission is added, this will cause further change on
the cable. This is what is meant by a collision. And, the end result is that both frames will be
corrupted and will have to be retransmitted. Collisions were a normal occurence on the original
Ethernet LANs, which used coaxial cable, as pictured. Later, 10BaseT was defined - it uses UTP and
hubs, as described earlier. 10BaseT also had collisions. In a contention environment, when there are
too many users on the LAN, the network gets slow. That is because the ratio of collisions to
successful transmissions goes up. Eventually, the network becomes almost unuseable.
Remember that this is why bridges were first introduced — to create multiple collision domains. But,
that was when coaxial cable was the normal network medium. With 10BaseT (UTP and hub)
networks, switches were added to solve the same problem. Switches, however, with many more
ports than bridges, take the solution further, often providing a collision domain to each individual
If there is more than one device in a collision domain (i.e., on a switch port), the receive circuitry
must be used to check for collisions while transmitting, so it is not possible to also receive data. With
only a single device per switch port, there is no need to check for collisions, so full-duplex
communication can be used.
Ethernet/802.3 Variations
Though many different 802.3 variants exist, they differ primarily at the Physical Layer and they are
all referred to as Ethernet. 10BaseT, 100BaseT, 1000BaseT, 10000BaseT are all called Ethernet, for
example. Some have other names, as well, such as Fast Ethernet (100 Mbps) and Gigabit Ethernet
(1 Gbps). Current technologies are even using Ethernet in Metropolitan Area and Wide Area
networks (MANs and WANs).
What is Wi-Fi? –
An IEEE 802.11b WLAN
Access Point
Ad Hoc Mode
Infrastructure Mode
What is Wi-Fi?
There are many different types of wireless networks including cellular voice networks, satellite TV
and data networks, Personal Area Networks (PANs), and wireless LANs (WLANs). This document
will focus on 802.11 WLANs. Though there are several existing and merging 802.11 standards, the
primary focus will be on 802.11b WLANs.
WLANs use a contention media access method that is very similar to Ethernet’s. In fact, 802.11 was
originally referred to as Wireless Ethernet. A vendor organization called Wireless Ethernet
Compatibility Alliance (WECA) was formed, to test compatibility among different products and
interoperability with Ethernet LANs. The name was later changed to the Wi-Fi Alliance, after the
term “Wi-Fi”, for Wireless Fidelity, caught on. Wi-Fi became associated with 802.11b and, more
recently, with 802.11g, a faster version of 802.11 that is compatible with 802.11b.
IEEE 802.11 - Wireless LANs (WLANs)
The Institute of Electronic and Electrical Engineers (IEEE) is the standards organization that
standardized 802.11. The orginal specification operated at either 1 or 2 Mbps. Now, the group is
looking at speeds up to 100 Mbps, with proprietary versions going that fast already. It is important
to note, however, that wireless LANs have even more overhead than Ethernet and actual throughput
is about half of the transmission rate. So, for example, 802.11b, which has a transmission rate of 11
Mbps, has a throughput of approximately 5.5 Mbps.
WLAN Types - Operating Modes
WLANs can operate in one of two modes:
• Ad hoc – This is a peer-to-peer mode, where different devices communicate directly with one
another. With only two or three devices total on the LAN, this is the appropriate choice.
• Infrastructure (default) mode – In this setup, there is an Access Point (AP) that is physically
connected to the wired Ethernet LAN. The access point communicates with the wireless devices
and with the devices on the wired LAN. It takes Ethernet frames from the wired LAN, converts
them to the wireless frame format, and transmits them on the wireless LAN, and vice versa.
Wireless devices do not communicate with one another directly, but through the access point.
This is the default mode for both access points and NICs.
There is a current security standard, an upcoming security standard, and interim solution, proposed
by the Wi-Fi Alliance:
• Wired Equivalent Privacy (WEP) - The currently included security feature is called WEP.
Although, it is better than nothing, the encryption scheme WEP uses is considered easy to break.
Additionally, when using WEP, throughput can be reduced significantly, perhaps by as much as
30 %.
• Wireless Protected Access (WPA) - This is the interim solution proposed by the Wi-Fi Alliance.
It specifies a subset, of the upcoming IEEE security standard. It is consider to be much more
secure, with one exception, than WEP. The exception is when a short key is used and manually
shared(i.e., configured on all clients). This would only occur on a small WLAN Many current
wireless products will be able to do a software upgrade, to include this. but, because WPA totally
replaces WEP, all devices on the WLAN must be using it.
• IEEE 802.11i - This is the upcoming standard that includes all of the features and improvements
of WPA plus a much stronger encryption algorithm. Because of this, hardware will typically need
to be upgraded or replaced, to get the new features.
Avoiding Collisions with Random
Backoff Time
Oh, good! My random backoff
timer expired and the medium
is still free. That means
I medium
I have
get to transmit now!issend,
theI’ll set
my busy.
I havethe
now free.
but the set
timer. is busy.
WLAN MAC and Collisions
Like Ethernet before LAN switches, the wireless LAN environment has collisions. It uses something
called Carrier Sense, Multiple Access/Collision Avoidance(CSMA/CA). Only the last part differs
from Ethernet: it uses Collision Avoidance, instead of Collision Detection. Actually, the CA part
isn’t always used, so it usually functions very much like an Ethernet LAN...without the wires!
The graphic illustrates how both Ethernet and Wi-Fi reduce the chance of a second collision, after
one has occurred.
Transmission Speed and Distance
5.5 Mbps
11 Mbps
2 Mbps
Other 802.11 Details
Transmission Speeds
Another interesting feature of WLANs is that the speed or bps rate decreases with distance between
devices. For 802.11b, it is 11 Mbps, almost the same as the original Ethernal LAN, at close distances.
As distance increases and the signal weakens, it will be stepped down, first to 5.5 Mbps, then to 2
Mbps, and then to 1 Mbps. It works similarly, on higher speed WLANs.
In this context, a channel is a range of frequencies that are used, much as it is in analog television
transmission. The different 802.11 standards specify different frequency ranges, or bands, as well as
a different number of channels that are completely independent...that is, there is no overlap in
frequency, at all! This is important, because overlapping frequencies cause interference and can
cause your wireless LAN to be inoperative. Other devices, such as microwave ovens and cordless
telephones can also cause interference for some Wi-Fi devies.
Some of the different possibilities are discussed in more detail later.
Wi-Fi Alphabet Soup
1997, The Original
1 and 2 Mbps
WLAN Security
with Europe
2005?, 2.4/5 GHz?
100+ Mbps?
2003, 2.4 GHz,
Up to 54 Mbps
1999, 2.4 GHz,
Up to 11 Mbps
1999, 5 GHz,
Up to 54 Mbps
Wi-Fi Alphabet Soup
There is almost an entire alphabet of wireless LAN standards or proposed standards. Collectively,
they define a wide range of speeds, frequencies used, and methods of encoding and transmitting the
data. Here are some of the details, in alphabetical order:
• 802.11 - The original standards didn’t have a letter. They defined speeds of 1 and 2 Mbps over
three different physical layers: Frequency Hopping Spread Spectrum (FHSS), Direct Sequence
Spread Spectrum (DSSS), and Infrared.
• 802.11a - Like 802.11b, this was standardized in 1999. But, because of the higher frequencies,
devices were much more expensive and it didn’t take off right away. It operates in the 5 GHz
bands and supports speeds up to 54 Mbps. It also provides up to 8 non-overlapping channels,
which may be increased, in the future.
• 802.11b - This was standardized in 1999 and provides up to 11 Mbps and only 3 non-overlapping
channels in the 2.4 GHz range. This is what is frequently called Wi-Fi.
• 802.11e - This standard aims to provide prioritization for some data, such as voice on a WLAN.
• 802.11g - Standardized in 2003, 802.11g provides up to 54 Mbps, but, like 802.11b, still only 3
non-overlapping channels in the 2.4 GHz range. The Wi-Fi name has also been applied here.
• 802.11h - This standard focuses on being compatible with the European channel definitions.
• 802.11i - This standard promises a very secure WLAN environment.
• 802.11n -This is the future of WLANs and the details remain murky. It promises 100 Mbps or
more and may operate in both the 2.4 and 5 GHz bands. The goal is a standard by the end of 2004.
WLAN Roaming
Roaming in a WLAN
In larger environments (those with more than one access point), it is possible to have seamless
roaming, between the coverage areas of the access points...much as we do in a cellular telephone
network. The graphic illustrates such an environment, in which a laptop user moves from one access
point to the other.
Channel Reuse – 802.11b and
Only 3
Reusing 802.11b and 802.11g Channels
The graphic illustrates an 802.11b or 802.11g “cellular” wireless network, which keeps reusing the
only three non-overlapping transmission channels available: 1, 6, and 11.
The important thing to note is that the different cells of coverage are able to operate, with
overlapping coverage areas , but without interference from each other, because of the
non-overlapping frequencies being used.
If you have a wireless LAN, which is operating on the default channel of 6, and another RVer pulls
into the site next to you, and is also operating a WLAN on the default channel, you will create
significant interference with one another. In fact, channel six will create some interference for all
channels from 2 to 10. However, if you use a client utility for discovering WLANs and you see that
your neighbor is using channel 6, you can just change your configuration, to use channel 1 or 11.
Channel Reuse – 802.11a
8 Non-overlapping
Reuse all 8 Channels
Only reuse 4 Channels
Reusing 802.11a Channels
Like 802.11b and 802.11g channels, 802.11a channels can also be reused. But, you have eight
completely non-overlapping channels to use. This makes it much easier to plan extended wireless
networks, with roaming capabilities.
Notice that on the right side of the graphic, only 4 of the channels are being reused. The reason that
you might want to only reuse some of the channels is explained on the next page.
Channel Co-location
Channels 1, 6, & 11 (The three non-overlapping 802.11b
Total (theoretical)Data Rates:
• 802.11a = 8 * 54 Mbps
= 432 Mbps
• 802.11g = 3 * 54 Mbps
= 162 Mbps
Total Data Rate = 33 Mbps
Increasing the Available Bandwidth
As shown in the graphic, the amount of bandwidth available for users can be increased, by placing
multiple access points in the same location. This is known as co-location.
Wireless LAN Devices
Wireless Bridge
PCI Adapter
Ethernet Converter
CF Card
Access Point
USB Adapter
Identifying Wi-Fi Devices
There are only three types of Wi-Fi devices that you should know about. These three devices will be
described in this section:
• Wireless Adapter
• Access Point
• Residential Gateway
A fourth category of device, the wireless bridge, either connects separate locations, point-to-point,
or they connect a small group of users (a workgroup), to the rest of the network.
Wireless Adapter
This is really part of all wireless devices: access points, residential gateways, and wireless bridges
all have one, most often built-in. This is what contains the radio used for transmitting and receiving
wirelessly. There are really only two form factors: the Compact Flash (CF) card and the PCMCIA
or PC-Card. All of the others “types” have one of these two integrated, including PCI cards, USB
devices, access points, and gateways. As a client adapter, it usually comes with a CDROM
containing the driver and a client utility.
Access Point
An access point is really two devices in one: it is a wireless hub, analogous to the Ethernet hubs of
10BaseT. All wireless users connected (associated) to the access point share the available
bandwidth. They must take turns transmitting. And, they all communicate with one another via the
access point.
An access point is also a wireless translational bridge - it takes frames from the wired (Ethernet)
network and transmits them on the wireless (Wi-Fi) network...and, vice versa.
Dirersity Antennas
Because of the nature of radio waves to bounce off anything they encounter, a problem called
multipath interference crops up in indoor WLANs. A diversity antenna is really two antennas. Both
are monitored and for any given transmission, the one with the better signal will be used.
Residential Gateway
A residential gateway is an “all-in-one” device for small networks. It looks just like an access point
and that is one of the devices included. It also has router functionality, and a built-in Ethernet switch,
typically 4 or 8 10/100 Mbps ports.
A Wireless Net Works!
Part 2…
Setting Up Your Own
Wireless Network
February 2004
BJ Consulting, Inc.
Part 2 - Configuration
This chapter contains all of the information related to setting up your own wireless LAN. The
information contained here assumes that Microsoft Internet Connection Sharing (ICS) has already
been enabled on the Broadband connection that will be shared, by local network users.
If not, you need to go the Windows properties for the broadband connection. Click on the Advanced
tab and click in the box labelled “Allow other network users to connect through this computer’s
Internet connection.”
On newer versions of Windows, this will also cause the local (Ethernet or wireless) connection to be
assigned an IP address of, with a subnet mask of The other fields on this
connection are not used and remain empty.
Installing an Ad Hoc Client – Step 1
The License Agreement
The Welcome Screen
Configuring Wireless LANs
Configuring WLANs involves two tasks, for the default of infrastructure WLANs: configuring the
access point and configuring the client adapters. For ad hoc WLANs, only client adapters need be
configured, but there is an additional parameter that needs to be considered. The various parameter
options will be discussed in the context of example configurations
Configuring an Ad Hoc Client
The graphic shows the first couple of screens for installing and configuring a Linksys ad hoc client.
On the first screen, Install is clicked, to begin the installation. On the second screen, Next is clicked,
to accept the license agreement and continue.
Installing an Ad Hoc Client – Step 2
Channel Selection
Wireless Mode and SSID
Selecting the Operating Mode, SSID, and Channel
On the left screen, you can see AdHoc Mode being selected. Also, the Service Set ID (SSID) name
has been changed from the default (linksys, in this case), to Barbz-adhoc. Then, Next is clicked, to
continue. This is the first line of defense - to use a non-default SSID, on client adapter and access
points. More about this when configuring the access point is discussed.
On the right screen, you can see that the default of channel 6 is selected. Then, Next is clicked, to
continue. This is what you would change if a neighbor’s WLAN was causing interference on yours.
On an infrastructure client (there is an access point), you cannot select the channel. It is determined
by scanning for available access points. It is on the access point you would change the channel, to
avoid interference.
There are a couple of additional options that can be changed on some ad hoc client adapters, but it
is rarely necessary to either know about or to change any of them. They mostly affect some of the
technical details of operation. The defaults are usually the best options to use.
Configuring IP
Not shown is the option to use automatic IP address configuration or to manually configure the IP
address, a gateway (default route), and DNS IP addresses. This can also be configured through the
Windows client connection and adapter Properties, to be looked at later.
Installing an Ad Hoc Client – Step 3
Basic Configuration Completion
Accept Settings Screen
Accepting the Settings and Exiting the Utility
On the left screen here, the settings are displayed, giving you the chance to accept them and continue
(click Next) or go Back and change them.
On the right screen, Exit is clicked to complete the configuration. You are then given the option to
use the settings immediately.
Installing an Ad Hoc Client – Step 4
Profiles Screen
WLAN Monitor
Monitoring the Wireless LAN
The left screen shows the Link Information display, which gives an indication of the signal strength
and quality. There is more of this type of information available on the Site Survey screen, which is
displayed when you click on the center tab. If you click on More Information, details about the
configuration are displayed, including IP address, channel, and more.
The right screen shows available profiles, which have been configured on this device. Not all client
adapters support profiles. If you attach to more than one WLAN, profiles can save you a lot of effort.
Without them, you would have to change your configuration, every time you connect to a different
WLAN. With profiles, you just select the profile that matches your current location.
Installing an Ad Hoc Client – Step 5
Accepting the Settings
Security Settings
Configuring WEP and Confirming the Settings
On the left, WEP is being configured. All current 802.11 devices support WEP. WEP, though not
completely secure, is the second line of defense. You should use 128-bit WEP, which is more secure
than the other choice, 64-bit WEP. Many client utilities will allow you to enter the encryption key in
either text form or in hexadecimal. Some utilities will not give you a choice. When text is a choice,
the hexadecimal value for the key will be automatically generated, when you enter the text. Most
clients will also give you the option of entering up to 4 keys, which can be manually rotated on a
regular basis. This makes it more secure, but takes extra effort.
A related option is whether to use Open authentication or Shared Key authentication. This is
configured through the Window client adapter properties, which will be covered later.
The right screen displays the new settings. You can click Exit, to not save the changes, click Yes, to
accept the settings, or go Back, to change something.
Configuring an Infrastructure Client
The process for configuring an infrastructure client is essentially the same as that for configuring an
ad hoc client, with the exception of the channel assignment, which is configured on the access point
in infrastructure WLANs. In this case, the wireless client will continually scan for available WLANs
(access points). Certain other functions that relate to the technical operation of the WLAN can also
be configured on some ad hoc clients, but not on infrastructure clients.
Using Windows to Show Available
Right-click and select “View Available Networks”
Using Windows Services for Wireless Networks
If you right-click on the icon for the wireless LAN connection (in the System Bar, at lower right of
your monitor - at the upper left of the graphic), you will see any active wireless networks in the area
listed. This is shown on the left side of the graphic. Just click on a network, to select it, enter any
passphrase or hexadecimal key, and click Connect. If you have entered everything correctly, you
should be connected to the chosen WLAN and you can start using the network. If you entered
anything, such as the passphrase, incorrectly, it may not be obvious that there was a problem, but
you will not be able to access the WLAN or the Internet.
Windows Connection Properties - Wireless Tab
If you click on Advanced, you will be shown the standard Windows Connection Properties window
(Wireless tab), for the wireless adapter. This is shown on the right side of the graphic. You can also
get here by right-clicking on the icon that represents the wireless connection, and selecting
Properties. How you get to the connection icon varies, by version of Windows.
If Use Windows to configure my wireless network settings is checked, a few other things become
available, including the ability to configure security and the Advanced option, at the lower right of
the window (shown grayed out, in the figure). This is shown, on the next page.
Whether or not you use Windows to configure your wireless client or not, depends upon the quality
of the client utility that came with your adapter and on your preferences. Sometimes, pre-installed
adapters do not come with a client utility and, so, Windows is the only choice for configuration. If
the client adapter comes with an easy-to-use client utility, chances are it will provide more
functionality than using Windows. In this case, keep Use Windows to configure my wireless
network settings unchecked, most of the time.
Using Windows to Configure the
Using Windows to Configure the Client
The Windows Wireless Network Connection Properties are again shown. Notice that Use
Windows to configure my wireless network settings is checked, in the screen on the left. The
Configure (allows security configuration), Refresh (scan for wireless networks again), Move Up
(change preference order of available netorks), and Advanced buttons are also enabled.
When the Advanced button is clicked, the smaller window shown at the right is displayed. It is best
to make sure that the top choice is NOT selected. Select either the second or third choice, depending
upon which type of network you have. Otherwise, if a WLAN of the other type moves into the
vicinity, your client adapter may try to connect to it, if the signal is strong. But, connection will
always fail, because your configuration is set to the other type. Also, do not check Automatically
connect to non-preferred networks.
Using Windows to Configure the Type
of Authentication
Configuring the Type of Authentication
The Windows Wireless Network Connection Properties are shown again, but this time the
General tab is displayed. If you click on the Configure... button, the Adapter Properties are
displayed, as shown on the right. If you look at the list shown, you will see that many of the items
listed have already been discussed (i.e., Channel ESSID [same as SSID], Network Type, Use WEP).
All of the others (but one) are concerned with the operation of the WLAN and the defaults are almost
always used.
The item that is selected, Authentication Type, was mentioned earlier. You should make sure that
this is set to Open System. The other option, Shared Key, is considered to be much less secure and
should never be used.
If you double-click Internet Protocol (TCP/IP) or click once to select it and then click Properties,
you will see the screen shown on the next page.
Using Windows to Configure the
TCP/IP Properties
Subnet =
Host = 2
The TCP/IP Properties
As with so many things in the Windows environment, how you get to the above screen varies, by
version of Windows. Also, how the information is displayed - one screen versus separate tabs, for
example, also varies by version. The information and what it means, however, is always the same.
The following IP addresses are shown in the graphic:
• IP Address - This is used for sending and receiving data. The easiest thing is to use DHCP
(discussed later) to automatically assign IP addresses. But, this doesn’t always work properly.
Windows 98SE, for example, needs to have a manually assigned IP address, in order to send and
receive email or to browse the Web, without using a proxy server (also discussed later). The
important thing to remember is that if you manually assign IP addresses, you must give hosts on
the same WLAN an IP address that is in the same subnet.
• Subnet Mask - This tells all of the communications software which part of the IP address
represents the network (subnet) number. On a small network, this will usually be,
which says that the first three bytes represent the network number. The IP addresses shown in the
figure, for example, represents host 2 on the subnet. Any number from 1 to 254 in
the fourth position would represent a host on this subnet.
• Default Gateway - When using Microsoft’s Internet Connection Sharing (ICS) and some other
connection sharing solutions, this will be the IP address It will almost always be
host 1 on the subnet. Default Gateway should not be specified on the Windows PC that is sharing
the Internet connection, i.e., the PC connected to the Direcway modems. Notice that the Default
Gateway is on the same subnet as the PC that is being configured. This is important.
• DNS Server Addresses - All client computers need at least the Default Gateway IP address as a
Domain Name Server (DNS). You can add others, as well, such as the Direcway DNS addresses.
The Basic Setup Page
Configuring an Access Point
This and the next two pages show the various windows used for configuring a Linksys residential
gateway. The standard options exist on all 802.11 access points, though each manufacturer’s
products may also include proprietary features. We will discuss only the standard options. Because
there is an access point, the wireless LAN will operate in the default infrastructure mode. Were it
not present, all clients would have to be set to ad hoc mode, to communicate.
Configuring the Basic Options and WEP
The following options exist on the Basic Setup Page on a Linksys BEFW11S4 Residential Gateway,
as shown on the left side of the graphic:
• Host Name, Domain Name, and WAN Connection Type - Whether or not these need to be set
depends upon the service provicer. Host and domain names do not need to be set, for, though, as you can see, you can assign a host name, if you want. For users with
a DW4000, WAN Connection Type is not used. For the DW4020 and the DW6000, you can
either use your router functions or not. It is best to use the functionality, since it can provide you
with additional security. To use the router functions, select Static IP from the popup menu. This
will provide text fields to enter an IP address (use, the subnet mask (use, a default gateway IP address (use, and DNS IP addresses (use the
DNS addresses from your service provider).
• LAN IP Address - If you are not using the router functionality, this will be on the
subnet. If you are using the router functions, then it must be on a different subnet, say On the subnet, it can be any address, except, since that
address is needed for the connection sharing host (the DW4020, DW6000, or the PC hooked up
to the DW4000. It should be the x.x.x.1 So, for example, if using a DW4000, you might assign
the IP address, as shown in the graphic. Use a subnet mask of On
other subnets, it is recommended that it be assigned the x.x.x.1 host address,, for
• Wireless: Enable - On a Linksys access point, you must Enable the wireless functionality. With
this disabled, you would still have a router, but there would be no WLAN.
• SSID - This is the same identifier that we discussed early. It should match on the access point
and on all clients that are to connect to the wireless LAN. You should always change this from
the default, which varies by manufacturer. The default values for the different manufacturer’s
access points can be found on the Web.
• SSID Broadcast - This should be set to Disable, to provide a little additional security. Most
clients use passive scanning, when looking for available access points. With SSID broadcast
disabled, your access point won’t be visible. Clients will need to have the SSID configured.
However, there are many tools available, such as NetStumbler, which perform active scanning.
In this case, your access point will still respond to an active request, with its SSID. Some access
points will also allow you to turn this response off.
• Channel - By default, Channel 6 is used. However, if there is another WLAN in the vicinity, or
perhaps an older microwave over, that is causing inteference, you can change this to use a
different channel. Remember that for 802.11b and 802.11g, the non-overlapping channels are 1,
6, and 11, so you should always choose one of theses. With 802.11a, there are 8 channels
available, so it is much less of an issue. The channel to use is set on the access point. Client
devices will scan for the strongest channel available.
• WEP: Mandatory or Disable - Unless you are using WPA, you should always set WEP to
Mandatory, or to whatever it is called on your access point. Then click on WEP Key Setting,
to see the windows shown on the right of the graphic.
• WEP Key - Select 128Bit, from the popup menu. Then, either type the passphrase and click
Generate, or enter the key in hexadecimal directly. Click Apply to use the key. Click Apply
again, to use the settings on the Basic Setup Page.
Password and DHCP Pages
Configuring the Router Password and DHCP
On the left side of the graphic, you can see the password page. You should always change the default
password for your access point/router. Like the default SSID, the default password is obtainable
from several different web sites.
On the right side of the graphic is the DHCP (Dynamic Host Configuration Protocol) Page. Be sure
to disable DHCP on your router, as shown in the graphic, if you have a DW4000, or if you have either
a DW4020 or a DW6000 and you are not using the router functionality. Assigning IP addresses is
only a function of the router, if your DW4020 or DW6000 is connected to the WAN port of your
router and your LAN is connected to a LAN port.
Advanced Pages – Wireless
Use the defaults!
Configuring the Advanced Options
These options affect the timing and other operation of your wireless LAN. You should not need to
change any of these options, from the default setting.
Example Satellite Network 1
– DW4000
Network Operations Center
Leased Line
Infrastructure Mode
Example Satellite Users’ Networks
On this and the next few pages are example network setups, using DW4000, DW4020, and DW6000
Satellite modem devices.
Using a DW4000 - Example 1
The following notes should clarify some of the details of the example network:
1 The 802.11 wireless network is operating in infrastructure mode, since there is an access point.
2 All LAN devices are on the same IP subnet, the subnet. The WAN port of the
residential gateway/router is not used.
3 The gateway/host computer will have IP address, subnet mask This
IP address is used on all clients as the default gateway and as the first DNS server address. You
can add other DNS addresses to clients, as well.
4 DHCP is automatically enabled, with the gateway/host PC acting as the DHCP server, when
using Microsoft ICS. It is important to only have one DHCP server on a network, so it should be
disabled on the wireless router.
5 Microsoft File and Printer Sharing is enabled - A Microsoft LAN without a File Server operates
in peer-to-peer mode.
6 On the gateway PC, the IP address for the satellite adapter will be set by the install/setup
program. It will typically be a 10.x.x.x address, with the subnet mask. There will
be no default gateway set in the TCP/IP properties, for either adapter, though a default gateway
address is used by the Direcway software and is visible in the DW Navigator info.
Example Satellite Network 2
– DW6000
Network Operations Center
Leased Line
Infrastructure Mode
Using a DW6000 - Example 2
The following notes should clarify some of the details of the example network:
1 The 802.11 wireless network is operating in infrastructure mode, since there is an access point.
2 All LAN devices are on a different subnet, from the DW6000 (or the DW4020) and the WAN
port of the wireless router. The subnet is used, in the example. Give your wireless
router an IP address on this subnet, such as This IP address is used on all LAN
clients as the default gateway and as the DNS server address. You can add other DNS addresses
to clients addresses, as well.
3 The DW6000/DW4020 router will have an IP address, subnet mask
The WAN IP address on the wireless router must be on this same subnet. Set the wireless router’s
default gateway to be
4 DHCP can be enabled on the wireless router, for the LAN clients.
5 Microsoft File and Printer Sharing is enabled - A Microsoft LAN without a File Server operates
in peer-to-peer mode.
6 On the gateway PC, the IP address for the satellite adapter will be set by the install/setup
program. It will typically be a 10.x.x.x address, with the subnet mask. There will
be no default gateway set in the TCP/IP properties, for either adapter, though a default gateway
address is used by the Direcway software and is visible in the DW Navigator info.
Example Satellite Network 3
– DW6000
Network Operations Center
Leased Line
Infrastructure Mode
Using a DW6000 - Example 3
The following notes should clarify some of the details of the example network:
1 The 802.11 wireless network is operating in infrastructure mode, since there is an access point.
2 All LAN devices are on the same IP subnet, the subnet. The WAN port of the
residential gateway is not used.
3 The DW6000 (or DW4020) will have an IP address, subnet mask
This IP address is used on all clients as the default gateway and as the DNS server address. You
can add other DNS addresses, as well.
4 DHCP should be disabled on the wireless router, allowing the Direcway router to act as the
DHCP server. It is important to only have one DHCP server on a network.
5 Microsoft File and Printer Sharing is enabled - A Microsoft LAN without a File Server operates
in peer-to-peer mode.
6 On the gateway PC, the IP address for the satellite adapter will be set by the install/setup
program. It will typically be a 10.x.x.x address, with the subnet mask. There will
be no default gateway set in the TCP/IP properties, for either adapter, though a default gateway
address is used by the Direcway software and is visible in the DW Navigator info.
Example Satellite Network 4
– DW4020
Network Operations Center
Leased Line
Access Point/ Ad Hoc Mode
Using a DW4020 - Example 4
The following notes should clarify some of the details of the example network:
1 The 802.11 wireless network is operating in ad hoc mode, since there is no access point.
2 All LAN devices are on the same IP subnet, the subnet.
3 The DW4020 or DW6000 will have an IP address, subnet mask This
IP address is used on all clients as the default gateway and as the DNS server address. You can
add other DNS addresses, as well.
4 DHCP should be disabled on the wireless router, allowing the Direcway router to act as the
DHCP server.
5 Microsoft File and Printer Sharing is enabled - A Microsoft LAN without a File Server operates
in peer-to-peer mode.
6 On the gateway PC, the IP address for the satellite adapter will be set by the install/setup
program. It will typically be a 10.x.x.x address, with the subnet mask. There will
be no default gateway set in the TCP/IP properties, for either adapter, though a default gateway
address is used by the Direcway software and is visible in the DW Navigator info.
Odds and Ends
Miscellaneous Topics
The next couple of pages contain some notes about some of the more important protocols that you
may hear about, in the process of setting up an RV Home Network.
Domain Name Services (DNS)
When packets are being routed through the Internt, the numeric IP address is used. Yet when you
send an email, you send it to [email protected], for example, not typically to an IP address.
Likewise, you might type something like, not Your
computer sends out a DNS request, which gets passed up the line, until some DNS server can provide
the IP address that corresponds to the name. Then, the data can be sent.
Address Resolution Protocol (ARP)
Another important protocol for IP is called the address resolution protocol (ARP). Remember that
the IP address goes end-to-end. However, at each hop of the path, a local MAC address must be used.
ARP is the way that the router gets the MAC address of the next hop router or of the final destination.
Sometimes a PC will also use ARP to get the address of the local router or of the destination, if it is
on the same subnet. Or, the PC is configured with a default gateway: the address of the local router.
Private Addresses and Network Address (Port)Translation (NAT/NAPT)
At one time, it was believed that not everyone would want to be on the Internet, so a range of IP
addresses were set aside as private. Anyone at all can use these addresses. However, these addresses
will not be routed on the Internet. Companies that had used private addresses and later wanted to be
on the Internet had a problem. That is when network address translation (NAT) was devised.
Theses private addresses can connect to the Internet by using something called Network Address
Translation (NAT) or NAT with Network Address Port Translation (NAPT). Typically, the NAT
server is on the same device as the firewall. So, when a private IP address request is headed for the
Internet, the NAT server will translate the private address to a unique and non-private IP address,
from a pool of addresses that are configured on this server. This address is dynamically assigned.
When NAT with NAPT is used, a single non-private IP address can server literally thousands of
private IP addresses. This has helped stretch the lifetime of IP version 4.
With the satellite connection, a static (private) IP address is assigned. This is an IP address that is in
the private network of the Hughes network operation center (NOC). Then, when you have a request
for the Internet, a non-private IP address is dynamically assigned, by the NOC’s NAT server.
The Direcway business service provides a static non-private address, for the extra fee. This costs
more, because it permanently assigns one of a limited number of available IP addresses. Whereas
the private addresses are virtually inexhaustible, since everyone can use the same ones within their
Anyone using Microsoft's Internet Connection Sharing (ICS) is using one of the private IP network
addresses: Class C network
Dynamic Host Configuration Protocol (DHCP) is a protocol that automatically assigns an IP address
to a PC or other host that requests one. The address is not permanently assigned, but can be reused
by a different host later. This also helps to stretch the lifetime of IPv4. Newer Windows operating
systems includes DHCP functionality. This is always the easiest approach to setting up a home
network. However, in some cases, you must manually assign the IP addresses to the devices on your
network. Windows 98SE seems to often have problems communicating, when DHCP is used.
Proxy Servers
A proxy server is an intermediary, between your PC and the Internet. When you send a request to
the Internet, it is intercepted by the Proxy server, who then creates a new request, using a different
address, and sends that out to the Internet. When the reply comes back, the proxy server doesn’t just
forward it to you. It creates a new packet and sends that to you. This provides a degree of protection
from malicious users on the Internet, but is not 100% protection. When your browser is set to use
the proxy host and the host is unavailable, your requests will not make it to the Internet. This is why
there are times when you must reconfigure your browser to not use the proxy.
Windows Miscellany
The following Windows configuration parameters must be set correctly, to use Windows Internet
Connection Sharing:
• The Windows workgroup should match on all devices that will share the satellite connection. The
Windows default is MSHOME. On some versions of Windows, it will work, even with users in
different workgroups, but the performance may be compromised.
• The IP address of the gateway/host computer (DW4000) or of the Direcway router (DW4020 or
DW6000) must be set to With the DW4000 and Microsoft ICS, some versions of
Windows will set this IP address automatically and other versions will not.
Windows Warnings
1 With the DW4000, do not configure a default gateway on the Ethernet or wireless adapter of the
host (gateway) PC. If you do, neither the gateway nor the clients will be able to browse.
2 Original Microsoft Windows Configuration: When the setup asks for your name, enter the name
you want to log in with, in the future. Once this has been entered, it should not be changed. You
can add more users, but don't ever remove the first one.
3 Likewise, when you give your PC a hostname, do NOT ever change it, even though the system
will let you.
Note If it’s not broken — Don’t Fix It!
Q& A and Hands-on Time
Q & A and Hands-on Session
After answering any final questions that may come, up there will be a hands-on session. The purpose
of this session is to have you see how it really is easy to do!
A lab sheet will be handed out with specific information for the setup.
The objective is to configure your wireless card to surf the Internet, from your seat.

Similar documents