[. . . ] MS, MS-DOS, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. PCMCIA is a trademark of the Personal Computer Memory Card International Association. Intel and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. [. . . ] Support for most industry standard security solutions is contained in this software. Click the icon [Intel PROSet Wireless] to execute the Intel PROSet for Wireless utility. The Mandatory Access Point option is only used if Infrastructure mode is selected. Click OK to save the setting and return to the General Settings page. FLOW OF OPERATIONS 1. Activate the WLAN Device (See Activating the WLAN Device on page 54 for more information). Configure the Wireless Network parameters (See Configuration Using Intel PROSet for Wireless Utility, below). Enter the network name (SSID) Choose the appropriate WLAN architecture (Ad Hoc or Infrastructure) Choose Authentication method: Open, Shared, WPA-Enterprise, WPA2-Enterprise, WPAPersonal, or WPA2-Personal. If using static WEP keys, enter static WEP key and choose key index. 10. If you are using Cisco CCX, click Cisco Options to enable Cisco CKIP data encryption on the Security Settings page. If you have checked the Cisco's "Mixed-Cell" box in the Advanced Setting, this option must also be checked. Click Next. 3. Configure network settings TCP/IP settings Workgroup or Domain settings. CONFIGURATION USING INTEL PROSET FOR WIRELESS UTILITY This section explains the procedure to properly configure the WLAN device using the Intel PROSet for Wireless utility. Please consult with your network administrator for these parameters: Network Name - Also known as the SSID Network Key (WEP) - Required if using static WEP keys. If the Control Panel is in Category view, switch to Classic view by clicking "Switch to Classic View" under Control Panel the left frame. (If you are already in Classic view, "Switch to Category View" will be displayed. ) Double-click the [System] icon. The setting of [Full computer name:] denotes the name for identifying the computer. Any name can be assigned for each personal computer. To change the name, click [Change] and then proceed in accordance with the instruction messages displayed on the screen. 1. If the Control Panel is in Category view, switch to Classic view by clicking "Switch to Classic View" under Control Panel the left frame. (If you are already in Classic view, "Switch to Category View" will be displayed. ) Double-click [Network Connections]. Right-click [Wireless Network Connection] in the list, and then click [Properties] in the menu displayed. The [Wireless Network Connection Properties] window will be displayed. 4. 5. 56 W I r e l e s s L A N U s e r 's G u i d e Enter the desired name in less than 15 ASCII character code format. Identifiability can be enhanced by entering the model number, the user name, and other factors. For ad hoc connection: Assign the same network name to all personal computers existing on the network. [. . . ] Shadow RAM A technique of copying data or applications stored in ROM (Read Only Memory) into RAM (Random Access Memory) for access during actual operation. RAM is much faster to access than ROM, however ROM contents are not lost when power is removed. Shadowing allows permanently stored information to be rapidly accessed. The optical digital audio format that allows you to download digital audio onto a MiniDisc recorder or connect to your sound system to play MP3 files with high fidelity sound. [. . . ]