When a new profile is created or an existing profile is edited using Profile
Manager, the Properties screen appears with the name of the profile in
parentheses. These screens enable the configuration parameters for that
profile. If the configuration parameters are not changed, the default values
are used. Each of the Properties screens listed in Figure
contains
parameters that affect a specific aspect of the client adapter.
The
System Parameters screen allows the user to configure parameters that prepare
the client adapter for use in a wireless network
. This
screen appears after creating and saving a new profile or editing an existing
profile using the Profile Manager screen.
The RF Network screen
configures settings that control how and when the client adapter transmits and
receives data. To access this screen, select the RF Network tab from the
Properties screens
.
The
advanced infrastructure parameters can be set only if the client adapter has
been set to operate in an infrastructure network. The Advanced (Infrastructure)
screen enables the configuration of parameters that control how the client
adapter operates within an infrastructure network. To access this screen,
select the Advanced (Infrastructure) tab from the Properties screens
.
The
advanced ad hoc parameters can be set only if the client adapter has been set
to operate in an ad hoc network. The Advanced (Ad Hoc) screen enables the
configuration of parameters that control how the client adapter operates within
an ad hoc network. To access this screen, select the Advanced (Ad Hoc) tab from
the Properties screens
.
The
Network Security tab is used to configure parameters that control how the
client adapter associates to an access point, authenticates to the wireless
network, and encrypts and decrypts data. To access this screen, select the
Network Security tab from the Properties screens
. This screen is
different from the other Properties screens in that it presents several
security features, each of which involves a number of steps. In addition, the
security features themselves are complex and need to be understood before they
are implemented.
Most of these settings will not be modified until the
technologies are covered for each area.