FREELANCE ']Aj?zAyWireless Networking with OS/2t.driver won't load!SHField1Field2Field3Field4Field5Field6Field7Field8\g ^"} H z^̀"Page 1wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwpwpppwpwwppwpppppwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwpppwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwpppwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwpppwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwpwwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwppwpwpppwppwwppwpppppwwwwwwwwwwwtwwwwppwwpwwppwwwwwwwwwwtwwwwppwppwwwwwwwwwwwtwwwwwwwpppwwwwwwwwwwtwwwppwwwwwwwpwwwwwwwpwwwwwwwpwwwpwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwww"wwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwppppppwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwppwppwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpppppppwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpppppwppwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww"wwwwwwwwwwwwwwwwwwwwwwwwtwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwxwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpppppwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpppwpppwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwywwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwywwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwywwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww?wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwppwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwppwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwpwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwxwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwtDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDc9(^'YSJ:\LOTUSW4\SMASTERS\FLG\ws2003c.mas2(&$$dn   ????X!Wcanadmap.PALZhZhZ8~\thZ9hhp:t^hoqXeurope.BWAL//Oo/Oooooo_?O/O`Rbb?b?>a<^`7`ABB`bAb1`b!`R!bb?uj|hϲqұޟȟ/// !b A @O@B @@A@@@@B`!!! A O ab_@BbbOOO`BBBB#@?2` ""@___?bb`<`A@/ "@APb`@@@@`A% b`A!AA5AbAAB"+Y"@@BAB@B@p@A@!a`b_``qt2ABBR‚5ϟ?fn=?l?r ????,fs=240,fe=0,fc=7,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=7,b2=7,bl=0,fx=0,sd=0,sw=0,sc=0,ud=0,uw=0,uc=0,bn=1fn=Helvetica,fs=401,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1fn=Helvetica,fs=381,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=302,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1fn=Helvetica,fs=356,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=605,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1fn=Helvetica,fs=331,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=906,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1fn=Helvetica,fs=306,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=1208,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1fn=Helvetica,fs=240,fe=0,fc=7,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=7,b2=7,bl=0,fx=0,sd=0,sw=0,sc=0,ud=0,uw=0,uc=0,bn=1fn=Arial,fs=304,fe=0,fc=283,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=23,bz=100,f2=283,b2=23,bl=0,fx=0,sd=0,sw=0,sc=0,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=688,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=106,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1 fn=Times New Roman,fs=553,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=106,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1 fn=Times New Roman,fs=421,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=106,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1 fn=Times New Roman,fs=355,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1 fn=Times New Roman,fs=289,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1 fn=Times New Roman,fs=482,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=342,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=276,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=211,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=278,bz=100,f2=280,b2=278,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=145,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=90,ts=462<0L|,bc=278,bz=100,f2=280,b2=278,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=638,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=500,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=434,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=368,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=281,b2=281,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=303,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=281,b2=281,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=316,fe=0,fc=281,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=281,b2=7,bl=0,fx=0,sd=2,sw=1,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=263,fe=0,fc=281,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=281,b2=7,bl=0,fx=0,sd=2,sw=1,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=211,fe=0,fc=281,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=281,b2=7,bl=0,fx=0,sd=2,sw=1,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=184,fe=0,fc=281,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=281,b2=7,bl=0,fx=0,sd=2,sw=1,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=158,fe=0,fc=281,hy=NO,hc=3,qm=2,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=7,bz=100,f2=281,b2=7,bl=0,fx=0,sd=2,sw=1,sc=303,ud=0,uw=0,uc=0,bn=1fn=Times New Roman,fs=477,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=N1N18,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1fn=Times New Roman,fs=424,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=671,ip=0,pl=15,bu=N1N19,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=93,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1fn=Times New Roman,fs=424,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=1118,ip=0,pl=15,bu=N1N17,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=93,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1fn=Times New Roman,fs=396,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=1454,ip=0,pl=15,bu=N1N20,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1 fn=Times New Roman,fs=396,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=1827,ip=0,pl=15,bu=\12,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=281,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1!fn=Times New Roman,fs=193,fe=32,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1"fn=Times New Roman,fs=193,fe=32,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=302,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1#fn=Times New Roman,fs=193,fe=32,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=605,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1$fn=Times New Roman,fs=193,fe=32,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=906,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1%fn=Times New Roman,fs=193,fe=32,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=1208,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=0,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1&fn=Times New Roman,fs=275,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1'fn=Times New Roman,fs=275,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=302,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1(fn=Times New Roman,fs=275,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=605,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1)fn=Times New Roman,fs=275,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=906,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1*fn=Times New Roman,fs=275,fe=0,fc=282,hy=NO,hc=3,qm=0,sh=25,st=25,if=1208,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1+fn=Times New Roman,fs=401,fe=0,fc=282,hy=NO,hc=3,qm=1,sh=25,st=25,if=0,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1,fn=Times New Roman,fs=381,fe=0,fc=282,hy=NO,hc=3,qm=1,sh=25,st=25,if=302,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1-fn=Times New Roman,fs=356,fe=0,fc=282,hy=NO,hc=3,qm=1,sh=25,st=25,if=605,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1.fn=Times New Roman,fs=331,fe=0,fc=282,hy=NO,hc=3,qm=1,sh=25,st=25,if=906,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=1/fn=Times New Roman,fs=306,fe=0,fc=282,hy=NO,hc=3,qm=1,sh=25,st=25,if=1208,ip=0,pl=15,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=282,b2=286,bl=0,fx=0,sd=1,sw=1,sc=303,ud=0,uw=1,uc=303,bn=10fn=Times New Roman,fs=542,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=11fn=Times New Roman,fs=425,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=12fn=Times New Roman,fs=369,fe=32,fc=280,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=280,b2=286,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=13fn=Times New Roman,fs=313,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=281,b2=281,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=14fn=Times New Roman,fs=258,fe=32,fc=281,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=281,b2=281,bl=0,fx=0,sd=2,sw=0,sc=303,ud=0,uw=0,uc=0,bn=15fn=Times New Roman,fs=542,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=0,uw=0,uc=0,bn=16fn=Times New Roman,fs=425,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=0,uw=0,uc=0,bn=17fn=Times New Roman,fs=369,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=0,uw=0,uc=0,bn=18fn=Times New Roman,fs=313,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=314,b2=281,bl=0,fx=0,sd=0,sw=0,sc=303,ud=0,uw=0,uc=0,bn=19fn=Times New Roman,fs=258,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=0,bu=\0,bs=1,pr=0,ll=100,ts=462<0L|,bc=281,bz=100,f2=314,b2=281,bl=0,fx=0,sd=0,sw=0,sc=303,ud=0,uw=0,uc=0,bn=1:fn=Times New Roman,fs=477,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=0,ip=0,pl=15,bu=\16,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1;fn=Times New Roman,fs=424,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=372,ip=0,pl=15,bu=\14,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=93,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1<fn=Times New Roman,fs=424,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=708,ip=0,pl=15,bu=\1,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=93,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1=fn=Times New Roman,fs=396,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=1044,ip=0,pl=15,bu=\2,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1>fn=Times New Roman,fs=396,fe=32,fc=314,hy=NO,hc=3,qm=0,sh=25,st=25,if=1305,ip=0,pl=15,bu=\12,bs=0,pr=0,ll=100,ts=462<0L|,bc=286,bz=100,f2=314,b2=286,bl=0,fx=0,sd=0,sw=0,sc=303,ud=1,uw=0,uc=303,bn=1uf$$`Background Images_p$$`NamedStyle objects@[<>0000910{name=,r=23}{name=Level2,r=24}{name=Level3,r=25}{name=Level4,r=26}{name=Level5,r=27}o  Label text@[RRR<>0000910{name=,r=13}{name=Level2,r=14}{name=Level3,r=15}{name=Level4,r=16}{name=Level5,r=17}o Presentation subtitle@l#YHE%HE%E%H<>0000897{name=,r=8}{name=Level2,r=9}{name=Level3,r=10}{name=Level4,r=11}{name=Level5,r=12}o Presentation title@#[z%z%<>0000910{name=,r=28}{name=Level2,r=29}{name=Level3,r=30}{name=Level4,r=31}{name=Level5,r=32}o Numbered list@#[z%z%<>0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@$[%%<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_`Presentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title 4"&&@"1[aa777<>Warpstock 2003 - San Francisco, California, USA0000910{name=,r=33}{name=Level2,r=34}{name=Level3,r=35}{name=Level4,r=36}{name=Level5,r=37}o ?&7@d&&ChCLIPBOARD\[9\&3_u[4 4 m3j<&3 &34 4 &3l3q<l<j<V'3l3V'3&3D j<l3V'3l<<V'32^j< '<<#,( E= <<l  ʚʚf2f222ffff2fʖ2f@S7  6- - )    '   &   &     &                                                                                   #        '         +    6  ~   8    z   ;  p    D   o    C   f   E   [        H  XL    K     o   D    n     8     o    5        q          (     x                x            x              z                             "          ,            ,               -           0     8         :     >      S  S     SS S  S SS SS S3>2 ?2? 2 @2? 2 ?2? 2>S SSC                                                               ?        <         :         9       7          6            5         4      3        2      1         0       0      /       .          .         -          -         -         ,          ,        ,             ,        +     +        +        +    +     +       +              +     +     +          +        +        +       ,     ,         ,          -        -    -           .       .        /      0       0       1        2          3        4      5      6                8     9        ;          =          "@          %E     '         *   ;  <  =>  ?   @   A    B           C    D    E  E   F G   H  I  I  JG U    KA  M   LA   D   L4    A    M1    @  N.      =N,     <  O)     :  O'      :    P%   ; Q%      <   Q  =  R      >  R         ?R     >  S     =S        <  S        <  6       : 4       92        8 1           7       /         '   .     0   i   3   f   6   d     >   b    B   X  F     U  J      R  U    O    W   N     Z     B    d  2     g ,    j  )  m     (                                           &         &        %         %           &         (        )     +        4     5     7        9   <     @   S   U[@_`Title@"l#.YHE%HE%E%H<+fs=576>Click here to type presentation title0000897{name=,r=8}{name=Level2,r=9}{name=Level3,r=10}{name=Level4,r=11}{name=Level5,r=12}o Presentation title@"[RRR<>Click here to type subtitle0000910{name=,r=13}{name=Level2,r=14}{name=Level3,r=15}{name=Level4,r=16}{name=Level5,r=17}o Presentation subtitle@W"f[7ffJ7J7J<>Warpstock 2003, San Francisco, California, USA<=Hilton Doubletree Airport Hotel<=October, 18-19 20030000910{name=,r=38}{name=Level2,r=39}{name=Level3,r=40}{name=Level4,r=41}{name=Level5,r=42}o @[$$vvv<>Click here to type your name0000910{name=,r=43}{name=Level2,r=44}{name=Level3,r=45}{name=Level4,r=46}{name=Level5,r=47}o ChCLIPBOARD\[9\&3`&3 &3   |&3&3 3z&3o &3o &365&3P'3*EIEf[f 'e(L'3  ʚʚf2f222ffff2fʖ2f@S7  6- - )    '   &   &     &                                                                                   #        '         +    6  ~   8    z   ;  p    D   o    C   f   E   [        H  XL    K     o   D    n     8     o    5        q          (     x                x            x              z                             "          ,            ,               -           0     8         :     >      S  S     SS S  S SS SS S3>2 ?2? 2 @2? 2 ?2? 2>S SSC                                                               ?        <         :         9       7          6            5         4      3        2      1         0       0      /       .          .         -          -         -         ,          ,        ,             ,        +     +        +        +    +     +       +              +     +     +          +        +        +       ,     ,         ,          -        -    -           .       .        /      0       0       1        2          3        4      5      6                8     9        ;          =          "@          %E     '         *   ;  <  =>  ?   @   A    B           C    D    E  E   F G   H  I  I  JG U    KA  M   LA   D   L4    A    M1    @  N.      =N,     <  O)     :  O'      :    P%   ; Q%      <   Q  =  R      >  R         ?R     >  S     =S        <  S        <  6       : 4       92        8 1           7       /         '   .     0   i   3   f   6   d     >   b    B   X  F     U  J      R  U    O    W   N     Z     B    d  2     g ,    j  )  m     (                                           &         &        %         %           &         (        )     +        4     5     7        9   <     @   S   U[@_$&` Bulleted ListaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$"[&&<>Click here to type bulleted text0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$&`2-Column BulletsaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@"[88<>Click here to type bulleted text0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@"[8&8&<>Click here to type bulleted text0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$&`1 ChartaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee @$$V&& <>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$&`2 ChartsaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee @$V <>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o f @$V&& <>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$&`4 ChartsaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee @$Vb b <>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o f @$Vb &b &<>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o g @$V  C<>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o h @$V&&  C<>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$&`Bullets & ChartaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee @$V&& <>Click here to create chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o @"[88<>Click here to type bulleted text0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$&`Bullets & Clip ArtaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee@$V&& <>Click here to add clip art0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o @"[88<>Click here to type bulleted text0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$&`Organization ChartaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee!@$$)V&& <>Click here to create organization chart0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$&`TableaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee"@$$V&& <>Click here to create table0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$&`DiagramaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titlee&@$$V&& <>Click here to create diagram0000864{name=,r=7}{name=Level2,r=7}{name=Level3,r=7}{name=Level4,r=7}{name=Level5,r=7}o _$$` Basic LayoutaPresentation Backdrop@$[%%<>Click here to type page title0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_d$$`Page 1aTitle@-[9$9$zzz<>Lewis Rosenthal, CNA<=Rosenthal & Rosenthal0000910{name=,r=43}{name=Level2,r=44}{name=Level3,r=45}{name=Level4,r=46}{name=Level5,r=47}o @Bl#/YHE%HE%E%H<+fs=598>Wireless Networking with OS/2<+fs=687>0000897{name=,r=8}{name=Level2,r=9}{name=Level3,r=10}{name=Level4,r=11}{name=Level5,r=12}o Presentation title@B[RRR<+fs=598>Theory & Practice0000910{name=,r=13}{name=Level2,r=14}{name=Level3,r=15}{name=Level4,r=16}{name=Level5,r=17}o Presentation subtitle_d$$`Page 2a Bulleted List@m$[8&8&<>Some need-to-know terminology <=A brief, non-technical background of wireless protocols: 802.11a, 802.11b, and 802.11g<=Types of 802.11x networks<=Access points, routers, bridges, and combination devices<=Basic wireless security<=Antennas!0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$[%%<>Background Material0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_d$$`Page 45a Basic Layout@$[%%<>Wireless terms0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_d$$`Page 6a Bulleted List@$6[&&<>Wireless LAN; aka LAWN (Local Area Wireless Network)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@$[%%8 8 <>WLAN0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_d$$`Page 7a Bulleted List@$[%%<>Wi-Fi0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$8[:&:&<+bu=\0+bs=1>Common name for 802.11x wireless networking0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 8a Bulleted List@$ [%%<>Bluetooth0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@{b$x[&&<+bu=\0+bs=1>A wireless technology developed by Ericsson, Intel, Nokia, and Toshiba that specifies how mobile phones, computers and PDA's interconnect with each other, with computers, and with office or home phones. The technology enables data connections between electronic devices in the 2.4 GHz range. Bluetooth would replace cable or infrared connections for such devices.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 21a Bulleted List@$[%%<>WPAN0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@A$[[&&<+bu=\0+bs=1>Wireless Personal Area Network, namely, one based on the Bluetooth technology.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 9a Bulleted List@$[%%<>802.x0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[I&I&<+fs=414+bu=\0+bs=1>Refers to the IEEE numbers for wireless technology standards:<=<+fs=414>802.1x: As the IEEE standard for access control for wireless and wired LANs, 802.1x provides a means of authenticating and authorizing devices to attach to a LAN port. This standard defines the Extensible Authentication Protocol (EAP), which uses a central authentication server to authenticate each user on the network.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 10a Bulleted List@$[%%<>802.x<+fe=33> (continued)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@Sb$d[ᗬ&ᗬ&<Level2>802.11: The IEEE standard for wireless Local Area Networks. It uses three different physical layers, 802.11a, 802.11b, and 802.11g.<=802.11a: Operating in the 5 GHz band, 802.11a supports a maximum theoretical data rate of 54 Mbps, but more realistically it will achieve throughput somewhere between 20 Mbps to 25 Mbps in normal traffic conditions.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text' Object 1_d$$`Page 11a Bulleted List@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@[$[ᗬ&ᗬ&<Level2>802.11a<Level2+fe=33> (continued)<Level2>: In a typical office environment, its maximum range is 50 meters (150 feet) at the lowest speed, but at higher speed, the range is less than 25 meters (75 feet). 802.11a has four, eight, or more channels, depending on the country. WLAN products based on 802.11a technology are being merged into multiple-protocol devices (<Level2+fe=33>tri-mode<Level2>), which allows clients from all three standards to connect via a single access point.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 12a Bulleted List@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$z[>&>&<Level2>802.11b: Most WLANs deployed today use 802.11b technology, which operates in the 2.4 GHz band and supports a maximum theoretical data rate of 11 Mbps, with average throughput falling in the 4 Mbps to 6 Mbps range. In a typical office environment, its maximum range is 75 meters (250 feet) at the lowest speed, but at higher speed its range is about 30 meters (100 feet).0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 13a Bulleted List@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[&&<Level2>802.11b <Level2+fe=33>(continued)<Level2>: Bluetooth devices, 2.4 GHz cordless phones and even microwave ovens are sources of interference (and thus create poor performance) for 802.11b networks. Minimizing interference can be difficult because 802.11b uses only three non-overlapping channels. 802.11b products have been shipping in quantity for several years so you will find that products are plentiful and affordable.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 14a Bulleted List@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[>&>&<Level2>802.11g: The 802.11 task force has ratified 802.11g as a standard as of June, 2003. 802.11g (sometimes called 54g - LinkSys' term) offers the throughput of 802.11a with the backward compatibility of 802.11b. 802.11g operates in the 2.4 GHz band but it will deliver data rates from 6 Mbps to 54 Mbps. Like 802.11b, it has available up to three non-overlapping channels in the US.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 16a Bulleted List@$[%%<>802.x<+fe=33> (continued)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@Ub$[̬&̬&<Level2>802.11g <Level2+fe=33>(continued)<Level2>: Its "backward compatibility" with 802.11b means that when a mobile 802.11b device joins an 802.11g access point, all connections on that access point slow down to 802.11b speeds.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 15a Bulleted List@$)[%%<+fe=32>802.x<+fe=33> (continued)<+fe=32>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@=b$Y[t&t&<Level2>802.11g <Level2+fe=33>(continued)<Level2>: 802.11g uses orthogonal frequency-division multiplexing (OFDM) modulation as does 802.11a, but, for backward compatibility with 11b, it also supports complementary code keying (CCK) modulation and, as an option for faster link rates, allows packet binary convolutional coding (PBCC) modulation.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 17a Bulleted List@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[,&,&<Level2>802.11i: This supplemental draft standard is intended to improve WLAN security. It describes the encrypted transmission of data between systems of 802.11a and 802.11b WLANs (802.11g is essentially similar to 802.11b). It defines new encryption key protocols including the Temporal Key Integrity Protocol (TKIP) and the Advanced Encryption Standard (AES). AES will require new hardware when it is completed in 2003.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 18a Bulleted List@$[&&<Level2>802.15: This IEEE working group addresses the standard for WPANs. It has four active task groups. 802.15.1 had the job of delivering the standard for low-speed, low-cost WPANs and is based on the Bluetooth spec.<=<Level3>The 802.15.2 task group is developing the recommended practices on how 802.11 WLANs and 802.15 WPANs can coexist in the 2.4 GHz band. It is mainly working on the interference problem between Bluetooth and 802.11.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@$[%%<>802.x<+fe=33> (continued)<>0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 19a Bulleted List@$[%%<>802.x<+fe=33> (continued)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@q$s[&&<Level2>802.15 <Level2+fe=33>(continued)<Level2><=<Level3>The 802.15.3 task group is delivering a standard for higher speed WPANs from 10 Mbps to 55 Mbps at distances less than 10 meters.<=The 802.15.4 task group is preparing a standard for simple, low-cost, low-speed WPANs. Data ranges from 2 Kbps to 200 Kbps and uses DSSS modulation in the 2.4 GHz and 915 MHz ranges.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 46a Basic Layout@$[%%<>Networking hardware0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 24a Bulleted List@$[%%<>Hub0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$*[&&<+bu=\0+bs=1>A device which allows for the connection of one or more nodes, dividing the available bandwidth evenly between those which are active. Hence, a 10Mbps connection going into a hub to which ten nodes are attached would result in each node receiving a constant flow of 1Mbps in bandwidth.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 25a Bulleted List@$[%%<>Switch0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@KB$[A &A &<+bu=\0+bs=1>A device which allows for the connection of one or more nodes, each of which is granted connectivity in an "on/off" fashion, improving throughput from that of a hub, and managing available bandwidth efficiently.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 26a Bulleted List@$[%%<>Switch <+fe=33>(continued)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[ & &<+bu=\0+bs=1>In this manner, a 10Mbps connection going into a switch to which ten nodes are attached would result in each node having the appearance of a full 10Mbps dedicated connection, when in actuality, each connection is switched on and off as needed.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 27a Bulleted List@$[%%<>Router (Gateway)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[&&<+bu=\0+bs=1>A device which connects two separate networks which are of similar or dissimilar media or topology, e.g., ethernet to ethernet, ethernet to serial, etc.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 28a Bulleted List@$[%%<>Bridge0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[A &A &<+bu=\0+bs=1>A device which connects two segments of the same network over dissimilar media or topology, e.g., a DSL bridge (commonly - and erroneously - referred to as a "DSL modem").0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 31a Bulleted List@$[%%<>Broadband Router0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[&&<+bu=\0+bs=1>A router which connects (routes) traffic between a LAN and a broadband connection, usually attached to an external cable or DSL bridge.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 29a Bulleted List@$[%%<>Modem0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@iB$[ & &<+bu=\0+bs=1>A device which modulates and demodulates signal; i.e., converts a given signal from analog to digital and vice-versa. Often (and all too commonly) used to describe a cable router, a DSL bridge, and/or an ISDN terminal adapter.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 20a Bulleted List@$[%%<>Access Point (AP)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[ & &<>Wireless devices, such as laptops or PDA's, connect to a wired LAN via an AP, which is a hardware device or computer software which acts as a communication hub. AP's provide heightened wireless security and extend the physical range of a wireless LAN.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 30a Bulleted List@$[%%<>Wireless Router/Switch0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[&&<>A combination device (usually) consisting of a broadband router, a switch (4-8 ports), and an access point, in one compact case.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 47a Basic Layout@$[%%<>Wireless networking0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 33a Bulleted List@$;[%%8 8 <+fs=481>Independent Basic Service Set (IBSS) (Ad-Hoc Mode)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$z[&&<+bu=\0+bs=1>An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an access point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 23a Bulleted List@o$r[&&<+bu=\0+bs=1>An 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP). In infrastructure mode, wireless devices can communicate with each other or can communicate with a wired network. When one AP is connected to a wired network and a set of wireless stations it is referred to as a Basic Service Set (BSS).0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@b$7[%%8 8 <+fs=471>Basic Service Set (BSS)<-(Infrastructure Mode)0000910{name=,r=48}{name=Level2,r=49}{name=Level3,r=50}{name=Level4,r=51}{name=Level5,r=52}o  Page title_$$`Page 32a Bulleted List@$[%%<>Extended Service Set (ESS)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$ [ & &<+bu=\0+bs=1>An Extended Service Set (ESS) is a set of two or more BSS's that form a single subnetwork. Most corporate wireless LANs operate in infrastructure mode because they require access to the wired LAN in order to use services such as file servers or printers.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 52a Bulleted List@$[%%<>Service Set Identifier (SSID)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@Wb$[ & &<+bu=\0+bs=1>A service set identifier (SSID) is a sequence of characters that uniquely names a WLAN. This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 34a Bulleted List@[$h[&&<+bu=\0+bs=1>Frequency range within the 802.11 spectrum over which transmission may occur. The US uses only channels 1-11, and other jurisdictions can use up to the 14 channels defined by the spec. As channels overlap (each channel is 22MHz wide but only 5MHz from its neighbor), a maximum of three channels may be employed within close proximity (in the US).0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@b$ [%%<>Channel0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 35a Basic Layout@$[%%<>Channel <+fe=33>(continued)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page titleChCLIPBOARD\[9\&3`&3 &3   |&3&3 3z&3o &3o &3''&3 o &3&33j'3  'MM"M YL'3 I  M3f333f3333f3ffffff3f̙3f3f333f333333333f33333333f33f3ff3f3f3f3333f33̙33333f3333333f3333f3ffffff3f33ff3f3f3f3fff3ffffffffffff3ffff̙fff3fffffff3ffffff3f333f3333f3ffffff3f̙̙3̙f̙̙̙̙3f3f̙333f3̙333f3fff̙fff3f̙̙3f̙3f̙3f333f3333f3ffffff3f̙3f3fn@`RRRRRRRRRRRRRRRRءءءYءYءYءCB> >YءBA= =YءA@< <YءA@< <YءA @< <YءA@< <YءAA< <YءBB=<Y=bCE><Y=bJ EE <Y=bJ AE=Y^JAE>Y]Y\ءءY  00 0Lءء~~r,s+~~~~B BCB~~A ,B+~~@AAA~~@AA @~~@,A+~ 4@BA@~3@BA@~3A,B+~3B BC@~4IBJA~6I,J+~3I BJ B~3NP~ 4O#-P#,~...##RE G##J<<u#t#>>#C#:ABA5@A@ 2#A#/ @A@+ @AA(#A# &AB@$ $ @C@$ ' #J #$ #$@J AX&!AJ BX)###O##X.pء؉،##k##ؐؾؓػؖ##k##ؙ$w؝!wؠ  k##6mء6p6r k#6ACD6@ BD6?   8#6?&AC6?(AC6?  8#6? .AC6@ -B B6A : #6H -J A6H .J@6H  A#66؋ء؅#  G###wl@vw؅#  G###ww؅#  G###wwt#  G##t66.B? =6C # ## =6B B,@= =6A B,@= =6A # ## =6A B,@= =6A B,A= =6A # ##=6BB.F?=6CB5@F=6J # ##=6J B5 AF=6J B6O## #####O6ءء6wa########wRa##########RRa##########RRa##########RRa##########R##############>##############>##############>##############>##############>##############>##############>##############>##############>##############>]##########T22##############>##############>##############>##############>##############>##############>##############>RRR((                                                                                                                        ((RRRRRRRRRRR4B3@3@ؔ ؓؒؒ ؒ ؓ   ؓ ؒ ؒ ؒ.Zؓ .!7ؔ .!8RRRRRRR@ CVkW"W"XkXqR<+fn=Times New Roman+fe=32+sd=2+sw=0>(graphic courtesy Unixwiz.net)0000864{name=,r=1}{name=Level2,r=2}{name=Level3,r=3}{name=Level4,r=4}{name=Level5,r=5}o _$$`Page 53a Bulleted List@$[%%<>SSID Broadcast (Beacon)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[&&<+fs=414+bu=\0+bs=1>Each AP advertises its presence several times per second by broadcasting beacon frames that carry the SSID. Stations can discover APs by passively listening for beacons, or they can send probe frames to actively search for an AP with the desired SSID. Once the station locates an appropriately-named AP, it can send an associate request frame containing the desired SSID. The AP replies with an associate response frame, also containing SSID. For security reasons, it may be desirable to turn this off, if possible.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 48a Basic Layout@$[%%<>Wireless security0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 36a Bulleted List@$[&&<+bu=\0+bs=1>Now widely recognized as flawed, WEP is a data encryption method used to protect the transmission between 802.11 wireless clients and APs. However, it uses the same key among all communicating devices. WEP's problems are well-known, including an insufficient key length and no automated method for distributing the keys. WEP can be easily cracked (given time) with off-the-shelf tools.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@b$'[%%<+fs=554>Wired Equivalent Privacy (WEP)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 37a Bulleted List@]$i[&&<+bu=\0+bs=1>The Wi-Fi Alliance put together WPA as a data encryption method for 802.11 wireless LANs. WPA is an industry-supported, pre-standard version of 802.11i utilizing the Temporal Key Integrity Protocol (TKIP), which fixes the problems of WEP, including using dynamic keys. WPA will serve until the 802.11i standard is ratified in late 2003 (hopefully).0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@b$%[%%<+fs=554>Wi-Fi Protected Access (WPA)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 38a Bulleted List@o$r[&&<+bu=\0+bs=1>The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$([%%8 8 <>Temporal Key Integrity Protocol (TKIP)0000910{name=,r=48}{name=Level2,r=49}{name=Level3,r=50}{name=Level4,r=51}{name=Level5,r=52}o  Page title_$$`Page 39a Bulleted List@$![H&H&<+bu=\0+bs=1>EAP is an 802.1x standard that allows developers to pass security authentication data between RADIUS and the access point (AP) and wireless client. EAP has a number of variants, including: EAP MD5, EAP-Tunneled TLS (EAP-TTLS), Lightweight EAP (LEAP), and Protected EAP (PEAP).0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$1[%%dd<+fs=554>Extensible Authentication Protocol (EAP)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 40a Bulleted List@$[&&<+fs=414+bu=\0+bs=1>Cisco LEAP, or EAP Cisco Wireless, is an 802.1x authentication type that uses a log-on password as the shared secret. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS server, Cisco LEAP provides access control through mutual authentication between client devices and the wireless network and provides dynamic, per-user WEP keys to help protect the privacy of transmitted data.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$ [%%<>Cisco LEAP0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 49a Basic Layout@$[%%<>Miscellaneous0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 41a Bulleted List@$"[&&<+fs=360+bu=\0+bs=1>The IEEE (Eye-triple-E) is a non-profit, technical professional association of more than 380,000 individual members in 150 countries. The full name is the Institute of Electrical and Electronics Engineers, Inc., although the organization is most popularly known and referred to by the letters I-E-E-E.<-<-Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace and consumer electronics, among others.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@/B$R[%%~~<+fs=360+bu=\0+bs=1>Institute of Electrical and Electronics Engineers, Inc. (IEEE)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 42a Bulleted List@;$X[H&H&<+bu=\0+bs=1>The Wi-Fi Alliance is a nonprofit international association formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification. The goal of the Wi-Fi Alliance's members is to enhance the user experience through product interoperability. The organization is formerly known as WECA.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$[%%<+bu=\0+bs=1>Wi-Fi Alliance0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 43a Bulleted List@$[&&<+bu=\0+bs=1>A WISP is a service provider that specializes in offering users wireless access to the Internet. Many WISPs offer hotspot access.0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$=[%%dd<+fs=554+bu=\0+bs=1>Wireless Internet Service Provider (WISP)0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 44a Bulleted List@$ [%%<>Sources0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$ [&&<>Wireless Glossary<-(http://www.devx.com/wireless/Door/11259)<=<|Webopedia (http://www.webopedia.com)<=Wi-Fi Planet (http://www.wi-fiplanet.com)<=<|Unixwiz.net (http://www.unixwiz.net)<=<|IBM PC<-(http://www.pc.ibm.com/ww/alliances/cisco)<=<|IEEE (http://www.ieee.org)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 3a Bulleted List@$[%%<>OS/2 Specifics0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$z[;&;&<>OS/2 hardware support on the client side, including the current state of device driver development<=Security constraints0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 22a Bulleted List@$[%%<>OS/2 hardware support0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[2&2&<>Work is ongoing<=Excellent list maintained by Jonas Buys at http://www.os2warp.be/<=Most standard 802.11b cards supported<=Generic Prism driver in beta<=No 802.11a or g support at this time<=No WPA support at this time<=Some WEP support (64-bit & 128-bit)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 50a Bulleted List@$[%%<>OS/2 driver installation0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$[ & &<>DDInstal for many drivers<=Manual installation for others (beta)<=PROTOCOL.INI may need to be edited from defaults, often involving knowledge of driver-specific options0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 51a Bulleted List@$[%%<>PROTOCOL.INI tweaks0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@+B$[G&G&<>Some general guidelines:<=<Level2> DESIRED_SSID = "<Level2+fe=33>ssid<Level2>"<= STA_MODE = "INFRASTRUCTURE"<= PREAMBLE = "BOTH"<= PSP_MODE = "CAM"<= AUTH_TYPE = "OPEN_SYSTEM"<= WEP = "DISABLED"0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 54a Bulleted List@$ [%%<>PREAMBLE0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@ $[< &< &<>Designed to increase throughput when set to SHORT<=Often incompatible between manufacturers<=Advice: set to BOTH or no setting at all; once connection has been verified, try setting to SHORT0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 55a Bulleted List@$ [%%<>PSP_MODE0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[L&L&<+fs=414>Power savings modes<=Not available with all cards/drivers<=Typically used with mPCI or PC Card NICs<=Typically three (3) modes:<=<Level2+fs=368>CAM: Constant Awake Mode - always on<=PSP: Power Saving Profile - radio stops broadcasting after packets are transmitted or received, based upon a time threshhold<=FASTPSP: Fast PSP - combination of CAM and PSP; radio switches off, but only after traffic has subsided 0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 56a Bulleted List@$ [%%<>AUTH_TYPE0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@3$T[B&B&<+fs=360>Authentication mode<=Typically five (5) options:<=<Level2+fs=320>OPEN_SYSTEM (or OPEN) - client will use whatever scheme (including none) to connect <Level2+fs=320+fe=33><<use this first!><Level2+fs=320><=WEPOPEN - full encryption; AP must accept client's authentication mode<=WEPSHARED - similar to WEPOPEN (according to Cisco)<=MIXEDOPEN - client may interoperate with other nodes whether encryption is on or off (but may not be able to address AP directly) within a single cell (no roaming)<=MIXEDSHARED - similar to MIXEDOPEN, but client may operate within a range of cells (roaming)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 57a Bulleted List@$[%%<>Other driver options0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[ & &<>MANUFACT_CODE = <+fe=33>n<+fe=32>x<+fe=33>nnn<-<+fe=32>Important with Prism chipsets to determine whose implementation<><=PRODUCT_CODE = <+fe=33>n<+fe=32>x<+fe=33>nnnn<-<+fe=32>Important with Prism chipsets to determine the correct card (chipset) revision0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 58a Bulleted List@$[%%<>Driver Troubleshooting Tips0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@B$![&&<>Check LANTRAN.LOG!<=Always, always, always connect <+fe=33>without<> encryption <+fe=33>first<><=Turn on SSID broadcast (beacon)<=Check the channel on the AP & the client<=Watch the lights on the card (if present)<=Read the driver's NIF manually & check against settings in PROTOCOL.INI 0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 4a Bulleted List@$[%%<>Planning a Wi-Fi Network0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@OB$b[ & &<>Ad-hoc vs Infrastructure<=Hotspot topology<=Access point placement<=Single WLAN or WLAN segment?0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 59a Bulleted List@$[%%<>Hotspot Topology0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$&[&&<>Logical star, but without wires<=When more than one AP is involved, can either be bridged or routed (one network or many)<=High-gain antenna or reflector may improve bandwidth saturation in outlying areas or low SN (signal:noise) situations<=AP placement is critical so channels don't overlap0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 82a Bulleted List@$[%%<>Access point placement0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$5[&&<>Consider where Wi-Fi will be used<=Don't waste coverage in unnecessary places<=Most AP's have eliptical signal patterns, and are best placed against a wall at the far end of the coverage area<=Most AP's have removable antennas, making upgrading to a better one fairly straightforward<=Don't overlap channels0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 83a Bulleted List@$%[%%8 8 <+fs=554>Single WLAN or WLAN segment?0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@7$V[&&<>Consider interaction with wired devices if both wired & wireless clients will be present<=Maybe wired is better?<=Adding a WLAN segment can be as easy as snapping in a CAT-5 cable between AP and existing switch or hub<=It can also be as tricky as subnetting an existing IP network (or placing on an entirely different network), and routing 0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 5a2-Column Bullets@[<>Ad-hoc<=<Level2>Point-to-Point<=No AP required<=Channels must match<=Not very reliable; mostly proprietary, as 802.11 doesn't specify0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B[&&<>Infrastructure<=<Level2>Client-Server (AP)<=AP must be present<=Client finds channel (usually)<=Usually reliable, even in mixed-<-manufacturer setups0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@B$[%%<>Ad-hoc vs Infrastructure0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title_$$`Page 60a Bulleted List@$[%%<>OS/2 Specifics0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$-[&&<>Hardware compatibility<=Driver availability0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 61a Bulleted List@$[%%<>Hardware Compatibility0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@Mb$[7&7&<>OS/2 Compatible Hardware List!<=Specific vendor<=Read hardware reviews of available chipsets<=Check firmware compatibility (e.g., latest Cisco firmware breaks non-Windows platform drivers)<=OS/2-Wireless Users Mailing List!0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 62a Bulleted List@$[%%<>Driver availability0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@wb$v[ & &<>OS/2 Compatible Hardware List!<=Software Choice<=eComStation.com<=Specific vendor<=OS/2-Wireless Users Mailing List!0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 63a Bulleted List@$[%%<>Hardware Installation0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[=&=&<>Usually Plug'n'Go<=Check antenna location (internal, external)<=For internal cards, be sure to reconnect any disconnected cables, etc. before closing system<=For PC Card units, be sure PCMCIA/PC Card controller is supported and/or other cards function0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 64a Bulleted List@$[%%<>Software Installation0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[ & &<>Driver may come with DDInstal module<=Usually, LAPS is all that's required<=Additional steps necessary if added as "second" adapter0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 65a Bulleted List@$[%%<>Configuration after install0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$-[&&<>Turn encryption off!!!!!<=If Wi-Fi State utility is available for your hardware, use it to check signal strength & network availability<=Get one protocol working first!<=IP is usually best to set up first<=Only one adapter may be configured as a DHCP client at any given time (hard OS/2 restriction)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 66a Bulleted List@$[%%<>Secondary Configuration0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[ & &<>Set WEP keys (if encryption is to be used)<=Add additional protocols<=Configure as secondary adapter (or as primary with a second adapter)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 68a Bulleted List@$[%%<>Tips, Tricks, & Hacks0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@[$h[ & &<>Secondary adapter configurations<=Multiple wireless cards<=Bluetooth co-existence<=PROTOCOL.INI hacks 0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 67a Bulleted List@$([%%8 8 <+fs=479>Secondary Adapter Configuration0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$[&&<>Method 1: Use multiple CONFIG.SYS & PROTOCOL.INI files<=Method 2: Load both drivers with one PROTOCOL.INI, & use cmd file to toggle0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 69a2-Column Bullets@$2[%%<+fs=479>Multiple CONFIG.SYS &<=PROTOCOL.INI files0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@[h[<>Pros<=<Level2>Saves resources<=Alt-F1 on reboot<=PROTOCOL.INI remains simple<=Driver conflicts avoided0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@[&&<>Cons<=<Level2>Requires reboot to swap configurations<=Can be confusing to some end users<=Requires twice the configuring, as two file sets must be edited0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 70a2-Column Bullets@!$K[%%<+fs=407>Load both drivers with one PROTOCOL.INI,<=& use cmd file to toggle0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@7bV[X X <>Pros<=<Level2>Elegant solution<=No reboot required<=Can switch networks "on-the-fly"0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text@st[4&4&<>Cons<=<Level2>PROTOCOL.INI gets complicated<=cmd file can be difficult to script<=Timing may need to be fine-tuned0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 71a Bulleted List@$2[%%<+fs=479>Multiple CONFIG.SYS &<=PROTOCOL.INI files0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$=[&&<>\IBMCOM (Root of tree)<=<Level2>\DLL (LAPS libraries)<=\MACS (NIC drivers & NIFs)<=\PROTOCOL (Protocol drivers & NIFs)<=\WIRELESS (Fake IBMCOM root)<=<Level3>PROTOCOL.INI (Wi-Fi & protocols only)<=*.msg (NIC driver message file - when used)<=\MACS (Wi-Fi driver only; no NIF)<=\PROTOCOL (Used protocol drivers only)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 72a Bulleted List@$2[%%<+fs=479>Multiple CONFIG.SYS &<=PROTOCOL.INI files0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@!$[G &G &<>CONFIG.SYS changes:<=<Level2+fs=278>DEVICE=C:\IBMCOM\LANMSGDD.OS2 /I:C:\IBMCOM\WIRELESS /S<=DEVICE=C:\IBMCOM\PROTMAN.OS2 /I:C:\IBMCOM\WIRELESS<Level2><=<>Save as \OS2\BOOT\CONFIG.W<=Add to ALTF1BOT.SCR0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 73a Bulleted List@!$K[%%<+fs=407>Load both drivers with one PROTOCOL.INI,<=& use cmd file to toggle0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@_$[&&<>Both drivers get loaded in CONFIG.SYS<=Wired NIC is configured as LAN0; wireless is LAN1<=DHCP client is enabled for LAN0<=Static IP is configured for LAN1 as 0.0.0.0 (no address)<=IFCONFIG LAN1 line in \MPTN\BIN\SETUP.CMD is REMMED0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 74a Bulleted List@!$K[%%<+fs=407>Load both drivers with one PROTOCOL.INI,<=& use cmd file to toggle0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$8[p&p&<>WiFi-On.cmd (excerpted from a script by Neil Waldhauer):<=<Level2+fs=320+bu=\0+bs=1>/* This is REXX */<=say "Activating the wireless network card"<='@ ifconfig lan0 down'<='@ ifconfig lan0 delete'<='@ dhcpmon -t'<='@ route -fh'<='@ arp -f'<='@ dhcpstrt -i lan1 -d 0'<=say "Wireless networking enabled"<=return0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 75a Bulleted List@!$K[%%<+fs=407>Load both drivers with one PROTOCOL.INI,<=& use cmd file to toggle0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$([&&<>WiFi-Off.cmd (adapted from WiFi-On.cmd, ibid.):<=<Level2+fs=320+bu=\0+bs=1>/* This is REXX */<=say "Activating the wired network card"<='@ ifconfig lan1 down'<='@ ifconfig lan1 delete'<='@ dhcpmon -t'<='@ route -fh'<='@ arp -f'<='@ dhcpstrt -i lan0 -d 0'<=say "Wired networking enabled"<=return0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 76a Bulleted List@!$K[%%<+fs=407>Load both drivers with one PROTOCOL.INI,<=& use cmd file to toggle0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$3[#&#&<>How the scripts work:<=<Level2>Shutdown the active interface<=Logically delete the active interface<=Terminate running DHCP client<=Flush all IP routes<=Flush the ARP tables (re-initialize ARP)<=Start DHCP client on alternate interface; set timeout for DHCP reply (should bring up interface automatically)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 77a Bulleted List@$[%%<>NetBEUI Gotchas0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@Y$[ & &<>TCPBEUI and NETBEUI must be configured on different logical adapters (each physical adapter may have more than one logical reference) - keep them straight!<=TCPBEUI is routable; NETBEUI is not (which is why TCPBEUI was developed)0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 78a Bulleted List@$[%%<>IPX Pointers0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@7$[&&<>IPX network address is derived from the MAC address<=Not all Wi-Fi drivers automatically broadcast the card's MAC over IPX<=Use the NETADDRESS parameter in the [ODI2NDI] section of PROTOCOL.INI to specify address0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 80a Bulleted List@$[%%<>WEP Oddities0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@b$ [=&=&<>Not all manufacturers implement WEP the same way in the user interface<=Some access points require complete hex strings<=Some only require ASCII characters<=Given the same ASCII "seed," all WEP-enabled drivers should generate the same sets of keys, but some don't!0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_$$`Page 79a Bulleted List@$[%%<>PROTOCOL.INI Hacks0000910{name=,r=18}{name=Level2,r=19}{name=Level3,r=20}{name=Level4,r=21}{name=Level5,r=22}o  Page title@$[a&a&<>The driver won't load!<=<Level2>Under the driver's MAC section, check:<=<Level3>MANUFACT_CODE<=PRODUCT_CODE<=<Level2>Verify that the current hardware rev of the card is indeed the one specified by the above<=Check LANTRAN.LOG for error messages<=If information is insufficient, turn on full debugging (if available), e.g.:<=<Level3>DEBUG_LEVEL = 0xFFFF<=<Level2>Roll back or forward a driver revision0000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_d$$`Page 81a Bulleted List@$[%%<>References / Recommendations0000910{name=,r=53}{name=Level2,r=54}{name=Level3,r=55}{name=Level4,r=56}{name=Level5,r=57}o  Page title\^_`abrstuv @b([))<+fs=414>OS/2-Wireless Users Mailng List Archives<><=<Level2+fs=368+bu=\0+bs=1>http://www.2rosenthals.com/lists/os2-wireless_users<=<+fs=414>OS/2-Wireless Users Mailng List Subscriptions<=<Level2+fs=368+bu=\0+bs=1>steward@2rosenthals.com | subscribe os2-wireless_users<=<+fs=414>OS/2 Compatible Hardware List<=<Level2+fs=368+bu=\0+bs=1>http://www.os2warp.be/wifi<=<+fs=414+fe=34>Jeff Duntemann's Drive-By Wi-Fi Guide<+fs=414><=<Level2+fs=368+bu=\0+bs=1>Duntemann, Jeff, Paraglyph Press, Inc., 2003<=<+fs=414+fe=34>Wireless Hacks: 100 Industrial-Strength Tips & Tools<+fs=414><=<Level2+fs=368+bu=\0+bs=1>Flickenger, Rob, O'Reilly & Associates, Inc., 20030000910{name=,r=58}{name=Level2,r=59}{name=Level3,r=60}{name=Level4,r=61}{name=Level5,r=62}o Bulleted text_