Home > Articles

This chapter is from the book

Using Wireless Network Connections Properties

As I’ve explained in this chapter, the Wireless Network Connections Properties window is opened by first opening the Network Connections item from the Windows Control Panel. With the Network Connections window open, highlight a wireless connection from the right pane. Right-click to open the context menu associated with the wireless connection, and choose Properties to open the Wireless Network Connection Properties window, shown in Figure 3.10.

Figure 3.10

Figure 3.10 The Wireless Network Connection Properties window is used to configure wireless connections.

Essentially, the Wireless Network Connection Properties window is the command center for a specific wireless adapter, such as the wireless capabilities "baked into" a laptop with Intel Centrino mobile technology.

When the Wireless Network Connection Properties window opens, the General tab will be displayed as you can see in Figure 3.8. To get started configuring your wireless connection, click Wireless Networks. The Wireless Networks tab will be displayed, as shown in Figure 3.11.

Figure 3.11

Figure 3.11 The Wireless Networks tab of the Wireless Network Connection Properties window is the command center for configuring wireless connections.

At the top of the Wireless Networks tab, you’ll see the Use Windows to Configure My Wireless Network Settings check box. To make sure that the windows, wizards, and dialogs explained in this chapter work the way I’ve explained, this box should be checked. If it is not, wireless network settings might end up being configured using utilities provided by laptop vendors such as IBM, or using software such as Intel PROSet/wireless, provided to some vendors such as Dell.

The most important interface on the Wireless Networks tab is the Available Networks area, shown toward the top of Figure 3.11. Click the View Wireless Networks button to see the wireless networks you can connect to.

When you click the View Wireless Networks button, your computer scans the area for Wi-Fi signals and displays the wireless networks it finds in the Choose a Wireless Network dialog shown in Figure 3.12. If you want to rescan for wireless signals, perhaps because you’ve moved your laptop to a new location, click the Refresh Network List command under Network Tasks on the top left of the window. The strength of the signal from each wireless network is indicated by green bars. Just like a cell phone, the more bars, the stronger the signal.

Figure 3.12

Figure 3.12 Choose a Wireless Network shows all wireless networks within range and indicates signal strength with green bars.

Wireless networks are listed by SSID, service set identifier. The SSID is used to identify the "station" broadcasting a Wi-Fi signal. The SSID is also sometimes called a network name or a wireless network name. (Apple calls the SSIDs used by its AirPort wireless products its AirPort ID.)

You should know that some wireless stations (also called Access Points or APs) do not broadcast their SSID (usually for reasons of security). There’s nothing intrinsic to stop you from connecting to one of these networks, but you need to know the SSID—it won’t show up in the Choose a Wireless Network list no matter how many times you click Refresh. For more information about why a wireless network would operate with this kind of stealth, see Chapter 18.

Connecting to a Wireless Network

To connect to a wireless network for the first time, select the network by SSID in the Choose a Wireless Network list. Next, click the Connect button in the lower right.

Depending on the security settings of the wireless network, you will get one of a couple different types of warnings after you click the Connect button. Notice in Figure 3.12 that the wireless network called Braintique is security-enabled while the wireless network called ASUS_Pocket_AP is not. When you connect to Braintique you see a message requesting a network key as shown in Figure 3.13. You need to enter a special key code to complete the connection. This key would be given to you by the person who administers the security-enabled wireless network.

Figure 3.13

Figure 3.13 Security-enabled wireless networks require a network key to establish the connection.

The wireless network called ASUS_Pocket_AP is unsecured, which means there is no security restriction—anyone could connect to this wireless network. Because unsecured wireless networks (also called open access points) have no security restrictions, there is a possibility that someone else could "listen in" on the data sent and received by anyone who connects. That’s why Windows gives the warning shown in Figure 3.14. Clicking the Connect Anyway button establishes the connection to the unsecured network. Most networks in public places (coffee shops, hotel lobbies, public libraries, and so on) are unsecured, so you are likely to see this warning when you are out and about. You learn more information on the possible risks of connecting to an unsecured wireless network in Chapter 18.

Congratulations, you’re connected! Teacher gives you a gold star! Regardless of whether the wireless network is unsecured or security-enabled, once connected you will get a Connected status with a gold star as shown in Figure 3.15. You can now click the close box (the red X in the upper-right corner) and start using your wireless connection to access anything on the Internet your little heart desires.

Figure 3.14

Figure 3.14 Windows will ask you for confirmation when connecting to an unsecured wireless network.

Figure 3.15

Figure 3.15 Successful connections to wireless networks are indicated by the Connected status and a gold star.

The process of connecting to a wireless network is something you will do often as you travel around with your mobile computer. I showed you how to achieve a connection starting at the Control Panel item called Network Connections because that let you see the wireless networking dialogs with all possible options.

However, Windows provides a more streamlined way to choose a wireless network. The system tray (in the lower right of your screen) has an icon for your wireless connection. Double-click this icon and choose View Available Wireless Networks from the context-sensitive menu as shown in Figure 3.16. Your computer will quickly find all the available wireless networks.

Figure 3.16

Figure 3.16 The quick way to find wireless networks is with the wireless connection icon in the system tray.

Advanced Wireless Network Security Settings

When you successfully connect to a wireless network for the first time, Windows automatically creates a connection profile for that wireless network. In most cases you will never need to access the profile. However, from time to time, there might be situations in which altering a profile is the only way you will get connected or respond to a change in the way the network is run (changing from unsecured to secured, for example). So, now that you’re an expert at connecting, graduate to the advanced class where you will learn how to modify wireless connection profiles.

To set wireless network security settings

  1. Click the Start button, and then select Control Panel.

  2. Choose Network Connections in the Control Panel.

  3. Select your Wireless Network Connection from the list on the right of the Network Connections window.

  4. Click Change Settings of the Connection at the left of the window.

  5. Select the Wireless Networks tab.

  6. The Preferred Networks section of the Wireless Network Connection Properties dialog should now be visable (see Figure 3.17). There will be at least one entry with the same name as the wireless network you connected to previously.

Figure 3.17

Figure 3.17 Automatically generated connection profiles are listed in the Preferred Networks section.

Click on a connection profile, and then click the Properties button to get access to advanced settings where you can change security-related options.

The Association tab (and the Authentication tab you can see behind it in Figure 3.18) is used to set encryption keys for the wireless network. Although entering this information can get complicated, it doesn’t need to be.

An encryption key is simply a key, or formula, used to encrypt, or encode, information so that it is not easily readable. Generally, you need an encryption key twice—once to encode the information, and then once again to decode it.

First of all, if you are connecting to a public hotspot, it will almost certainly be running without encryption. In this case, the Data Encryption drop-down list should be set to disabled (and you probably don’t need to make any other settings in this window).

Industry statistics show that as much as 90% of all private wireless networks are running without encryption. This is a bad practice that makes the wireless network vulnerable to infiltration as I explain in Chapter 18. If you are doing so, I hope that you’ll switch to encryption after reading this book. But for the moment, if you are connecting to a private network that is running without encryption, once again all you need to do is to set the Data Encryption drop-down list to Disabled.

Figure 3.18

Figure 3.18 The Association tab of the Wireless Network Properties window is used to set encryption keys.

It’s possible to provide encryption keys automatically, but this requires a special server, so most likely it will only be done in situations such as a corporate campus that is connected via wireless. If you are connecting to a wireless network that automatically provides encryption keys, check the This Key Is Provided for Me Automatically check box, as shown in Figure 3.19.

I’m leaving the most messy possibility for last. That is, the network is encrypted (as all private wireless networks should be), but the key is not automatically supplied. In this case, as you would suspect, to connect to the network, you need to know the key.

In this situation, documentation often says something such as "Contact your network or system administrator for information about your encryption key."

If you are like me, and have a small home or business network, at this point you throw up your hands and say, "But I am the bloody system or network administrator. Or at least, there’s no one else here to do it if I don’t." So where do you find the encryption key?

Figure 3.19

Figure 3.19 Check This Key Is Provided for Me Automatically if you are connecting to a wireless corporate network that provides this feature.

The good news is that you probably set the wireless network up. This means that you entered the encryption key in the first place, using mechanisms that I explain in Chapter 13, "Setting up Your Access Point," Chapter 14, "Configuring Your Wi-Fi Network," and Chapter 15, "Advanced Access Point Configuration." In those chapters, I advise you to make note of crucial settings, such as the encryption key. But even if you didn’t write it down, you can open the access point’s configuration utility (as explained in Chapter 13), and find out what it is.

To summarize, I’ve explained three encryption key possibilities:

  • There is no encryption because you are connecting to a public network or a sloppy private network.

  • A key is provided automatically by a special server, generally only the case in large corporate wireless networks.

  • You know the encryption key and have entered it manually.

Whichever is the case, click OK to accept your encryption settings. The next step is to test your network.

Testing the Network

There’s no magic to testing your wireless network. Essentially, there are three steps you can take:

  • Inspecting the connection information provided by Windows XP

  • Making sure that you can browse your entire network

  • Seeing if you can connect to the Internet (provided your network has working Internet access)

As soon as you are successfully connected to a wireless connection, information about the successful connection will appear in balloon form above the network icon in the Windows taskbar, as shown in Figure 3.20.

Figure 3.20

Figure 3.20 When you are successfully connected, a balloon above the network icon in the Windows taskbar will provide connection information.

By the way, to see status information at any time similar to that shown in Figure 3.20, just hover the mouse above the wireless connection icon in the taskbar.

Returning for a moment to the Network Connections window, if you look at Figure 3.21, you can now see that the big red X, shown back in Figure 3.9, is no longer associated with the wireless adapter. This indicates that the wireless connection is working.

The context menu associated with the wireless connection (shown in Figure 3.22) provides a way to enable/disable the wireless connection, check its status, and perform other important operations.

Figure 3.21

Figure 3.21 There’s no longer a red X associated with the wireless adapter, which signifies that the wireless connection is working.

Figure 3.22

Figure 3.22 You can perform many tasks using the context menu for the wireless connection.

To see that your wireless connection is actually working, the best thing you can do is open an Internet browser and attempt to access something on the Internet. (This assumes, of course, that your network itself is connected to a router or access point/router combination with Internet access as explained in Part IV.)

Another nitty-gritty test to make sure wireless networking functions properly is to use Windows Explorer to connect to the other computers on your network (see Figure 3.23).

Figure 3.23

Figure 3.23 A good way to determine that wireless networking is working is to check that you can see the other computers on your network.

One final window you should know about is the Wireless Network Connection Status window, shown in Figure 3.24.

There are a number of ways you can open the Wireless Network Connection Status window, including

  • Double-clicking the Windows taskbar icon representing the wireless connection

  • Selecting the wireless connection in the Network Connections window and choosing View Status of the Connection on the Network Tasks pane

  • Selecting the wireless connection in the Network Connections window, right-clicking, and choosing Status from the context menu

Figure 3.24

Figure 3.24 The Wireless Network Connection Status window shows the status of a wireless connection.

With the Wireless Network Connection Status window open, you can get information about connection status, network name, duration, speed, and signal strength. Signal strength is represented by a series of colored bars. (Five green bars is best; fewer bars indicate a weaker signal.) Chapter 8 provides some information about speed, so you can get a sense of whether your wireless connection speed is good enough for your uses. (You can never have a connection that is too fast.)

Clicking the Disable button on the Wireless Network Connection Status window disables a wireless connection.

Clicking the Properties button on the Wireless Network Connection Status window opens the Wireless Networks tab of the Wireless Network Connection Properties window (see "Using Wireless Network Connection Properties" earlier in this chapter).

Clicking the View Wireless Networks button on the Wireless Network Connection Status window opens the dialog that shows all the wireless networks within range.

Connecting to a Wireless Network Automatically

Let’s go back for a moment to the Wireless Networks tab of the Wireless Network Connection Properties window. You might have noticed the Preferred Networks box at the bottom of the tab and wondered what this area is for (see Figure 3.25).

Figure 3.25

Figure 3.25 The Preferred Networks box is used to connect automatically to wireless "stations."

The answer is that the Preferred Networks box is used to connect automatically to given wireless signals. The entries in this drop-down list are automatically connected when your computer is turned on, which is convenient for home and office networks. (Who wants to have to manually connect each time?)

Furthermore, using the Move Up and Move Down buttons, you can determine the order of connection.

To add a network to the Preferred Networks box, click the Add button and enter its SSID. You’ll also have to supply the encryption key if it is needed, as I explained earlier in this chapter.

As you might suspect, selecting a wireless network and clicking Remove removes the wireless network from the list of automatic connections.

Advanced Preferred Network Features

If you click the Advanced button on the bottom right of the Wireless Network tab, the Advanced dialog will open. The Advanced dialog, shown in Figure 3.26, allows you to set a number of options related to automatic connection.

Figure 3.26

Figure 3.26 The Advanced dialog is used to set a number of properties relating to automatic connection.

Using the Advanced dialog, you can

  • Set the wireless connection to automatically connect to both access points and ad hoc networks (access point preferred)

  • Set it to connect to access points only

  • Set it to connect to ad hoc networks only

The difference between an access point network and an ad hoc network is that an access point network broadcasts its signal from a central base station, whereas an ad hoc network involves peer-to-peer communication between computers. You’ll find more about the distinction, and how to work with both kinds of wireless networks, in Part IV.

In the Advanced dialog, you can also check Automatically Connect to Non-preferred Networks. (This check box is shown at the bottom of Figure 3.26.) If this option is checked, the wireless connection will automatically connect to any available signal it can, even if no wireless networks are listed in the Preferred Networks box.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020