18. Next, select the connection type. Two types are available:InfrastructureUse this connection type when your computer will be communicatingwith wireless access points.AdhocUse this connection type to communicate directly with anothercomputer without connecting to a wireless access point first.19. Select either Auto, 802.11b, 802.11g or 802.11a for Wireless Mode. Thissetting is available only if the installed adapter is compatible with differentstandards. If you select Auto, the adapter will automatically run in the modethat is compatible with in-range access points. If you set the same mode as onthe in-range access point, the connection will be established faster.20. Select one of the wireless security types, listed in the figure:None (encryption is disabled)Select this option when connecting to non-secured (open) wirelessnetworks such as public hotspots. Optionally, you can establish awireless LAN connection before logging on to Windows. To do so,select Use this profile to connect during Windows logon.Use Static WEP KeysA wireless network that implements this type of security usespredefined alphanumeric or hexadecimal strings (keys) in encryptingand decrypting data that is transmitted and received through thewireless network. Usually, you enter these keys only once. They arethen automatically associated with your wireless adapter each time theadapter is inserted or your computer is started. Optionally, if you wantto use this profile to establish a wireless LAN connection beforelogging on to Windows, select Use this profile to connect duringWindows logon.Use Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK)Wireless networks that implement this type of security require users toauthenticate with a Pre-Shared Key. Data transmitted and receivedthrough the wireless network can be encrypted and decrypted by useof WEP or TKIP data encryption. Optionally, if you want to establish awireless LAN connection before logging on to Windows, select Usethis profile to connect during Windows logon.Use IEEEE 802.1x AuthenticationWireless networks that implement IEEE 802.1x ExtensibleAuthentication Protocol (EAP) security require each user toauthenticate his or her identity with a username and password or acertificate credential before being allowed to connect. Data isencrypted and decrypted by use of either static or dynamic WEP keys.Dynamic keys are session-based and are generated each time anauthentication attempt is made.Figure 18. Wireless security typesChapter 2. Using location profiles 17