I really don't know how anyone who doesn't know much about computers sets up WIFI, always seams to be so fecking awkward
well it just takes a bit of research to get it right, you can set it up very easy.. but wrongly.
try learning this...
CWNA course / exam i have ..
Radio Frequency Fundamentals
Physical aspects of RF propagation
Types of losses and attenuation that affect RF communications
Types of modulation used for wireless communications
How channels and bandwidth are related to each other in wireless networks
Three types of Spread Spectrum used in wireless networking
RF Math and System Operating Margin
RF units of measure
Basic RF mathematics
RF signal measurements
Understand link budgets
Define and calculate System Operating Margin (SOM)
802.11 Service Sets
Explain three types of service sets defined for use within 802.11 WLANs
Roaming within a WLAN
Load-balancing as a method to improve congestion in WLANs
RF Power Output Regulations
Understand international, regional, and local RF spectrum management organisations
Understand RF channels in the unlicensed 2.4 GHz and 5 GHz frequency ranges
How power output limitations are enforced by the FCC for Point-to-Multipoint (PtMP) and Point-to-Point (PtP) wireless connections
Power over Ethernet
Recognise the two types of devices used in Power over Ethernet (PoE)
Recognise the differences between the two types of Power Sourcing Equipment (PSE)
Understand the two ways in which power can be delivered using PoE
Understand the importance of planning to maximise the efficiency of Power over Ethernet
Wireless LAN Operation
Ad Hoc networks
Infrastructure networks
Bridged networks
Repeater networks
Mesh networks
WLAN switched networks
Enterprise Wireless Gateway networks
Enterprise Encryption Gateway networks
Virtual AP networks
Evolution of WLAN architectures
WLAN Management
WLAN Security
Security Policy and Procedures
Legacy 802.11 Security Components
802.11i Security Components
WPA-Personal
WPA-Enterprise
WPA2-Personal
WPA2-Enterprise
Baseline Security Practices (SOHO, SMB, Enterprise)
802.11 Analysis and Troubleshooting
Introduction to 802.11 Protocol Analysis
802.11 Data Frames
802.11 Control Frames
802.11 Management Frames
Frame Fragmentation
Power Saving operations
Transmission Rates
Coordinating 802.11 Frame Transmissions
Differences between CSMA/CD and CSMA/CA
Distributed Coordination Function (DCF)
Quality of Service in 802.11 WLANS
Antennas
Antenna characteristics and behaviours
Types of antennas commonly used with WLANs
Advanced antenna systems
Antenna placement and mounting
Antenna safety
Types of antenna cables, connectors, and accessories
What is Site Surveying?
Understanding the need for a site survey
Defining business requirements and justification
Facility analysis
Interviewing network management and users
Identifying bandwidth requirements
The need for spectrum analysis
What are manual RF site surveys?
What are predictive site surveys?
The challenges of dense AP deployment
then this..
Branch Office / Remote Office WLAN Security Technology and Solutions
* General vulnerabilities
* Preshared Key security with RSN cipher suites
* Passphrase vulnerabilities
* Passphrase entropy and hacking tools
* WPA/WPA2 Personal - how it works
* WPA/WPA2 Personal - configuration
* Wi-Fi Protected Setup (WPS)
* Installation and configuration of WIPS, WNMS, and WLAN controllers to extend enterprise security policy to remote and branch offices
Enterprise WLAN Management and Monitoring
* Device identification and tracking
* Rogue device mitigation
* WLAN forensics
* Enterprise WIPS installation and configuration
* Distributed protocol analysis
* WNMS security features
* WLAN controller security feature sets
Enterprise WLAN Security Technology and Solutions
* Robust Security Networks (RSN)
* WPA/WPA2 Enterprise - how it works
* WPA/WPA2 Enterprise - configuration
* IEEE 802.11 Authentication and Key Management (AKM)
* 802.11 cipher suites
* Use of authentication services (RADIUS, LDAP) in WLANs
* User profile management (RBAC)
* Public Key Infrastructures (PKI) used with WLANs
* Certificate Authorities and x.509 digital certificates
* RADIUS installation and configuration
* 802.1X/EAP authentication mechanisms
* 802.1X/EAP types and differences
* 802.11 handshakes
* Fast BSS Transition (FT) technologies
Hands-on Practical Labs
* Wi-Fi Packet Analysis and MAC address Spoofing
* Demonstrate the vulnerabilities of EAP - Cisco Wireless (LEAP) for secure wireless networking
* Rogue Hardware and Default Settings for WLAN equipment
* RF Jamming and Data Flooding
* Peer-to-Peer attacks and corporate Information Theft
* Wireless Hijacking and Denial of Service (DoS)
* Employing WEP
* Cracking WEP encryption - determining the WEP key and accessing WEP-encrypted user data
* Wireless Bridging Security - WPA-PSK
* WLAN Controller Security
* Wireless Intrusion Prevention Systems (WIPS)
* Using Laptop Analysers
* Fast BSS Transitions (FT)
* Implementing VLANs using Wireless LAN controllers and Cisco Catalyst layer-2 switches
* Implementing dynamic, role-based VLANs using Microsoft IAS and other RADIUS servers
* Implementing RADIUS authentication with Microsoft Internet Authentication Service (IAS)
* Using Microsoft Certificate Services
* Implementing EAP-TLS, PEAP-MSCHAPv2 and PEAP-EAP-TLS using Microsoft IAS and Microsoft Certificate Services
* Implementing 802.1x with EAP-TLS, EAP-TTLS and Protected EAP (PEAP) on Microsoft Windows XP using Group Policy
which i also have
when you get to orthaganol frequency division multiplexing and get stuck give me a shout