Solved

How to create a peer-to-peer wireless workgroup with no internet access.

Posted on 2011-03-25
5
294 Views
Last Modified: 2012-05-11
I have 4 laptops and 2 printers I need to set up a wireless workgroup. all laptops have wireless cards. Can I use a wireless router or a wireless bridge? I tried with the router but can not connect to share documents.

Please help!!!
0
Comment
Question by:CELEBEE1970
5 Comments
 
LVL 3

Expert Comment

by:jerbear1337
ID: 35218770
You want to set up wireliess router.  make sure DHCP server is enabled on the router.  Are the computers able to connect and get valid ip addresses from the router?
0
 
LVL 12

Expert Comment

by:profgeek
ID: 35222000
If all of the systems are connected to the router OK, but can't see each other, then the issue is with the network settings on the computers, workgroup membership, sharing, etc..  What OS is on the computers?
0
 
LVL 7

Expert Comment

by:elawad
ID: 35223625
you need first to setup up your router to let the other computers connect to it and obtain a valid ip address from the router DHCP server, then you have to make sure that all of your computers are on the same workgroup, and alsos make sure the firewall is off on your computers and that you have certain folder that is sahred on one of the computers.
0
 

Accepted Solution

by:
CELEBEE1970 earned 0 total points
ID: 35369187
I found the solution, all I had to do was create a peer-to-peer (ad-hoc) network.
All laptops had wireless capabilities, I installed the printer on one of the laptops and shared it for the other laptops to have access to printing. No router, bridge or switch required.

Thanks

CELEBEE1970
0
 

Author Closing Comment

by:CELEBEE1970
ID: 35406679
I researched and look at lots of comments and found nothing that gave me what I needed.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question