Solved

How to create a peer-to-peer wireless workgroup with no internet access.

Posted on 2011-03-25
5
291 Views
Last Modified: 2012-05-11
I have 4 laptops and 2 printers I need to set up a wireless workgroup. all laptops have wireless cards. Can I use a wireless router or a wireless bridge? I tried with the router but can not connect to share documents.

Please help!!!
0
Comment
Question by:CELEBEE1970
5 Comments
 
LVL 3

Expert Comment

by:jerbear1337
Comment Utility
You want to set up wireliess router.  make sure DHCP server is enabled on the router.  Are the computers able to connect and get valid ip addresses from the router?
0
 
LVL 12

Expert Comment

by:profgeek
Comment Utility
If all of the systems are connected to the router OK, but can't see each other, then the issue is with the network settings on the computers, workgroup membership, sharing, etc..  What OS is on the computers?
0
 
LVL 7

Expert Comment

by:elawad
Comment Utility
you need first to setup up your router to let the other computers connect to it and obtain a valid ip address from the router DHCP server, then you have to make sure that all of your computers are on the same workgroup, and alsos make sure the firewall is off on your computers and that you have certain folder that is sahred on one of the computers.
0
 

Accepted Solution

by:
CELEBEE1970 earned 0 total points
Comment Utility
I found the solution, all I had to do was create a peer-to-peer (ad-hoc) network.
All laptops had wireless capabilities, I installed the printer on one of the laptops and shared it for the other laptops to have access to printing. No router, bridge or switch required.

Thanks

CELEBEE1970
0
 

Author Closing Comment

by:CELEBEE1970
Comment Utility
I researched and look at lots of comments and found nothing that gave me what I needed.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now