68
L i f e B o o k C S e r i e s N o t e b o o k - S e c t i o n F i v e
submitting correct network keys. However, in case of
actual communications, the same network key must be
set. Open system authentication is sometimes called
Open key authentication.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol
adopted in telephone line connection (PPP) to be used
over an Ethernet.
Protocol
A procedure or rule of delivering data among
computers. Ordered data communication is allowed by
making all conditions required for communication
including the method of data transmission/reception
and actions upon communication errors into proce-
dures.
Shared key authentication
One of the network authentication types for wireless
LAN. Upon authentication, the access point checks
whether the same network key is set to the client. If the
client uses a wrong network key or the network key itself
is not set, authentication is unsuccessful, allowing no
communications with the access point.
SSID (Security Set Identifier)
See “Network name”
Subnet mask
TCP-IP network is controlled by being divided into
multiple smaller networks (subnets). IP address consists
of the subnet address and the address of each computer.
Subnet mask defines how many bits of IP address
comprise the subnet address. The same value shall be set
among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet
Protocol)
A standard protocol of the Internet.
Wi-Fi
Indicates that the interconnectivity test of the organiza-
tion which guarantees the compatible connection of
wireless LAN (Wi-Fi Alliance) has been passed.
Brie4-B6FH-0391.book Page 68 Tuesday, October 14, 2003 10:05 AM
Summary of Contents for Lifebook C2230
Page 2: ...L i f e B o o k C S e r i e s N o t e b o o k ...
Page 6: ...L i f e B o o k C S e r i e s N o t e b o o k ...
Page 7: ...1 1 Preface ...
Page 8: ...2 L i f e B o o k C S e r i e s N o t e b o o k ...
Page 10: ...4 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n O n e ...
Page 11: ...5 2 Getting to Know Your Computer ...
Page 12: ...6 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 29: ...23 3 Getting Started ...
Page 30: ...24 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n T h r e e ...
Page 38: ...32 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n T h r e e ...
Page 39: ...33 4 User Installable Features ...
Page 40: ...34 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 54: ...48 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 55: ...49 5 Using the Integrated Wireless LAN Optional device ...
Page 56: ...50 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 77: ...71 6 Troubleshooting ...
Page 78: ...72 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 92: ...86 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 93: ...87 7 Care and Maintenance ...
Page 94: ...88 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 98: ...92 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 99: ...93 8 Specifications ...
Page 100: ...94 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n E i g h t ...
Page 104: ...98 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n E i g h t ...
Page 108: ...102 L i f e B o o k C S e r i e s N o t e b o o k ...
Page 109: ...103 9 Glossary ...
Page 110: ...104 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 116: ...110 L i f e B o o k C S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 120: ...114 L i f e B o o k C S e r i e s N o t e b o o k ...