
Glossary
G-3
Router
Any device that for wards data along net works. Routers are located at
gateways.
Shared
Authentication
The access point sends an unencrypted challenge text string to any device
attempting to communicate with it.
The device requesting authentication encrypts the challenge text and sends
it back to the access point. If the challenge text is encrypted correctly, the
access point allows the requesting device to authenticate. Both the
unencrypted challenge and the encrypted challenge can be monitored;
however, this leaves the access point open to attack. Because of this
weakness, shared key authentication can be less secure than open
authentication.
Signal Strength
A percentage (1 to 100) of the connection between the device and access
point. If the signal strength is 0, there is no connection with the access
point; 30 or less indicates you may be experiencing interference or close to
being out of access point range, and below 50, printing performance could
be affected. To improve the signal strength, try moving the printer closer to
the access point and away from other radio devices such as Bluetooth®
wireless devices, microwave ovens, or 2.4-GHz cordless phones.
Speed or
Transmit Rate
Sets the maximum rate of communication bet ween the devices on the
net work. It is also called transmit rate.
The speeds are in megabits per second (Mbps) and include: 1, 2, 5.5, 11,
12, 18, 24, 36, 48, and 54.
SSID or
Service Set Identifier
A unique identifier that must match for all nodes on a subnetwork to
communicate with each other. It consists of up to 32 characters (any
printable character, including spaces). If using the space character, it must
be enclosed in quotation marks. It is case-sensitive.
Static
Method
One of the available boot methods. Use static if your net work uses fixed
configuration. The IP address remains the same every time the device
connects to the net work.
Subnet
A portion of a net work that shares a common address component. On
TCP/IP networks, subnets are all devices with the same prefix. For
example, all devices that start with 192.192.192 are part of the same
subnet. Dividing a net work into subnets is useful for both security and
performance reasons.
Subnet Mask
A mask is used to determine what subnet an IP address belongs to.
Companies often have ranges of IP addresses that can be described by one
or more masks. For example, a mask of 255.255.255.0 allows variation in
the last position only, because the first three positions are fixed.
Telnet
A Terminal Emulation program for TCP/IP networks that runs on your
computer and connects your computer to a server on the net work. You enter
commands through the Telnet program and they run as if you were entering
them directly on the server console.
TCP/IP
A way that two devices can transmit data bet ween each other. TCP/IP
(Transmission Control Protocol/ Internet Protocol) is generally the standard
for transmitting data over a net work.
TKIP (Temporal Key
Integrity Protocol)
Changes the encryption keys regularly and has time limits before new keys
are created. Changing the key periodically provides additional security.
TLS (Transport Layer
Security)
A cryptographic protocol that uses client-side and server-side certificates to
authenticate users on the Web. It can dynamically create user-based and
session-based keys.
TTLS (Tunneled
Transport Layer
Security)
Provides certificate-based, server-side, mutual authentication of the client
and net work through an encrypted channel (or tunnel). It can dynamically
create user-based and session-based keys.
Transmit Rate
See
Speed
.
Содержание Monarch 9460 SNP
Страница 6: ...iv...
Страница 46: ...4 18 System Administrator s Guide...
Страница 54: ...5 8 System Administrator s Guide...
Страница 68: ...A 2 System Administrator s Guide...
Страница 75: ......