HP Officejet 7200 User Guide - Page 148

No signal, Not applicable, <number&gt, Open System, Shared Key, WPA-PSK

Page 148 highlights

Set up your network (continued) Parameter Description another. The SSID is also referred to as the network name. This is the name of the network to which the HP All-in-One is connected. Signal Strength (1-5) The transmitting or return signal graded on a scale of 1 to 5: ● 5: Excellent ● 4: Good ● 3: Fair ● 2: Poor ● 1: Marginal ● No signal: no signal detected on the network. ● Not applicable: this parameter does not apply to this network type. Channel The channel number currently being used for wireless communication. This depends on the network in use, and might differ from the requested channel number. Value is from 1 to 14; countries/regions might limit the range of approved channels. ● : value ranging from 1 to 14, depending on country/ region. ● None: no channel is in use. ● Not Applicable: the WLAN is disabled or this parameter does not apply to this network type. Note In ad hoc mode, if you are not able to receive or transmit data between your computer and the HP All-in-One, make sure that you are using the same communication channel on your computer and the HP All-in-One. In infrastructure mode, the channel is dictated by the access point. Authentication type Type of authentication in use: ● None: no authentication in use. ● Open System (ad hoc and infrastructure): no authentication. ● Shared Key (infrastructure only): WEP key is required. ● WPA-PSK (infrastructure only): WPA with Pre-Shared Key. ● Not applicable: this parameter does not apply to this network type. Authentication verifies the identity of a user or device before granting access to the network, making it more difficult for unauthorized users to get at network resources. This security method is common on wireless networks. A network using Open System authentication does not screen network users based on their identities. Any wireless user can have access from the network. However, such a network might use WEP (Wired Equivalent Privacy) encryption to provide a first level of security against casual eavesdroppers. A network using Shared Key authentication provides increased security by requiring users or devices to identify themselves with a User Guide 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Parameter
Description
another. The SSID is also referred to as the network name. This is
the name of the network to which the HP All-in-One is connected.
Signal
Strength (1-5)
The transmitting or return signal graded on a scale of 1 to 5:
5
: Excellent
4
: Good
3
: Fair
2
: Poor
1
: Marginal
No signal
: no signal detected on the network.
Not applicable
: this parameter does not apply to this network
type.
Channel
The channel number currently being used for wireless
communication. This depends on the network in use, and might
differ from the requested channel number. Value is from 1 to 14;
countries/regions might limit the range of approved channels.
<number>
: value ranging from 1 to 14, depending on country/
region.
None
: no channel is in use.
Not Applicable
: the WLAN is disabled or this parameter does
not apply to this network type.
Note
In ad hoc mode, if you are not able to receive or transmit
data between your computer and the HP All-in-One, make sure
that you are using the same communication channel on your
computer and the HP All-in-One. In infrastructure mode, the
channel is dictated by the access point.
Authentication
type
Type of authentication in use:
None
: no authentication in use.
Open System
(ad hoc and infrastructure): no authentication.
Shared Key
(infrastructure only): WEP key is required.
WPA-PSK
(infrastructure only): WPA with Pre-Shared Key.
Not applicable
: this parameter does not apply to this network
type.
Authentication verifies the identity of a user or device before
granting access to the network, making it more difficult for
unauthorized users to get at network resources. This security
method is common on wireless networks.
A network using Open System authentication does not screen
network users based on their identities. Any wireless user can
have access from the network. However, such a network might
use WEP (Wired Equivalent Privacy) encryption to provide a first
level of security against casual eavesdroppers.
A network using Shared Key authentication provides increased
security by requiring users or devices to identify themselves with a
(continued)
User Guide
145
Set up your network