Konica Minolta bizhub C360 bizhub C220/C280/C360 Network Scan/Fax/Network Fax - Page 283

The acronym for Line Printer Request/Line Printer Daemon. This is a printing

Page 283 highlights

13.3 Scanner Glossary Term IPsec IPv6 IPX Java Kerberos LAN LDAP LPD LPR/LPD MAC address Memory MH MIB MMR NetBEUI NetWare NTLM NTP bizhub C360/C280/C220 13 Description The name of a security technology used for the TCP/IP network. IPsec allows service with enhanced security by determining the protocol used for the encryption of transmit packets and for authentication. The acronym for Internet Protocol version 6. With the number of devices on the Internet increasing, the IPv6 protocol has been arranged to replace the current IPv4 protocol. 128-bit IP addressing system and expanded security features. One of the protocols used for NetWare. IPX runs in the network layer of the OSI reference model. A programming language developed by Sun Microsystems that runs on most computers regardless of the installed hardware and operating system. However, in order to run Java applications, an operating environment called Java Virtual Machine (Java VM) is required. A network authentication system used for Windows 2000 or later, used as the Active Directory authentication. Kerberos arranges an authentic site within the network to provide two-phase authentication processes of users login and the use of network resources, allowing users to be securely and efficiently authenticated. The acronym for Local Area Network. This is a network constructed by connecting computers on the same floor, in the same building, or in neighboring buildings. The acronym for Lightweight Directory Access Protocol, a protocol used to access a database that can manage E-mail addresses and environmental information of network users on the Internet, intranet, or other TCP/IP network. The acronym for Line Printer Daemon. This is a platform-independent printer protocol running on the TCP/IP network. The protocol was originally developed for BSD UNIX, and has become one of the printing protocols typically used among general computers. The acronym for Line Printer Request/Line Printer Daemon. This is a printing method implemented via networks, used for Windows NT or UNIX based systems. It uses TCP/IP to output printing data from Windows or UNIX to a printer on the network. MAC is the acronym for Media Access Control. A MAC address is an ID number unique to each Ethernet card, enabling sending or receiving data to or from other Ethernet cards. A Mac address consists of 48-bit numbers.The first 24 bits are controlled by IEEE and used to allocate a unique number to each manufacture, whereas the latter 24 bits are used by each manufacturer to assign a unique number to each card. A storage device used for storing data temporarily. Some types of memory retain data even after the power is turned off, while others not. The acronym for Modified Huffman, which is a data compression encoding method used for fax transmissions. Text-based originals are compressed to approximately 1/10 the original size. The acronym for Management Information Base, which defines the format of management information for network devices that are collected using SNMP in TCP/IP communication. Two types of MIB are provided, that is, the private MIB specific to each manufacturer and the standardized MIB. The acronym for Modified Modified Read, which is a data compression encoding method used for fax transmissions. Text-based originals are compressed to approximately 1/20 the original size. The abbreviation for NetBIOS Extended User Interface. This is a network protocol developed by IBM. NetBEUI enables you to construct a small-scale network simply by configuring computer names. A network operating system developed by Novell. This uses NetWare IPX/SPX for the communication protocol. The acronym for NT LAN Manager, which is a user authentication method used for Windows NT or later. NTLM encodes password using MD4 or MD5 encoding method. The acronym for Network Time Protocol, a protocol used to adjust the computer's internal clock precisely via the network. In a hierarchical method, the time is adjusted with the server at the highest level using GPS to acquire the correct time, which is then referenced by each lower level host. 13-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299

bizhub C360/C280/C220
13-7
13.3
Scanner Glossary
13
IPsec
The name of a security technology used for the TCP/IP network. IPsec allows
service with enhanced security by determining the protocol used for the encryp-
tion of transmit packets and for authentication.
IPv6
The acronym for Internet Protocol version 6. With the number of devices on the
Internet increasing, the IPv6 protocol has been arranged to replace the current
IPv4 protocol. 128-bit IP addressing system and expanded security features.
IPX
One of the protocols used for NetWare. IPX runs in the network layer of the OSI
reference model.
Java
A programming language developed by Sun Microsystems that runs on most
computers regardless of the installed hardware and operating system. However,
in order to run Java applications, an operating environment called Java Virtual
Machine (Java VM) is required.
Kerberos
A network authentication system used for Windows 2000 or later, used as the Ac-
tive Directory authentication. Kerberos arranges an authentic site within the net-
work to provide two-phase authentication processes of users login and the use
of network resources, allowing users to be securely and efficiently authenticated.
LAN
The acronym for Local Area Network. This is a network constructed by connect-
ing computers on the same floor, in the same building, or in neighboring build-
ings.
LDAP
The acronym for Lightweight Directory Access Protocol, a protocol used to ac-
cess a database that can manage E-mail addresses and environmental informa-
tion of network users on the Internet, intranet, or other TCP/IP network.
LPD
The acronym for Line Printer Daemon. This is a platform-independent printer pro-
tocol running on the TCP/IP network. The protocol was originally developed for
BSD UNIX, and has become one of the printing protocols typically used among
general computers.
LPR/LPD
The acronym for Line Printer Request/Line Printer Daemon. This is a printing
method implemented via networks, used for Windows NT or UNIX based sys-
tems. It uses TCP/IP to output printing data from Windows or UNIX to a printer
on the network.
MAC address
MAC is the acronym for Media Access Control. A MAC address is an ID number
unique to each Ethernet card, enabling sending or receiving data to or from other
Ethernet cards. A Mac address consists of 48-bit numbers.The first 24 bits are
controlled by IEEE and used to allocate a unique number to each manufacture,
whereas the latter 24 bits are used by each manufacturer to assign a unique
number to each card.
Memory
A storage device used for storing data temporarily. Some types of memory retain
data even after the power is turned off, while others not.
MH
The acronym for Modified Huffman, which is a data compression encoding meth-
od used for fax transmissions. Text-based originals are compressed to approxi-
mately 1/10 the original size.
MIB
The acronym for Management Information Base, which defines the format of
management information for network devices that are collected using SNMP in
TCP/IP communication. Two types of MIB are provided, that is, the private MIB
specific to each manufacturer and the standardized MIB.
MMR
The acronym for Modified Modified Read, which is a data compression encoding
method used for fax transmissions. Text-based originals are compressed to ap-
proximately 1/20 the original size.
NetBEUI
The abbreviation for NetBIOS Extended User Interface. This is a network protocol
developed by IBM. NetBEUI enables you to construct a small-scale network sim-
ply by configuring computer names.
NetWare
A network operating system developed by Novell. This uses NetWare IPX/SPX for
the communication protocol.
NTLM
The acronym for NT LAN Manager, which is a user authentication method used
for Windows NT or later. NTLM encodes password using MD4 or MD5 encoding
method.
NTP
The acronym for Network Time Protocol, a protocol used to adjust the compu-
ter's internal clock precisely via the network. In a hierarchical method, the time is
adjusted with the server at the highest level using GPS to acquire the correct
time, which is then referenced by each lower level host.
Term
Description