Dell E310dw Dell Printer Users Guide - Page 211

T, V, W, The Web Services protocol enables Windows Vista

Page 211 highlights

IP Address: 192.168.1.2 Subnet Mask: 255.255.255.0 • Computer 2 IP Address: 192.168.1.3 Subnet Mask: 255.255.255.0 NOTE: 0 denotes that there is no limit to communication at this part of the address. T TCP/IP Transmission Control Protocol/Internet Protocol (TCP/IP) is the most popular set of protocols used for communication, such as Internet and email. This protocol can be used in almost all operating systems, including Windows®, Windows Server®, OS X and Linux®. TKIP Temporal Key Integrity Protocol (TKIP) is one of the encryption methods adopted by WPA™ to be used in a wireless network. TKIP provides per-packet key mixing, a message integrity check and rekeying mechanism. V Vertical Pairing Vertical Pairing is a technology for Windows®that allows your Vertical Pairing-supported wireless machine to connect to your Infrastructure network using the PIN Method of Wi-Fi Protected Setup™ and the Web Services feature. It also enables printer driver installation from the printer icon in the Add a device screen. W Web Based Management A standard Web Browser can be used to manage your machine using the Hyper Text Transfer Protocol (HTTP). You can perform the function listed or get the following information from a machine on your network using a web browser: • Machine status information • Change network settings, such as TCP/IP information • Configure Store Print Log to Network • Software version information of the machine and print server • Change network and machine configuration details NOTE: To use Web Based Management, you must use the TCP/IP protocol on your network and have a valid IP address programmed into the print server and your computer. Web Services The Web Services protocol enables Windows Vista®, Windows®7, or Windows®8 users to install the drivers used for printing by right-clicking on the machine icon in the Network folder. Web Services also lets you check the current status of the machine from your computer. WEP Wired Equivalent Privacy (WEP) is one of the encryption methods used in a wireless network. When using WEP, Glossary 211

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

211
Glossary
IP
Address:
192.168.1.2
Subnet
Mask:
255.255.255.0
• Computer
2
IP
Address:
192.168.1.3
Subnet
Mask:
255.255.255.0
NOTE:
0 denotes that there is no limit to communication at this part of the address°
T
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is the most popular set of protocols used for
communication, such as Internet and email. This protocol can be used in almost all operating systems, including
Windows
®
, Windows Server
®
, OS X and Linux
®
.
TKIP
Temporal Key Integrity Protocol (TKIP) is one of the encryption methods adopted by WPA™ to be used in a wireless
network. TKIP provides per-packet key mixing, a message integrity check and rekeying mechanism.
V
Vertical Pairing
Vertical Pairing is a technology for Windows
®
that allows your Vertical Pairing-supported wireless machine to
connect to your Infrastructure network using the PIN Method of Wi-Fi Protected Setup™ and the Web Services
feature. It also enables printer driver installation from the printer icon in the
Add a device
screen.
W
Web Based Management
A standard Web Browser can be used to manage your machine using the Hyper Text Transfer Protocol (HTTP).
You can perform the function listed or get the following information from a machine on your network using a web
browser:
• Machine
status
information
• Change
network
settings,
such
as
TCP/IP
information
• Configure
Store
Print
Log
to
Network
• Software
version
information
of
the
machine
and
print
server
• Change
network
and
machine
configuration
details
NOTE:
To use Web Based Management, you must use the TCP/IP protocol on your network and have a valid IP ad-
dress programmed into the print server and your computer°
Web Services
The Web Services protocol enables Windows Vista
®
, Windows
®
7, or Windows
®
8 users to install the drivers used for
printing by right-clicking on the machine icon in the
Network
folder. Web Services also lets you check the current
status of the machine from your computer.
WEP
Wired Equivalent Privacy (WEP) is one of the encryption methods used in a wireless network. When using WEP,