HP Deskjet 6980 User Guide - Macintosh - Page 45

DHCP Dynamic Host Configuration Protocol, Broadcast packet

Page 45 highlights

encode data. AES automatically changes the encryption keys after a certain time interval, thus making the wireless network less vulnerable to eavesdropping. Authentication: Authentication is a wireless network security strategy. On a network with authentication, devices use a shared key as a password and communicate only with devices that know the key. Authentication does not encrypt the data sent between wireless devices. Authentication can be used in conjunction with WEP. Authentication keys and WEP keys can be identical. AutoIP: A process by which a device on a network automatically assigns an IP address to itself. b BOOTP: Bootstrap Protocol (BOOTP) is an Internet protocol that enables a device to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the device to boot without requiring a hard or floppy disk drive. Broadcast packet: A packet sent from one device on a network to all devices on the network. c Channel: One of several pre-set frequencies at which 802.11b-enabled devices communicate in order to reduce interference. The number of channels available varies by country/region. d DHCP (Dynamic Host Configuration Protocol): A protocol used to automatically assign an IP address to each device on a network. e EAP: Extensible Authentication Protocol (EAP) is a general protocol for authentication that also supports multiple authentication methods, such as token cards, one-time passwords, certificates, and public key authentication. WPA uses EAP. Encryption: A network security that encodes the data sent across a wireless network making the data unintelligible to eavesdroppers. The printer supports WEP and WPA. Encryption keys: A sequence of characters or digits that a wireless device uses to encode data. Encryption keys can be static (as they are in WEP) or dynamic (as they are in WPA). Ethernet: A popular form of wired computer networking for Local Area Networks. Ethernet cable: There are two types of Ethernet cables. A straight-through cable is the most common and is used to connect devices on a network to a hub or router. A crossover cable is used to connect two devices that have Ethernet ports but that are not hubs or routers. Use a CAT-5 cable with an RJ-45 plug to connect the printer to an Ethernet network. f Firewall: A combination of hardware and software tools that protects a network from unwanted entry. User's guide 43

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

encode data. AES automatically changes the encryption keys after a certain time interval,
thus making the wireless network less vulnerable to eavesdropping.
Authentication
: Authentication is a wireless network security strategy. On a network
with authentication, devices use a shared key as a password and communicate only with
devices that know the key. Authentication does not encrypt the data sent between
wireless devices. Authentication can be used in conjunction with WEP. Authentication
keys and WEP keys can be identical.
AutoIP
: A process by which a device on a network automatically assigns an IP address
to itself.
b
BOOTP
: Bootstrap Protocol (BOOTP) is an Internet protocol that enables a device to
discover its own IP address, the IP address of a BOOTP server on the network, and a
file to be loaded into memory to boot the machine. This enables the device to boot without
requiring a hard or floppy disk drive.
Broadcast packet
: A packet sent from one device on a network to all devices on the
network.
c
Channel
: One of several pre-set frequencies at which 802.11b-enabled devices
communicate in order to reduce interference. The number of channels available varies
by country/region.
d
DHCP (Dynamic Host Configuration Protocol)
: A protocol used to automatically
assign an IP address to each device on a network.
e
EAP
: Extensible Authentication Protocol (EAP) is a general protocol for authentication
that also supports multiple authentication methods, such as token cards, one-time
passwords, certificates, and public key authentication.
WPA
uses EAP.
Encryption
: A network security that encodes the data sent across a wireless network
making the data unintelligible to eavesdroppers. The printer supports
WEP
and
WPA
.
Encryption keys
: A sequence of characters or digits that a wireless device uses to
encode data. Encryption keys can be static (as they are in
WEP
) or dynamic (as they are
in
WPA
).
Ethernet
: A popular form of wired computer networking for Local Area Networks.
Ethernet cable
: There are two types of Ethernet cables. A straight-through cable is the
most common and is used to connect devices on a network to a hub or router. A crossover
cable is used to connect two devices that have Ethernet ports but that are not hubs or
routers. Use a CAT-5 cable with an RJ-45 plug to connect the printer to an Ethernet
network.
f
Firewall
: A combination of hardware and software tools that protects a network from
unwanted entry.
User's guide
43