HP PSC 2500 HP PSC 2500 series All-in-One - (English) Reference Guide - Page 182

Multicast Domain Name Server. Apple Rendezvous is used - driver windows 7

Page 182 highlights

wireless network setup chapter 15 IP Address LAN LEAP mDNS NDIS5 Node PEAP Protocol Proxy Server 172 Each computer that connects to a network or the Internet, must have a unique address. A connection to the Internet provided by an Internet Service Provider (ISP) uses a standard protocol called Internet Protocol (IP). This protocol is also used on internal networks. IP address numbers are in the form x.x.x.x-for example, 169.254.100.2. Most networks use DHCP or AutoIP to dynamically assign IP addresses. Local Area Network. A group of computers that are connected via network cable, telephone lines, and radio waves in order to share resources such as printers and data. Lightweight Extensible Authentication Protocol. A proprietary protocol from Cisco Systems that uses passwords for mutual authentication (that is, the client and the server authenticate each other). Multicast Domain Name Server. Apple Rendezvous is used with local and ad-hoc networks that don't use central DNS servers. To perform name services, Rendezvous uses a DNS alternative called mDNS. With mDNS, your computer can find and use any printer connected to your local area network. It can also work with any other Ethernet-enabled device that appears on the network. A networking driver API that provides automatic detection and switching of wireless LAN cards on a PC. This works most reliably on Windows XP. Macintosh OS X has a similar API that is used in its AiO software solution. A network connection point, typically a computer. Protected Extensible Authentication Protocol. A mutual authentication protocol that uses digital certificates for server authentication and passwords for client authentication. For additional security, the authentication exchanges are encapsulated within TLS (Transport Level Security). A protocol is a predefined set of rules and conventions for handling data communications. Protocols are to computers what language is to humans. Therefore, for two devices on a network to successfully communicate, they must both understand the same protocols. A proxy server acts as a security gate (such as a Web proxy) that restricts traffic going through a network. The proxy intercepts requests to the network to see if it can fulfill the requests itself. If not, it forwards the request to another server. Proxy servers have two main purposes: improve performance and filter requests. Note: Obtain the proxy server IP address from your ISP. The proxy server IP address is required for HP Instant Share registration. If your ISP does not use a proxy server, leave the field blank. hp psc 2500 series

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

hp psc 2500 series
chapter 15
172
wireless network setup
IP Address
Each computer that connects to a network or the Internet,
must have a unique address. A connection to the Internet
provided by an Internet Service Provider (ISP) uses a
standard protocol called Internet Protocol (IP). This protocol
is also used on internal networks. IP address numbers are in
the form x.x.x.x—for example, 169.254.100.2. Most
networks use DHCP or AutoIP to dynamically assign IP
addresses.
LAN
Local Area Network. A group of computers that are
connected via network cable, telephone lines, and radio
waves in order to share resources such as printers and data.
LEAP
Lightweight Extensible Authentication Protocol. A proprietary
protocol from Cisco Systems that uses passwords for mutual
authentication (that is, the client and the server authenticate
each other).
mDNS
Multicast Domain Name Server. Apple Rendezvous is used
with local and ad-hoc networks that don’t use central DNS
servers. To perform name services, Rendezvous uses a DNS
alternative called mDNS. With mDNS, your computer can
find and use any printer connected to your local area
network. It can also work with any other Ethernet-enabled
device that appears on the network.
NDIS5
A networking driver API that provides automatic detection
and switching of wireless LAN cards on a PC. This works
most reliably on Windows XP. Macintosh OS X has a similar
API that is used in its AiO software solution.
Node
A network connection point, typically a computer.
PEAP
Protected Extensible Authentication Protocol. A mutual
authentication protocol that uses digital certificates for server
authentication and passwords for client authentication. For
additional security, the authentication exchanges are
encapsulated within TLS (Transport Level Security).
Protocol
A protocol is a predefined set of rules and conventions for
handling data communications. Protocols are to computers
what language is to humans. Therefore, for two devices on
a network to successfully communicate, they must both
understand the same protocols.
Proxy Server
A proxy server acts as a security gate (such as a Web proxy)
that restricts traffic going through a network. The proxy
intercepts requests to the network to see if it can fulfill the
requests itself. If not, it forwards the request to another server.
Proxy servers have two main purposes: improve
performance and filter requests.
Note:
Obtain the proxy server IP address from your ISP.
The proxy server IP address is required for HP Instant
Share registration. If your ISP does not use a proxy
server, leave the field blank.