Lexmark Network Printer Device User's Guide for Macintosh - Page 18

The Transmission Control Protocol TCP and the Internet Protocol IP are protocols that let different - cannot be identified

Page 18 highlights

Network authentication type. The data encryption mode that is used on your network to prevent unauthorized users or devices from connecting to or accessing your wireless network. You can use one of the following protocols for network authentication: • None • WEP • WPA (Infrastructure mode networks only) network-capable printer. A printing device that does not need to be locally attached to a computer. printer port. Windows terminology for a physical or logical connection to a printer. For example: • LPT1 indicates the printer is attached to a physical parallel port with a parallel cable. • USB001 indicates the printer is attached to a physical USB port with a USB cable. • Print_Server_E320_0020000035D0 indicates a logical connection to the printer across your network. PSK. Pre-Shared Key, a permanent security key or password that a user enters to establish security keys in a WPA environment. Safari. The default Web browser provided by Apple for Mac OS X operating systems. Safari is available for download on the Apple Web site at the following URL: http://www.apple.com/safari. Security key. A security key is like a password used with either WPA or WEP security protocols and must meet the following criteria: • For WPA keys, if using Hexadecimal characters, valid keys are at least 24 characters long; if using ASCII, valid keys are between 8 and 63 characters long. WPA authentication is not supported for Ad-Hoc configurations. • For WEP keys, if using Hex characters, valid keys are either 10 or 26 characters long; if using ASCII, valid keys are either 5 or 13 characters long. subnet. A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the same prefix. For example, all devices with IP addresses that start with 192.168.0. would typically be part of the same subnet. SSID. Service Set ID, also known as Network name, is a unique identifier used to distinguish one wireless network from another. Wireless devices must use the same SSID to communicate. SSIDs are up to 32 characters long, and are case-sensitive. TCP/IP. The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are protocols that let different types of computers communicate with each other. The Internet is based on this suite of protocols. TKIP. Temporal Key Integrity Protocol, a protocol used with the WPA data encryption mode that scrambles security keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been tampered with. WEP. Wired Equivalency Protocol, a security protocol defined in the original 802.11b specification that is used to provide data encryption and user authentication. WPA. Wi-Fi Protected Access, a security protocol for wireless networks defined by the Wi-Fi Alliance that was designed to improve upon the WEP security protocol through improved data encryption and user authentication. Glossary 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18

Glossary
13
Network authentication type.
The data encryption mode that is used on your network to prevent
unauthorized users or devices from connecting to or accessing your wireless network. You can use one of the
following protocols for network authentication:
None
WEP
WPA (Infrastructure mode networks only)
network-capable printer.
A printing device that does not need to be locally attached to a computer.
printer port.
Windows terminology for a physical or logical connection to a printer. For example:
LPT1 indicates the printer is attached to a physical parallel port with a parallel cable.
USB001 indicates the printer is attached to a physical USB port with a USB cable.
Print_Server_E320_0020000035D0 indicates a logical connection to the printer across your network.
PSK.
Pre-Shared Key, a permanent security key or password that a user enters to establish security keys in a
WPA environment.
Safari.
The default Web browser provided by Apple for Mac OS X operating systems. Safari is available for
download on the Apple Web site at the following URL:
.
Security key.
A security key is like a password used with either WPA or WEP security protocols and must
meet the following criteria:
For WPA keys, if using Hexadecimal characters, valid keys are at least 24 characters long; if using ASCII,
valid keys are between 8 and 63 characters long. WPA authentication is not supported for Ad-Hoc
configurations.
For WEP keys, if using Hex characters, valid keys are either 10 or 26 characters long; if using ASCII, valid
keys are either 5 or 13 characters long.
subnet.
A portion of a network that shares a common address component. On TCP/IP networks, subnets are
defined as all devices whose IP addresses have the same prefix. For example, all devices with IP addresses
that start with 192.168.0. would typically be part of the same subnet.
SSID.
Service Set ID, also known as Network name, is a unique identifier used to distinguish one wireless
network from another. Wireless devices must use the same SSID to communicate. SSIDs are up to 32
characters long, and are case-sensitive.
TCP/IP.
The Transmission Control Protocol (TCP) and the Internet Protocol (IP) are protocols that let different
types of computers communicate with each other. The Internet is based on this suite of protocols.
TKIP.
Temporal Key Integrity Protocol, a protocol used with the WPA data encryption mode that scrambles
security keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven’t
been tampered with.
WEP.
Wired Equivalency Protocol, a security protocol defined in the original 802.11b specification that is used
to provide data encryption and user authentication.
WPA.
Wi-Fi Protected Access, a security protocol for wireless networks defined by the Wi-Fi Alliance that was
designed to improve upon the WEP security protocol through improved data encryption and user
authentication.