Signal Strength | A percentage (1 to 100) of the connection between the device and access point. If the |
| signal strength is 0, there is no connection with the access point; 30 or less indicates |
| you may be experiencing interference or close to being out of access point range, and |
| below 50, printing performance could be affected. To improve the signal strength, try |
| moving the printer closer to the access point and away from other radio devices such as |
| Bluetooth® wireless devices, microwave ovens, or |
Speed or | Sets the maximum rate of communication between the devices on the network. It is |
Transmit Rate | also called transmit rate. |
| The speeds are in megabits per second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24, |
| 36, 48, and 54. |
SSID or | A unique identifier that must match for all nodes on a subnetwork to communicate with |
Service Set Identifier | each other. It consists of up to 32 characters (any printable character, including |
| spaces). If using the space character, it must be enclosed in quotation marks. It is |
| |
Static | One of the available boot methods. Use static if your network uses fixed configuration. |
Method | The IP address remains the same every time the device connects to the network. |
Subnet | A portion of a network that shares a common address component. On TCP/IP networks, |
| subnets are all devices with the same prefix. For example, all devices that start with |
| 192.192.192 are part of the same subnet. Dividing a network into subnets is useful for |
| both security and performance reasons. |
Subnet Mask | A mask is used to determine what subnet an IP address belongs to. Companies often |
| have ranges of IP addresses that can be described by one or more masks. For example, |
| a mask of 255.255.255.0 allows variation in the last position only, because the first |
| three positions are fixed. |
Telnet | A Terminal Emulation program for TCP/IP networks that runs on your computer and |
| connects your computer to a server on the network. You enter commands through the |
| Telnet program and they run as if you were entering them directly on the server |
| console. |
TCP/IP | A way that two devices can transmit data between each other. TCP/IP (Transmission |
| Control Protocol/ Internet Protocol) is generally the standard for transmitting data over |
| a network. |
TKIP (Temporal Key | Changes the encryption keys regularly and has time limits before new keys are created. |
Integrity Protocol) | Changing the key periodically provides additional security. |
TLS (Transport Layer | A cryptographic protocol that uses |
Security) | authenticate users on the Web. It can dynamically create |
| based keys. |
TTLS (Tunneled | Provides |
Transport Layer | through an encrypted channel (or tunnel). It can dynamically create |
Security) | |
Transmit Rate | See Speed. |
WEP or | A security protocol for wireless local area networks. WEP was designed to provide the |
Wired Equivalent | same level of security as that of a wired network, which is inherently more secure than |
Privacy | a wireless network because wired networks are easily protected against unauthorized |
| access. Wireless networks use radio waves to communicate and can be vulnerable to |
| unauthorized users. |
| WEP provides security by encrypting data over radio waves so that it is protected as it |
| is transmitted. However, it has been found that WEP is not as secure as once believed. |
| Note: If one part of a wireless network has WEP enabled, they all must have it enabled |
| with the same key or they cannot communicate. |
128 Bit / 64 Bit | This is the 64 or 128 bit WEP key that must match other Nodes’ encryption keys in |
WEP Key | order to communicate: 10 hex characters for 64 bit (40 |
| hex characters for 128 bit (104 |
| values for devices to communicate with each other. |
WLAN or Wireless | A LAN that uses |
Local Area Network | than telephone wires, etc. |
WPA | A network security protocol that uses improved authentication and temporal keys. It |
Access) | was created to address the weaknesses of WEP encryption. |
WPA2 | A network security protocol with stronger encryption than WPA. It was created to |
(or IEEE 802.11i) | address the weaknesses of WEP encryption. |
Glossary