Signal Strength

A percentage (1 to 100) of the connection between the device and access point. If the

 

signal strength is 0, there is no connection with the access point; 30 or less indicates

 

you may be experiencing interference or close to being out of access point range, and

 

below 50, printing performance could be affected. To improve the signal strength, try

 

moving the printer closer to the access point and away from other radio devices such as

 

Bluetooth® wireless devices, microwave ovens, or 2.4-GHz cordless phones.

Speed or

Sets the maximum rate of communication between the devices on the network. It is

Transmit Rate

also called transmit rate.

 

The speeds are in megabits per second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24,

 

36, 48, and 54.

SSID or

A unique identifier that must match for all nodes on a subnetwork to communicate with

Service Set Identifier

each other. It consists of up to 32 characters (any printable character, including

 

spaces). If using the space character, it must be enclosed in quotation marks. It is

 

case-sensitive.

Static

One of the available boot methods. Use static if your network uses fixed configuration.

Method

The IP address remains the same every time the device connects to the network.

Subnet

A portion of a network that shares a common address component. On TCP/IP networks,

 

subnets are all devices with the same prefix. For example, all devices that start with

 

192.192.192 are part of the same subnet. Dividing a network into subnets is useful for

 

both security and performance reasons.

Subnet Mask

A mask is used to determine what subnet an IP address belongs to. Companies often

 

have ranges of IP addresses that can be described by one or more masks. For example,

 

a mask of 255.255.255.0 allows variation in the last position only, because the first

 

three positions are fixed.

Telnet

A Terminal Emulation program for TCP/IP networks that runs on your computer and

 

connects your computer to a server on the network. You enter commands through the

 

Telnet program and they run as if you were entering them directly on the server

 

console.

TCP/IP

A way that two devices can transmit data between each other. TCP/IP (Transmission

 

Control Protocol/ Internet Protocol) is generally the standard for transmitting data over

 

a network.

TKIP (Temporal Key

Changes the encryption keys regularly and has time limits before new keys are created.

Integrity Protocol)

Changing the key periodically provides additional security.

TLS (Transport Layer

A cryptographic protocol that uses client-side and server-side certificates to

Security)

authenticate users on the Web. It can dynamically create user-based and session-

 

based keys.

TTLS (Tunneled

Provides certificate-based, server-side, mutual authentication of the client and network

Transport Layer

through an encrypted channel (or tunnel). It can dynamically create user-based and

Security)

session-based keys.

Transmit Rate

See Speed.

WEP or

A security protocol for wireless local area networks. WEP was designed to provide the

Wired Equivalent

same level of security as that of a wired network, which is inherently more secure than

Privacy

a wireless network because wired networks are easily protected against unauthorized

 

access. Wireless networks use radio waves to communicate and can be vulnerable to

 

unauthorized users.

 

WEP provides security by encrypting data over radio waves so that it is protected as it

 

is transmitted. However, it has been found that WEP is not as secure as once believed.

 

Note: If one part of a wireless network has WEP enabled, they all must have it enabled

 

with the same key or they cannot communicate.

128 Bit / 64 Bit

This is the 64 or 128 bit WEP key that must match other Nodes’ encryption keys in

WEP Key

order to communicate: 10 hex characters for 64 bit (40 user-specified characters), or 26

 

hex characters for 128 bit (104 user-specified characters). You must use the same key

 

values for devices to communicate with each other.

WLAN or Wireless

A LAN that uses high-frequency radio waves to communicate between nodes, rather

Local Area Network

than telephone wires, etc.

WPA (Wi-Fi Protected

A network security protocol that uses improved authentication and temporal keys. It

Access)

was created to address the weaknesses of WEP encryption.

WPA2

A network security protocol with stronger encryption than WPA. It was created to

(or IEEE 802.11i)

address the weaknesses of WEP encryption.

Glossary G-3