![](/images/backgrounds/292261/hp-officejet-7210-all-in-one-printer-users-manual-140462148x1.png)
(continued)
Parameter | Description | |
|
| |
| another. The SSID is also referred to as the network name. This is | |
| the name of the network to which the HP | |
|
| |
Signal | The transmitting or return signal graded on a scale of 1 to 5: | |
Strength | ● | 5: Excellent |
| ● | 4: Good |
| ● | 3: Fair |
| ● | 2: Poor |
| ● | 1: Marginal |
| ● No signal: no signal detected on the network. | |
| ● Not applicable: this parameter does not apply to this network | |
|
| type. |
|
| |
Channel | The channel number currently being used for wireless | |
| communication. This depends on the network in use, and might | |
| differ from the requested channel number. Value is from 1 to 14; | |
| countries/regions might limit the range of approved channels. | |
| ● <number>: value ranging from 1 to 14, depending on country/ | |
|
| region. |
| ● None: no channel is in use. | |
| ● Not Applicable: the WLAN is disabled or this parameter does | |
|
| not apply to this network type. |
| Note In ad hoc mode, if you are not able to receive or transmit | |
| data between your computer and the HP | |
| that you are using the same communication channel on your | |
| computer and the HP | |
| channel is dictated by the access point. | |
|
| |
Authentication | Type of authentication in use: | |
type | ● None: no authentication in use. | |
| ● Open System (ad hoc and infrastructure): no authentication. | |
| ● Shared Key (infrastructure only): WEP key is required. | |
| ● | |
| ● Not applicable: this parameter does not apply to this network | |
|
| type. |
| Authentication verifies the identity of a user or device before | |
| granting access to the network, making it more difficult for | |
| unauthorized users to get at network resources. This security | |
| method is common on wireless networks. | |
| A network using Open System authentication does not screen | |
| network users based on their identities. Any wireless user can | |
| have access from the network. However, such a network might | |
| use WEP (Wired Equivalent Privacy) encryption to provide a first | |
| level of security against casual eavesdroppers. | |
| A network using Shared Key authentication provides increased | |
| security by requiring users or devices to identify themselves with a | |
|
|
|
network your up Set
User Guide | 145 |