(continued)
Parameter | Description | |
|
| |
Network Name | Service Set Identifier. A unique identifier (up to 32 characters) that | |
(SSID) | differentiates one wireless local area network (WLAN) from another. | |
| The SSID is also referred to as the network name. This is the name | |
| of the network to which the HP | |
|
| |
Signal Strength | The transmitting or return signal graded on a scale of 1 to 5: | |
● | 5: Excellent | |
| ||
| ● | 4: Good |
| ● | 3: Fair |
| ● | 2: Poor |
| ● | 1: Marginal |
| ● No signal: No signal detected on the network. | |
| ● Not applicable: This parameter does not apply to this network | |
|
| type. |
|
| |
Channel | The channel number currently being used for wireless | |
| communication. This depends on the network in use, and might differ | |
| from the requested channel number. Value is from 1 to 14; countries/ | |
| regions might limit the range of approved channels. | |
| ● (number): Value ranging from 1 to 14, depending on country/ | |
|
| region. |
| ● None: No channel is in use. | |
| ● Not Applicable: The WLAN is disabled or this parameter does | |
|
| not apply to this network type. |
| Note In ad hoc mode, if you are not able to receive or transmit data | |
| between your computer and the HP | |
| are using the same communication channel on your computer and | |
| the HP | |
| the access point. | |
|
| |
Authentication | Type of authentication in use: | |
type | ● None: No authentication in use. | |
| ||
| ● Open System (ad hoc and infrastructure): No authentication | |
| ● Shared Key: WEP key is required. | |
| ● | |
| ● Not applicable: This parameter does not apply to this network | |
|
| type. |
| Authentication verifies the identity of a user or device before granting | |
| access to the network, making it more difficult for unauthorized users | |
| to access network resources. This security method is common on | |
| wireless networks. | |
| A network using Open System authentication does not screen | |
| network users based on their identities. Any wireless user can have | |
| access from the network. However, such a network might use WEP | |
| (Wired Equivalent Privacy) encryption to provide a first level of | |
| security against casual eavesdroppers. |
Network setup
Basics Guide | 31 |