Avery Dennison Monarch 9906 MonarchNet2 User Manual

Page 65

Advertising
background image

Glossary G-3

Shared
Authentication

The access point sends an unencrypted challenge text string to any device
attempting to communicate with it. The device requesting authentication
encrypts the challenge text and sends it back to the access point. If the
challenge text is encrypted correctly, the access point allows the requesting
device to authenticate. Both the unencrypted challenge and the encrypted
challenge can be monitored; however, this leaves the access point open to
attack. Because of this weakness, shared key authentication can be less
secure than open authentication.

Signal Strength

A percentage (1 to 100) of the connection between the device and access
point. If the signal strength is 0, there is no connection with the access
point; 30 or less indicates you may be experiencing interference or close to
being out of access point range, and below 50, printing performance could be
affected. To improve the signal strength, try moving the printer closer to the
access point and away from other radio devices such as Bluetooth® wireless
devices, microwave ovens, or
2.4-GHz cordless phones.

Speed or
Transmit Rate

Sets the maximum rate of communication between the devices on the
network. It is also called transmit rate. The speeds are in megabits per
second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24, 36, 48, and 54.

SSID or
Service Set
Identifier

A unique identifier that must match for all nodes on a subnetwork to
communicate with each other. It consists of up to 32 characters (any
printable character, including spaces). If using the space character, it must
be enclosed in quotation marks. It is case-sensitive.

Static
Method

One of the available boot methods. Use static if your network uses fixed
configuration. The IP address remains the same every time the device
connects to the network.

Subnet

A portion of a network that shares a common address component. On TCP/IP
networks, subnets are all devices with the same prefix. For example, all
devices that start with 192.192.192 are part of the same subnet. Dividing a
network into subnets is useful for both security and performance reasons.

Subnet Mask

A mask is used to determine what subnet an IP address belongs to.
Companies often have ranges of IP addresses that can be described by one
or more masks. For example, a mask of 255.255.255.0 allows variation in the
last position only, because the first three positions are fixed.

Telnet

A Terminal Emulation program for TCP/IP networks that runs on your
computer and connects your computer to a server on the network. You enter
commands through the Telnet program and they run as if you were entering
them directly on the server console.

TCP/IP

A way that two devices can transmit data between each other. TCP/IP
(Transmission Control Protocol/ Internet Protocol) is generally the standard
for transmitting data over a network.

TKIP (Temporal Key
Integrity Protocol)

Changes the encryption keys regularly and has time limits before new keys
are created. Changing the key periodically provides additional security.

TLS (Transport
Layer Security)

A cryptographic protocol that uses client-side and server-side certificates to
authenticate users on the Web. It can dynamically create user-based and
session-based keys.

TTLS (Tunneled
Transport Layer
Security)

Provides certificate-based, server-side, mutual authentication of the client
and network through an encrypted channel (or tunnel). It can dynamically
create user-based and session-based keys.

Transmit Rate

See Speed.

WEP or
Wired Equivalent
Privacy

A security protocol for wireless local area networks. WEP was designed to
provide the same level of security as that of a wired network, which is
inherently more secure than a wireless network because wired networks are
easily protected against unauthorized access. Wireless networks use radio
waves to communicate and can be vulnerable to unauthorized users.
WEP provides security by encrypting data over radio waves so that it is
protected as it is transmitted. However, it has been found that WEP is not as
secure as once believed.

Note:

If one part of a wireless network has WEP enabled, they all must have

it enabled with the same key or they cannot communicate.

Advertising