Avery Dennison Monarch 9906 MonarchNet2 User Manual
Page 65
Glossary G-3
Shared 
Authentication 
The access point sends an unencrypted challenge text string to any device 
attempting to communicate with it. The device requesting authentication 
encrypts the challenge text and sends it back to the access point. If the 
challenge text is encrypted correctly, the access point allows the requesting 
device to authenticate. Both the unencrypted challenge and the encrypted 
challenge can be monitored; however, this leaves the access point open to 
attack. Because of this weakness, shared key authentication can be less 
secure than open authentication. 
Signal Strength
A percentage (1 to 100) of the connection between the device and access 
point. If the signal strength is 0, there is no connection with the access 
point; 30 or less indicates you may be experiencing interference or close to 
being out of access point range, and below 50, printing performance could be 
affected. To improve the signal strength, try moving the printer closer to the 
access point and away from other radio devices such as Bluetooth® wireless 
devices, microwave ovens, or 
2.4-GHz cordless phones. 
Speed or 
Transmit Rate 
Sets the maximum rate of communication between the devices on the 
network. It is also called transmit rate. The speeds are in megabits per 
second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24, 36, 48, and 54. 
SSID or 
Service Set 
Identifier 
A unique identifier that must match for all nodes on a subnetwork to 
communicate with each other. It consists of up to 32 characters (any 
printable character, including spaces). If using the space character, it must 
be enclosed in quotation marks. It is case-sensitive. 
Static 
Method 
One of the available boot methods. Use static if your network uses fixed 
configuration. The IP address remains the same every time the device 
connects to the network. 
Subnet
A portion of a network that shares a common address component. On TCP/IP 
networks, subnets are all devices with the same prefix. For example, all 
devices that start with 192.192.192 are part of the same subnet. Dividing a 
network into subnets is useful for both security and performance reasons. 
Subnet Mask
A mask is used to determine what subnet an IP address belongs to. 
Companies often have ranges of IP addresses that can be described by one 
or more masks. For example, a mask of 255.255.255.0 allows variation in the 
last position only, because the first three positions are fixed. 
Telnet
A Terminal Emulation program for TCP/IP networks that runs on your 
computer and connects your computer to a server on the network. You enter 
commands through the Telnet program and they run as if you were entering 
them directly on the server console. 
TCP/IP
A way that two devices can transmit data between each other. TCP/IP 
(Transmission Control Protocol/ Internet Protocol) is generally the standard 
for transmitting data over a network. 
TKIP (Temporal Key 
Integrity Protocol) 
Changes the encryption keys regularly and has time limits before new keys 
are created. Changing the key periodically provides additional security. 
TLS (Transport 
Layer Security) 
A cryptographic protocol that uses client-side and server-side certificates to 
authenticate users on the Web. It can dynamically create user-based and 
session-based keys. 
TTLS (Tunneled 
Transport Layer 
Security) 
Provides certificate-based, server-side, mutual authentication of the client 
and network through an encrypted channel (or tunnel). It can dynamically 
create user-based and session-based keys. 
Transmit Rate
See Speed.
WEP or 
Wired Equivalent 
Privacy 
A security protocol for wireless local area networks. WEP was designed to 
provide the same level of security as that of a wired network, which is 
inherently more secure than a wireless network because wired networks are 
easily protected against unauthorized access. Wireless networks use radio 
waves to communicate and can be vulnerable to unauthorized users. 
WEP provides security by encrypting data over radio waves so that it is 
protected as it is transmitted. However, it has been found that WEP is not as 
secure as once believed. 
Note:
If one part of a wireless network has WEP enabled, they all must have
it enabled with the same key or they cannot communicate.