Glossary
Glossary
802.11 Authentication
With the WEP authentication method, there are two types of authentication, Open System and Shared Key. By the Open System, connection to a Wireless LAN Access Point is possible even without security information. With Shared Key, connection is made by authentication using a WEP Key.
Ad-hoc Communication
This communication method allows each Wireless LAN computer terminal to communicate directly without having to use a Wireless LAN Access Point.
Deny ANY
Function allowing a Wireless LAN Access Point to deny connection if a device (computer, etc.) has an access point name set to "ANY" or "blank."
DHCP Function
Dynamic Host Configuration Protocol. This function automatically assigns necessary information such as the IP Address, to the computer or network device connected to the network.
Hub
A device for joining multiple Network Cables on a network.
IEEE 802.11b/g/n
International standard specifying a Wireless LAN environment that uses the 2.4 GHz/5 GHz frequency range (IEEE 802.11n only). Communication speeds are up to 11 Mbps for IEEE 802.11b, and up to 54 Mbps for IEEE 802.11g. IEEE 802.11n provides for up to 600 Mbps, however, this depends on the combination of devices.
IEEE 802.11n
International standard specifying a Wireless LAN environment that uses the 2.4 GHz/5 GHz frequency range. Communication speeds are up to 600 Mbps, however, this depends on the combination of devices.
IEEE 802.1X
Authentication standard used for accessing LAN. Communication from devices that have not been authenticated is blocked, allowing communication from authenticated devices only.
IP Address
Internet Protocol address. A 32-bit address used by IP (Internet Protocol) to specify a computer or device on the Internet. An IP Address is defined as four numbers from 0 to 255 delimited by periods, for example, 128.121.4.5. A unique IP Address must be assigned to identify the computer on the Internet.
LAN (Local Area Network)
A network system formed by linking a server, workstations, devices, and computers, which are all located in he same building or some other relatively limited area.
MAC Address
Media Access Control address. The hardware address of the network adapter of a computer connected to a local area network.
MAC Address Filtering
Function that registers the MAC Addresses of already-networked computers and network devices to a Wireless LAN Access Point, so as to block communication with any other network devices.
Network Cable
Cable (LAN cable) used for connecting a device such as a computer to the network.
Network Key
A password required for preventing interception of communication content. Also referred to as encryption key, WEP Key, WPA/WPA2 passphrase, PSK, or pre-shared key.
PIN Code
PIN is an acronym of Personal Identification Number and it is a passcode.
Protocol
A set of rules that govern the transmission of data across a network. Examples of communication Protocols include:
FTP
File Transfer Protocol. A communication Protocol or an implementing command that allows a client and host to transfer files between one another on a TCP/IP network.
DHCP
Dynamic Host Configuration Protocol. A communication Protocol upwardly compatible with the BOOTP standard. It issues a dynamic IP Address when each client machine on a TCP/IP network boots up, and reclaims it when the client shuts down. The server allocates IP Addresses prepared for clients, and informs the clients of setup information.
BOOTP
BOOTstrap Protocol. A communication Protocol that automatically loads setup information such as IP Address, domain name, etc. for client machines on a TCP/IP network from the server.
RARP
Reverse Address Resolution Protocol. A communication Protocol that searches for IP Address information from the client's network adapter address (MAC Address).
TCP/IP
Transmission Control Protocol/Internet Protocol. A standard communication Protocol necessary to access the Internet or large-scale networks.
PSK (Pre-Shared Key)
The Network Key (encryption key) used with WPA/WPA2.
Remote UI
Remote User Interface. A software that enables accessing the printer from a web browser via a network, allowing you to do various operations such as checking the status of the main unit or making network settings.
Router
Device serving as a relay for communication between differing networks. A Router identifies the types of data travelling over a network and effects control.
SSID
Identifier used for designating a specific access point. May be indicated as access point name/network name.
Stealth Function
Function enabling a Wireless LAN Access Point to suppress display of an access point name by another Wireless LAN-capable device.
TKIP (Temporal Key Integrity Protocol)
One of the Wireless LAN encryption methods used by WPA/WPA2.
USB Hub
A device that connects multiple USB devices to one USB port on your computer.
WAN (Wide Area Network)
An abbreviation for wide area network. A network spread over a large geographic area.
WEP (Wired Equivalent Privacy)
A type of encryption technology used by IEEE 802.11.
WEP Key
The Network Key (encryption key) used with WEP. Normally, you can register four different WEP Key, key numbers 1 to 4, to a Wireless LAN Access Point. You can further enhance security by regularly changing the key number.
Wired LAN
Network having several devices connected via Network Cables. Normally, connection is made to a network via a relay device referred to as a Router or Hub.
Wireless LAN
Network having several devices connected via wireless connection (radio signals) without using cables. Normally, connection is made to a network via a relay device referred to as a Wireless LAN Access Point.
Wireless LAN Access Point
In a Wireless LAN network, a device that serves as a relay for communication connecting devices such as computers.
WPA/WPA2 (Wi-Fi Protected Access)
Encryption technology established by the Wi-Fi Alliance, a Wireless LAN-related industry group, to eliminate weaknesses in WEP. WPA2 is matched to the IEEE 802.11i specification as set out by IEEE (Institute of Electrical and Electronics Engineers in the US). Because the encryption key is automatically updated at a certain interval, it provides a higher level of security than WEP.
WPA/WPA2-EAP (WPA Enterprise)
One of the WPA/WPA2standards prescribing an encryption system that uses an authentication server supported by IEEE 802.1X. By using an authentication server, computer terminals can be authenticated individually.
WPA/WPA2-PSK (WPA Personal)
One of the WPA/WPA2 standards prescribing an encryption system based on PSK. This allows computer terminals to be authenticated by setting a PSK without needing an authentication server.
WPS (Wi-Fi Protected Setup)
Standard enabling simple setup and security setting for Wireless LAN as set out by the Wi-Fi Alliance, a Wireless LAN-related industry group. There are the Push-Button System, allowing simple push of a WPS button, and the PIN Code system, allowing setting by entering a PIN Code.

Before You Start Screen Descriptions Troubleshooting