
802.11 Authentication
With the
WEP authentication method, there are two types of authentication, Open System and Shared Key. By the Open System, connection to a
Wireless LAN Access Point is possible even without security information. With Shared Key, connection is made by authentication using a
WEP Key.

Ad-hoc Communication
This communication method allows each
Wireless LAN computer terminal to communicate directly without having to use a
Wireless LAN Access Point.

Deny ANY
Function allowing a
Wireless LAN Access Point to deny connection if a device (computer, etc.) has an access point name set to "ANY" or "blank."

DHCP Function
Dynamic Host Configuration
Protocol. This function automatically assigns necessary information such as the
IP Address, to the computer or network device connected to the network.

Hub
A device for joining multiple
Network Cables on a network.

IEEE 802.11b/g/n
International standard specifying a
Wireless LAN environment that uses the 2.4 GHz/5 GHz frequency range (
IEEE 802.11n only). Communication speeds are up to 11 Mbps for IEEE 802.11b, and up to 54 Mbps for IEEE 802.11g.
IEEE 802.11n provides for up to 600 Mbps, however, this depends on the combination of devices.

IEEE 802.11n
International standard specifying a
Wireless LAN environment that uses the 2.4 GHz/5 GHz frequency range. Communication speeds are up to 600 Mbps, however, this depends on the combination of devices.

IEEE 802.1X
Authentication standard used for accessing
LAN. Communication from devices that have not been authenticated is blocked, allowing communication from authenticated devices only.

IP Address
Internet
Protocol address. A 32-bit address used by IP (Internet
Protocol) to specify a computer or device on the Internet. An
IP Address is defined as four numbers from 0 to 255 delimited by periods, for example, 128.121.4.5. A unique
IP Address must be assigned to identify the computer on the Internet.

LAN (Local Area Network)
A network system formed by linking a server, workstations, devices, and computers, which are all located in he same building or some other relatively limited area.

MAC Address
Media Access Control address. The hardware address of the network adapter of a computer connected to a local area network.

MAC Address Filtering
Function that registers the
MAC Addresses of already-networked computers and network devices to a
Wireless LAN Access Point, so as to block communication with any other network devices.

Network Cable
Cable (
LAN cable) used for connecting a device such as a computer to the network.

Network Key
A password required for preventing interception of communication content. Also referred to as encryption key,
WEP Key,
WPA/WPA2 passphrase,
PSK, or pre-shared key.

PIN Code
PIN is an acronym of Personal Identification Number and it is a passcode.

Protocol
A set of rules that govern the transmission of data across a network. Examples of communication
Protocols include:
File Transfer
Protocol. A communication
Protocol or an implementing command that allows a client and host to transfer files between one another on a
TCP/IP network.
Dynamic Host Configuration
Protocol. A communication
Protocol upwardly compatible with the
BOOTP standard. It issues a dynamic
IP Address when each client machine on a
TCP/IP network boots up, and reclaims it when the client shuts down. The server allocates
IP Addresses prepared for clients, and informs the clients of setup information.
BOOTstrap
Protocol. A communication
Protocol that automatically loads setup information such as
IP Address, domain name, etc. for client machines on a
TCP/IP network from the server.
Reverse Address Resolution
Protocol. A communication
Protocol that searches for
IP Address information from the client's network adapter address (
MAC Address).
Transmission Control
Protocol/Internet
Protocol. A standard communication
Protocol necessary to access the Internet or large-scale networks.

PSK (Pre-Shared Key)
The
Network Key (encryption key) used with
WPA/WPA2.

Remote UI
Remote User Interface. A software that enables accessing the printer from a web browser via a network, allowing you to do various operations such as checking the status of the main unit or making network settings.

Router
Device serving as a relay for communication between differing networks. A
Router identifies the types of data travelling over a network and effects control.

SSID
Identifier used for designating a specific access point. May be indicated as access point name/network name.

Stealth Function
Function enabling a
Wireless LAN Access Point to suppress display of an access point name by another
Wireless LAN-capable device.

TKIP (Temporal Key Integrity Protocol)
One of the
Wireless LAN encryption methods used by
WPA/WPA2.

USB Hub
A device that connects multiple USB devices to one USB port on your computer.

WAN (Wide Area Network)
An abbreviation for wide area network. A network spread over a large geographic area.

WEP (Wired Equivalent Privacy)
A type of encryption technology used by IEEE 802.11.

WEP Key
The
Network Key (encryption key) used with
WEP. Normally, you can register four different
WEP Key, key numbers 1 to 4, to a
Wireless LAN Access Point. You can further enhance security by regularly changing the key number.

Wired LAN
Network having several devices connected via
Network Cables. Normally, connection is made to a network via a relay device referred to as a
Router or
Hub.

Wireless LAN
Network having several devices connected via wireless connection (radio signals) without using cables. Normally, connection is made to a network via a relay device referred to as a
Wireless LAN Access Point.

Wireless LAN Access Point
In a
Wireless LAN network, a device that serves as a relay for communication connecting devices such as computers.

WPA/WPA2 (Wi-Fi Protected Access)
Encryption technology established by the Wi-Fi Alliance, a
Wireless LAN-related industry group, to eliminate weaknesses in
WEP. WPA2 is matched to the IEEE 802.11i specification as set out by IEEE (Institute of Electrical and Electronics Engineers in the US). Because the encryption key is automatically updated at a certain interval, it provides a higher level of security than
WEP.

WPA/WPA2-EAP (WPA Enterprise)
One of the
WPA/WPA2standards prescribing an encryption system that uses an authentication server supported by
IEEE 802.1X. By using an authentication server, computer terminals can be authenticated individually.

WPA/WPA2-PSK (WPA Personal)
One of the
WPA/WPA2 standards prescribing an encryption system based on
PSK. This allows computer terminals to be authenticated by setting a
PSK without needing an authentication server.

WPS (Wi-Fi Protected Setup)
Standard enabling simple setup and security setting for
Wireless LAN as set out by the Wi-Fi Alliance, a
Wireless LAN-related industry group. There are the Push-Button System, allowing simple push of a
WPS button, and the
PIN Code system, allowing setting by entering a
PIN Code.