Avery 9493 Printer User Manual


 
Signal Strength A percentage (1 to 100) of the connection between the device and access point. If the
signal strength is 0, there is no connection with the access point; 30 or less indicates
you may be experiencing interference or close to being out of access point range, and
below 50, printing performance could be affected. To improve the signal strength, try
moving the printer closer to the access point and away from other radio devices such as
Bluetooth® wireless devices, microwave ovens, or 2.4-GHz cordless phones.
Speed or
Transmit Rate
Sets the maximum rate of communication between the devices on the network. It is
also called transmit rate.
The speeds are in megabits per second (Mbps) and include: 1, 2, 5.5, 11, 12, 18, 24,
36, 48, and 54.
SSID or
Service Set Identifier
A unique identifier that must match for all nodes on a subnetwork to communicate with
each other. It consists of up to 32 characters (any printable character, including
spaces). If using the space character, it must be enclosed in quotation marks. It is
case-sensitive.
Static
Method
One of the available boot methods. Use static if your network uses fixed configuration.
The IP address remains the same every time the device connects to the network.
Subnet A portion of a network that shares a common address component. On TCP/IP networks,
subnets are all devices with the same prefix. For example, all devices that start with
192.192.192 are part of the same subnet. Dividing a network into subnets is useful for
both security and performance reasons.
Subnet Mask A mask is used to determine what subnet an IP address belongs to. Companies often
have ranges of IP addresses that can be described by one or more masks. For example,
a mask of 255.255.255.0 allows variation in the last position only, because the first
three positions are fixed.
Telnet A Terminal Emulation program for TCP/IP networks that runs on your computer and
connects your computer to a server on the network. You enter commands through the
Telnet program and they run as if you were entering them directly on the server
console.
TCP/IP A way that two devices can transmit data between each other. TCP/IP (Transmission
Control Protocol/ Internet Protocol) is generally the standard for transmitting data over
a network.
TKIP (Temporal Key
Integrity Protocol)
Changes the encryption keys regularly and has time limits before new keys are created.
Changing the key periodically provides additional security.
TLS (Transport Layer
Security)
A cryptographic protocol that uses client-side and server-side certificates to
authenticate users on the Web. It can dynamically create user-based and session-
based keys.
TTLS (Tunneled
Transport Layer
Security)
Provides certificate-based, server-side, mutual authentication of the client and network
through an encrypted channel (or tunnel). It can dynamically create user-based and
session-based keys.
Transmit Rate See Speed.
WEP or
Wired Equivalent
Privacy
A security protocol for wireless local area networks. WEP was designed to provide the
same level of security as that of a wired network, which is inherently more secure than
a wireless network because wired networks are easily protected against unauthorized
access. Wireless networks use radio waves to communicate and can be vulnerable to
unauthorized users.
WEP provides security by encrypting data over radio waves so that it is protected as it
is transmitted. However, it has been found that WEP is not as secure as once believed.
Note: If one part of a wireless network has WEP enabled, they all must have it enabled
with the same key or they cannot communicate.
128 Bit / 64 Bit
WEP Key
This is the 64 or 128 bit WEP key that must match other Nodes’ encryption keys in
order to communicate: 10 hex characters for 64 bit (40 user-specified characters), or 26
hex characters for 128 bit (104 user-specified characters). You must use the same key
values for devices to communicate with each other.
WLAN or Wireless
Local Area Network
A LAN that uses high-frequency radio waves to communicate between nodes, rather
than telephone wires, etc.
WPA (Wi-Fi Protected
Access)
A network security protocol that uses improved authentication and temporal keys. It
was created to address the weaknesses of WEP encryption.
WPA2
(or IEEE 802.11i)
A network security protocol with stronger encryption than WPA. It was created to
address the weaknesses of WEP encryption.
Glossary G-3