Symbol MK1000 Product Reference Manual page 227

Hide thumbs Also See for MK1000:
Table of Contents

Advertisement

IEC (825) Class 1
IEEE Address
Intercharacter Gap
Interleaved Bar
Code
Interleaved 2 of 5
IP
IP Address
Kerberos
This is the lowest power IEC laser classification. Conformity is
ensured through a software restriction of 120 seconds of laser
operation within any 1000 second window and an automatic laser
shutdown if the scanner's oscillating mirror fails.
See MAC Address.
The space between two adjacent bar code characters in a discrete
code.
A bar code in which characters are paired together, using bars to
represent the first character and the intervening spaces to represent
the second.
A binary bar code symbology representing character pairs in groups
of five bars and five interleaved spaces. Interleaving provides for
greater information density. The location of wide elements (bar/
spaces) within each group determines which characters are encoded.
This continuous code type uses no intercharacter spaces. Only
numeric (0 to 9) and START/STOP characters may be encoded.
(Internet Protocol) The IP part of the TCP/IP communications
protocol. IP implements the network layer (layer 3) of the protocol,
which contains a network address and is used to route a message to
a different network or subnetwork. IP accepts "packets" from the layer
4 transport protocol (TCP or UDP), adds its own header to it and
delivers a "datagram" to the layer 2 data link protocol. It may also
break the packet into fragments to support the maximum transmission
unit (MTU) of the network.
(Internet Protocol address) The address of a computer attached to a
TCP/IP network. Every client and server station must have a unique
IP address. A 32-bit address used by a computer on a TCP/IP
network. Client workstations have either a permanent address or one
that is dynamically assigned to them each session. IP addresses are
written as four sets of numbers separated by periods; for example,
204.171.64.2.
Kerberos is a network authentication protocol. It is designed to provide
strong authentication for client/server applications by using secret-key
cryptography. A free implementation of this protocol is available from
the Massachusetts Institute of Technology. Kerberos is available in
many commercial products as well.
Glossary
Glossary-9

Advertisement

Table of Contents
loading

Table of Contents