Dell E310dw User Manual page 210

Hide thumbs Also See for E310dw:
Table of Contents

Advertisement

Resolution
The number of vertical and horizontal lines per inch.
S
Settings Tables
At-a-glance instructions that show all the settings and options that are available for setting up your machine.
Shared Key Cryptosystem
A Shared Key Cryptosystem is a branch of cryptography involving algorithms that use the same key for two different
steps of the algorithm (such as encryption and decryption).
SMTP-AUTH
SMTP Authentication (SMTP-AUTH) expands SMTP (the Internet email sending protocol) to include an
authentication method that ensures the true identity of the sender is known.
SMTP Client
Simple Mail Transfer Protocol (SMTP) client is used to send emails via the Internet or Intranet.
SNMP
The Simple Network Management Protocol (SNMP) is used to manage network devices including computers,
routers and Dell network-ready machines. The Dell print server supports SNMPv1, SNMPv2c and SNMPv3.
SNMPv3
Simple Network Management Protocol version 3 (SNMPv3) provides user authentication and data encryption to
manage network devices securely.
SNTP
The Simple Network Time Protocol (SNTP) is used to synchronize computer clocks on a TCP/IP network. You can
configure the SNTP settings using Web Based Management.
SSID
Each wireless network has its own unique network name and it is technically referred to as a Service Set Identifier
(SSID). The SSID is a 32-byte or less value and is assigned to the access point. The wireless network devices you
want to associate to the wireless network should match the access point. The access point and wireless network
devices regularly send wireless packets (referred to as beacons), which contain the SSID information. When your
wireless network device receives a beacon, you can identify the wireless network that is close enough for the radio
waves to reach your device.
Status Monitor
The Status Monitor utility is a configurable utility for Macintosh users to monitor the status of one or more devices,
allowing you to get immediate notification when there is a problem, for example, when the machine runs out of
paper or jams.
Subnet Mask
A subnet mask allows you to identify which part of an IP address is used as the network address and which part is
used as the host address.
In the following example, the last segment of the IP address is known as the host address and the first three
segments are the network address.
Example: Computer 1 can talk to Computer 2
• Computer 1
210
Glossary

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents