Avery Dennison Monarch 9493 SNP Administrator's Manual page 113

Hide thumbs Also See for Monarch 9493 SNP:
Table of Contents

Advertisement

LPD/LPR
MAC Address or
Media Access
Control
MSCHAPv2
(Challenge
Handshake
Authentication
Protocol)
NIC or
Netw ork Interface
Card
Node
Open
Authentication
PAP (Password
Authentication
Protocol)
Pathname
PEAP (Protected
Extensible
Authentication
Protocol)
Ping
Protocol
A printer protocol that uses TCP/IP to establish
connections between printers on a network. Also known as
Line Printer Daemon/Line Printer Remote.
A hardware address (6-byte) that uniquely identifies each
node of a network. The MAC address is set during
manufacturing and does not change. Also, two Network
Interface Cards (NIC) w ill not have the same value.
The Microsoft® version of CHAP. It is a three-way
handshake protocol that is more secure than PAP.
It provides mutual authentication between devices.
An adapter (board or card) that can be inserted into a
device, so the device can be connected to a network.
The NIC converts data from the device into the form
transmitted or received from the network
A processing location on a network. The location can be a
workstation, computer, or printer. Each Node has a unique
MAC address.
This allows any device to authenticate and then attempt to
communicate with the access point. Any wireless device
can authenticate with the access point, but if WEP is used,
the device can communicate only if its WEP keys match the
access point's. There is no challenge that occurs, you
either have the correct key or not when you communicate
with the access point. By eliminating the challenge
process, it actually makes this more secure than shared
key authentication.
A simple authentication protocol used with PPP (Point-to-
Point Protocol). It is a plain text password system, which
is not very secure.
The location of a particular file or directory that includes
the full path to the needed filename or directory. This is a
combination of path and filename.
Authenticates clients into a network using only server-side
certificates, which makes implementing and administering a
wireless LAN easier.
A way to determine if a device is accessible. It sends a
packet to the specified address and waits for a reply.
This is the way two devices transmit data between each
other, including error checking, data compression, and how
messages start and end.
Glossary G-3

Advertisement

Table of Contents
loading

Table of Contents