Canon Pixma Mg2924 User Guide
Have a look at the manual Canon Pixma Mg2924 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1335 Canon manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
◦Hex Specify a 10-digit or 26-digit string that can contain hexadecimal (0 to 9, A to F, and a to f).• Key Length Length of the WEP key. Select either 64 bits or 128 bits. Longer key length allows you to set a more complex WEP key. L • Link Quality The status of connection between the access point and the printer excluding noise (interference) is indicated with a value from 0 to 100%. • LPR A platform-independent printing protocol used in TCP/IP networks. It is not supported bidirectional communication. M • MAC Address Also known as the physical address. A unique and permanent hardware identifier that is assigned to network devices by its manufacturer. MAC addresses are 48 bits long and are written as a hexadecimal number separated by colons, i.e., 11:22:33:44:55:66. O • Operation Status Indicates the status on whether the printer can be used. P • Proxy server A server that links a LAN-connected computer to the Internet. When using a proxy server, specify the address and the port number of the proxy server. • PSK An encryption method employed by WPA/WPA2. R • Router A relay device to connect to another network. 251
S• Signal Strength The strength of the signal received by the printer from the access point is indicated with a value from 0 to 100%. • SSID Unique label for wireless LAN. It is often represented such as a network name or an access point name. SSID distinguishes one wireless LAN from another to prevent interference. The printer and all clients on a wireless LAN must use the same SSID in order to communicate with each other. The SSID can be up to 32 characters long, and is made up of alphanumeric characters. The SSID may also be referred to by its network name. • Stealth In the stealth mode, an access point hides itself by not broadcasting its SSID. The client must specify the SSID set to the access point to detect it. • Subnet Mask IP address has two components, the network address and the host address. Subnet Mask used to calculate the Subnet Mask address from the IP address. A Subnet Mask is usually assigned by an access point or a DHCP server of the router automatically. Example: IP Address: 192.168.127.123 Subnet Mask: 255.255.255.0 Subnet Mask Address: 192.168.127.0 T • TCP/IP Suite of communications protocols used to connect hosts on the Internet or the LAN. This protocol allows different terminals to communicate with each other. • TKIP An encryption protocol employed by WPA/WPA2. U • USB Serial interface designed to enable you to "hot-swap" devices, i.e., by plugging and unplugging them without turning off the power. 252
W• WCN (Windows Connect Now) Users running Windows Vista or later can obtain the setting information directly via wireless network (WCN-NET). • WEP/WEP Key An encryption method employed by IEEE 802.11. Shared security key used to encrypt and decrypt data sent over wireless networks. This printer supports key length of 64 bits or 128 bits, key format of ASCII code or Hexadecimal, and key number of 1 to 4. • Wi-Fi International association that certifies interoperability of wireless LAN products based on the IEEE 802.11 specification. This machine is a Wi-Fi authorized product. • Wireless LAN A network that, instead of being connected by physical wires, is connected by a wireless technology, such as Wi-Fi. • WPA Security framework announced by the Wi-Fi Alliance in October 2002. The security has been strengthened more than WEP. ◦ Authentication WPA defines the following authentication methods: PSK that can be used without an authentication server, plus WPA-802.1x that do require an authentication server. This machine supports WPA-PSK. ◦ Passphrase This encrypted key is used to perform WPA-PSK authentication. The passphrase should be a string of 8 to 63 alphanumeric characters or a 64-digit hexadecimal value. • WPA2 Security framework released by the Wi-Fi Alliance in September 2004 as a later version of WPA. Provides a stronger encryption mechanism through Advanced Encryption Standard (AES). ◦ Authentication WPA2 defines the following authentication methods: PSK that can be used without an authentication server, plus WPA2-802.1x that do require an authentication server. This machine supports WPA2-PSK. ◦ Passphrase This encrypted key is used to perform WPA2-PSK authentication. The passphrase should be a string of 8 to 63 alphanumeric characters or a 64-digit hexadecimal value. 253
•WPS (Wi-Fi Protected Setup) WPS is a standard for easy and secure establishment of a wireless network. There are 2 primary methods used in the Wi-Fi Protected Setup: PIN entry: a mandatory method of setup for all WPS certified devices Push button configuration (PBC): an actual push button on the hardware or through a simulated push button in the software. 254
RestrictionsIf you use a printer over the wireless LAN, the printer may recognize nearby wireless systems, you should set a network key (WEP or WPA/WPA2) to the access point to encrypt wireless transmission. Wireless communication with a product that does not comply with the Wi-Fi standard cannot be guaranteed. Connecting with too many computers may affect the printer performance, such as printing speed.255
About FirewallA firewall is a function of the security software installed in the computer or operation system for computer, and is a system that is designed to prevent unauthorized access to a network. Precautions When a Firewall Function is Enabled• A firewall function may limit communications between a printer and a computer. This may disableprinter setup and communications. • During the printer setup, you may be prompted to enable or disable communications, depending onthe firewall function of the security software or operation system. If so, choose to enable communications. • When using IJ Network Tool, you may be prompted to enable or disable communications, depending on the firewall function of the security software. If so, choose to enable communications. • If you cannot set up the printer, temporarily disable the firewall function of the security software oroperation system. Important • If you disabled the firewall function, disconnect your network from the Internet. • Some applications (like the network configuration software) override firewall settings. Check theapplication's settings beforehand. • If the printer you use is set to Get IP address automatically , the IP address changes every time the printer connects to the network. This may disable printer setup and communications, depending on the firewall settings. In this case, either change the firewall settings or assign a fixed IP address to the printer. An IP address can be set using IJ Network Tool. Changing the Settings in the Wireless LAN Sheet Changing the Settings in the Wired LAN Sheet When assigning a fixed IP address to the printer, you will need to specify an IP address with which the computer can communicate. Note • For the operation system firewall settings or the security software firewall settings, refer to the instruction manual of the computer or software, or contact its manufacturer. 256
Tips for Ensuring Optimal Printing Quality Useful Information about Ink Key Points to Successful Printing Be Sure to Make Paper Settings after Loading Paper Canceling a Print Job Storing Printed Images Machine Handling Precautions Key to Enjoying Consistent Printing Quality Precautions for Safe Transport of the Machine 257
Useful Information about InkHow is ink used for various purposes other than printing?Ink may be used for purposes other than printing. Ink is not only used for printing, but also for cleaning the print head to maintain the optimal printing quality. The machine has the function to automatically clean the ink jet nozzles to prevent clogging. In the cleaning procedure, ink is pumped out from the nozzles. Used ink for nozzle cleaning is limited to a small amount. Does black-and-white printing use color ink? Black-and-white printing may use ink other than black ink depending on the type of printing paper or the settings of the printer driver. So, color ink is consumed even when printing in black-and-white.258
Key Points to Successful PrintingCheck the machine status before printing!• Is the print head OK? If a print head nozzle is clogged, print will be faint and papers will be wasted. Print the nozzle check pattern to check the print head. Maintenance Procedure • Is the inside of the machine smeared with ink? After printing large quantities of paper, the area where papers go through may get smeared with ink. Clean the inside of your machine with Bottom Plate Cleaning . Check how to load the paper correctly! • Is the paper loaded in the correct orientation? To load paper in the rear tray, load paper WITH THE PRINTING SIDE FACING YOU. Loading Paper • Is the paper curled? The curled paper causes paper jam. Flatten the curled paper, then reload it. "Load the paper after correcting its curl." in Paper Is Smudged/Printed Surface Is Scratched 259
Be Sure to Make Paper Settings after Loading PaperIf the media type setting is not the one for the loaded paper, printing results may not be satisfactory. After loading paper, be sure to select the appropriate media type setting for the loaded paper. Print Results Not Satisfactory There are various types of paper: paper with special coating on the surface for printing photos with optimal quality and paper suitable for documents. Each media type has specific preset settings, such as how ink is used and sprayed, distance from nozzles, etc., so that you can print on that type with optimal image quality. This allows you to print with the settings best suited for the loaded media type just by selecting that media type. 260