Home > HP > Printer > HP LaserJet 1320 User Manual

HP LaserJet 1320 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual HP LaserJet 1320 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							ENWWEnvironmental product stewardship program 45 If this package is used in a product, Eric Young should be given attribution as the author of the 
    parts of the library used.
    This can be in the form of a textual message at program startup or in documentation (online or 
    textual) provided with the package.
    Redistribution and use in source and binary forms, with or without modification, are permitted 
    provided that the following conditions are met:
    1Redistributions of source code must retain the copyright notice, this list of conditions and the 
    following disclaimer.
    2Redistributions in binary form must reproduce the above copyright notice, this list of conditions 
    and the following disclaimer in the documentation and/or other materials provided with the 
    distribution.
    3All advertising materials mentioning features or use of this software must display the following 
    acknowledgement:
    “This product includes cryptographic software written by Eric Young ([email protected])”
    The word ‘cryptographic’ can be left out if the routines from the library being used are not 
    cryptographic related.
    4If you include any Windows specific code (or a derivative thereof) from the apps directory 
    (application code) you must include an acknowledgement:
    “This product includes software written by Tim Hudson ([email protected])”
    THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED 
    WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 
    MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO 
    EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 
    INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 
    NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 
    DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 
    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
    NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 
    SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    The licence and distribution terms for any publicly available version or derivative of this code 
    cannot be changed, i.e., this code cannot simply be copied and put under another distribution 
    license [including the GNU Public Licence.]
     
    						
    							46  Appendix A Regulatory informationENWW
     
    						
    							ENWWGlossary 51
    Glossary
    numbers a b c d e f g h i j l m n p r s t u w
    numbers
    10/100 Base-T: A technical term for Ethernet. 10/100 refers to the speed at which the Ethernet 
    network functions. 10 indicates 10 megabits per second (Mb/s) for normal Ethernet, and 100 
    indicates 100 Mb/s for Fast Ethernet.
    802.11a: A type of wireless networking that provides up to 54 Mb/s transmission in the 5 GHz 
    band.
    802.11b: A type of wireless networking that provides up to 11 Mb/s transmission (with a fallback to 
    5.5, 2 and 1 Mb/s) in the 2.4 GHz band.
    802.11g: A type of wireless networking that provides up to 54 Mb/s transmission in the 2.4 GHz 
    band.
    a
    Ad-hoc network: A type of wireless network in which devices directly communicate with each 
    other rather than through a Wireless Access Point (WAP). Ad-hoc networks are typically small and 
    simple, for example, a wireless PC and a wireless printer. Ad-hoc networks are also known as 
    peer-to-peer networks, independent basic service stations (IBSS), or direct-connect wireless 
    networks.
    Authentication: Authentication is a wireless network security strategy. On a network with 
    authentication, devices use a shared key as a password and communicate only with devices that 
    know the key. Unlike WEP, authentication does not encrypt the data sent between wireless 
    devices. However, authentication can be used in conjunction with WEP. Authentication keys and 
    WEP keys can be identical.
    AutoIP: A process by which a device on a network automatically assigns an IP address to itself.
    b
    BOOTP: Bootstrap Protocol (BOOTP) is an Internet protocol that enables a device to discover its 
    own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into 
    memory to boot the machine. This enables the device to boot without requiring a hard or floppy 
    disk drive.
    Broadcast packet: A packet sent from one device on a network to all devices on the network. 
    c
    Channel: One of several pre-set frequencies at which 802.11b/g-enabled devices communicate in 
    order to reduce interference. The number of channels available varies by country/region.
     
    						
    							52   B GlossaryENWW
    d
    DHCP (Dynamic Host Configuration Protocol): A protocol used to automatically assign an IP 
    address to each device on a network.
    DHCP server: This server dynamically manages a pool of IP addresses for use on a network or 
    the Internet. When a user logs in, the server “loans” the user an IP address for the duration of the 
    network connection. When a user logs off, the IP address is returned to the pool for use by another 
    device.
    Digital Certificate: An electronic means of proving the identity of a network user or device. 
    Certificates contain detailed information about the users device in a standard format. Digital 
    certificates are typically issued by a trusted third-party Certificate Authority (CA). Locally 
    administered, or self-signed, certificates are valid in some instances.
    e
    EAP: Extensible Authentication Protocol (EAP) is a general protocol for authentication that also 
    supports multiple authentication methods, such as token cards, one-time passwords, certificates, 
    and public key authentication.
    Encryption: A network security that encodes the data sent across a wireless network making the 
    data unintelligible to unauthorized users. The printer supports WEP and WPA.
    Encryption keys: A sequence of characters or digits that a wireless device uses to encode data. 
    Encryption keys can be static (as they are in WEP) or dynamic (as they are in WPA).
    Ethernet: A popular form of wired computer networking for Local Area Networks.
    Ethernet cable: There are two types of Ethernet cables. A straight-through cable is the most 
    common and is used to connect devices on a network to a hub or router. A crossover cable is used 
    to connect two devices that have Ethernet ports but that are not hubs or routers. Use a CAT-5 
    straight-through cable with an RJ-45 plug to connect the printer to an Ethernet network.
    EWS (embedded Web server): A server that is completely contained within a device. An EWS 
    provides management information about the device. This is helpful for managing single devices on 
    a small network. By using a Web browser to access an EWS, network users can perform such 
    operations as obtaining network printer status updates, simple troubleshooting, and changing 
    device configuration setting.
    f
    Firewall: A combination of hardware and software tools that protects a network from unwanted 
    entry.
    g
    Gateway: A dedicated device (router or computer) that connects two different networks. For 
    example, a computer on an Ethernet network may act as a gateway between the network and the 
    Internet.
    h
    Host Name: The name by which the printer identifies itself on the network. The printers host 
    name appears on the network configuration page. Use the host name to open the printers 
    embedded Web server (EWS).
    Hub: A simple device that acts as the center of an Ethernet network. Other devices on the network 
    are connected to the hub.
     
    						
    							ENWWGlossary 53
    i
    ICS (Internet Connection Sharing): A Windows program that allows a computer to act as a 
    gateway between the Internet and a network. ICS uses DHCP to assign IP addresses. See 
    Windows documentation for more information about ICS.
    Internet Sharing: A Macintosh OSX program that allows a computer to act as a gateway between 
    the Internet and a network. See Macintosh documentation for more information about Internet 
    Sharing.
    IP address (Internet Protocol address): Each computer that connects to a network or the 
    Internet, must have a unique address. A connection to the Internet provided by an Internet Service 
    Provider (ISP) uses a standard protocol called Internet Protocol (IP). This protocol is also used on 
    internal networks. IP address numbers are in the form x.x.x.x—for example, 169.254.100.2. Most 
    networks use DHCP or AutoIP to dynamically assign IP addresses. However, a device can be 
    manually assigned a static IP address.
    Infrastructure network: A type of wireless network in which devices communicate with each 
    other through a Wireless Access Point (WAP), such as a wireless network hub, router, or gateway.
    j
    Jetdirect print server: The internal or external HP Jetdirect print server hardware developed by 
    Hewlett-Packard that enables network-connected printing.
    l
    LAN (Local Area Network): A high-speed type of computer network that connects devices that 
    are a relatively short distance from one another. An Ethernet network is one type of LAN.
    m
    MAC address (Media Access Control address): The hardware address for a device on a 
    network. The printers MAC address appears on the network configuration page.
    Mb/s (megabits per second): The measure for the rate at which a network functions. For 
    example, 1 Mb/s equals 1,000,000 bits per second (or 125,000 bytes per second).
    mDNS: As an alternative to a Domain Name Server, a device issues a Multicast Domain Name 
    Server (mDNS) notification to provide information regarding its service. The notification includes 
    the type of service (such as printing), the name of the service (such as “your printer”), IP and port 
    addresses, and other necessary information. Each device on the network receives the notification 
    and stores the information in a personal DNS server.
    n
    Network name: A network name is an alphanumeric, case-sensitive character string that provides 
    basic access control to a wireless network. A network name is also known as a Service Set 
    Identifier (SSID).
    Node: A network connection point, typically a computer.
     
    						
    							54   B GlossaryENWW
    p
    Packet: A message sent from one device on a network to other devices on the network.
    Protocol: A language that devices on a network use to communicate with each other. A popular 
    network protocol is TCP/IP.
    Proxy server: A proxy server acts as a security gate (such as a Web proxy) that restricts traffic 
    going through a network. The proxy intercepts requests to the network to see if it can fulfill the 
    requests itself. If not, it forwards the request to another server. Proxy servers have two main 
    purposes: improve performance and filter requests.
    r
    RJ-45: The type of plug at the end of an Ethernet cable.
    Rendezvous: Apple’s configuration technology that automatically discovers and connects devices 
    over Ethernet and wireless networks. Rendezvous is integrated into the Mac OS X version 10.2 
    operating system.
    Router: A complex networking device that directs packets from one network to another network. A 
    router can act as a gateway between a LAN and the Internet.
    s
    Server: A computer on a network that manages network resources. A network might have a 
    number of different server types. For example, a print server manages one or more printers, a file 
    server stores and manages files, and a network server manages network traffic.
    SSID (Service Set Identifier): A unique identifier (up to 32 characters) attached to the header of 
    packets sent over a wireless LAN. An SSID provides basic access control to a wireless network. It 
    can also be used to logically segment a wireless subgroup of users and devices. An SSID 
    prevents access by any client device that does not have the SSID. By default, an access point 
    broadcasts its SSID in its beacon.
    An SSID is also referred to as a Network Name because it is a name that identifies a wireless 
    network.
    Static IP address: An IP address that is manually assigned to a device on a network. A static IP 
    address remains fixed until changed manually. Alternative methods for assigning IP addresses are 
    DHCP and AutoIP.
    Subnet: A small network that acts as part of a large network. It is recommended that the printer 
    and the computers that use the printer all be on the same subnet.
    Subnet mask: A number that identifies the IP addresses that belong to a subnet.
    Switch: A network device that manages network traffic in order to minimize collisions and 
    maximize speed.
    t
    TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is the network communication 
    protocol used on the Internet. The printers built-in networking feature supports LANs that use 
    TCP/IP.
    TKIP: See WPA. Temporal Key Integrity Protocol (TKIP).
    u
    Unicast packet: A packet sent from one device on a network to another device on the network.
     
    						
    							ENWWGlossary 55
    w
    WEP: Wired Equivalent Privacy (WEP) provides security by encrypting data sent over radio waves 
    from one wireless device to another wireless device. WEP encodes the data sent across the 
    network making the data unintelligible to unauthorized users. Only devices that share the same 
    WEP settings as the printer will be able to communicate with the printer. WEP depends on 
    encryption keys that are static and provides less security than WPA (TKIP).
    WEP key: A WEP key, or encryption key, is a sequence of alphanumeric characters or 
    hexadecimal digits. After creating a WEP key, you must remember it or store it in a secure location. 
    You may not be able to retrieve the WEP key if you lose it. A WEP key is either 64 or 128 bits long. 
    The first 24 bits of the key are provided automatically. When creating the WEP key, the person 
    creating the key provides the remaining bits (40 bits in the case of a 64-bit key, or 104 bits in the 
    case of a 128-bit key).
    Wireless Access Point (WAP): A Wireless Access Point (WAP) is a device through which 
    devices (for example, computers and printers) on an infrastructure wireless network communicate 
    with one another. A WAP is also called a base station.
    Wireless profile: A wireless profile is a collection of wireless network settings that applies to a 
    particular wireless network. For example, a wireless LAN card can have one profile for a home 
    network and another profile for an office network. When installing a device on a network, be sure 
    to select the appropriate profile.
    WiFi (
    Wireless Fidelity): A term used generically when referring to any type of 802.11 network, 
    whether 802.11b/g, 802.11a, dual-band, or other. Any products tested and approved as “Wi-Fi 
    Certified” are certified as interoperable with each other, even if they are from different 
    manufacturers. Typically, however, any Wi-Fi product using the same radio frequency (2.4GHz for 
    802.11b or 11g; 5GHz for 802.11a) will work with any other Wi-Fi product, even if not Wi-Fi 
    Certified. 
    Wireless network adapter: Each node (computer or device) on the WLAN uses a wireless 
    network adapter into which a wireless transceiver, with a small, integrated antenna, is built. 
    Wireless network adapters might be internal (inserted in a computer or device), external (housed 
    in a separate case), or built-in.
    Common adapters include the following:
    ●USB adapter: An external device that connects to a USB port on the computer (typically has a 
    PCMCIA card attached to one end).
    ●Notebook adapter: A PCMCIA card that plugs directly into one of the PCMCIA slots on your 
    laptop or other portable computer.
    ●Desktop computer adapter: A dedicated ISA or PCI card, or a PCMCIA card with a special 
    adapter, that plugs into your desktop computer. 
    ●AirPort adapter: A wireless card that plugs directly into the AirPort slot on your Macintosh 
    laptop or desktop computer. AirPort adapters eliminate the need for cable connections to the 
    computer.
    WPA: WPA (Wi-Fi protected access) provides security by encrypting data sent over radio waves 
    from one wireless device to another wireless device and by controlling access to network 
    resources through authentication protocols. Only devices that share the same WPA settings as the 
    printer will be able to communicate with the printer. WPA uses encryption keys that change 
    frequently. WPA provides better security than WEP. WPA is also called TKIP.
     
    						
    							ENWWIndex  53
    Index
    A
    ad hoc mode  4
    cannot find computer  30
    advanced authentication protocols  26
    C
    changing networks  21
    checking wireless light  31
    communication modes
    ad hoc  4
    infrastructure 4
    peer to peer  4
    copyright and trademark information  ii
    D
    data information  15
    domain name server (DNS)
    IP address  11
    multicast service name  11
    dynamic encryption  26
    E
    embedded Web server
    admin password  11
    Energy Star  41
    Environmental Product Stewardship Program  41
    F
    FCC compliance  36
    I
    information
    printer options  2
    troubleshooting 2
    infrastructure mode
    cannot find computer  30
    cannot find WLAN  29
    computer unable to find device  30
    installation problems  24
    authentication protocols not supported  26
    cannot discover device  24
    cannot find network name  25
    device cannot connect  24
    incorrectly set SSID or WEP key  26
    no TCP/IP  24
    printer not found  25
    setup failed  27
    signal not received by device  27
    verification failure  26
    wireless access card configuration  27
    wrong WEP key  26
    IP address  10
    adding 10
    DNS 11
    L
    link speed  11
    M
    media access control
    address 9
    address authentication  6
    filtering 33
    Media Access Control (MAC)  9
    multiple WEP keys  26
    N
    network configuration page
    access point MAC address  13
    authentication type  14
    bad packets received  15
    communication mode  12
    configuration source  10
    default gateway  10
    device IP address  10
    DNS server  11
    encryption 14
    EWS admin password  11
    firmware revision code  10
    firmware version  10
    hardware address  9
    host name  10
    link speed  11
    mDNS service name  11
    network connection type  9
    network status  9
    printing 9
    Service Set Identifier (SSID)  12
    signal strength  13
    subnet mask  10
    TCP/IP name  10
    total packets received  15
    total packets transmitted  15
    verification 31
    Wi-Fi Protected Access  15
    wireless communication channel  13
    wireless network status  12
    network settings
    general 9
    troubleshooting 32
    wireless 12
    P
    Par t ii
    password for embedded Web server  11
    personal software firewall  24
    print cartridge
    where to send to recycle  42
    printer
    IP address  10
    unmatched network settings  32
    printer drivers
    sites for download  2
     
    						
    							54  IndexENWW
    R
    recycling
    HP Printing supplies returns and environmental program  42
    where to send print cartridges  42
    regulatory statements
    Canadian DOC regulations  37
    declaration of conformity  39
    laser safety statement  37
    laser statement for Finland  40
    S
    security
    authentication type  14
    encryption 14
    Wi-Fi Protected Access  15
    wireless network  5
    software
    sites for download  2
    speed
    network transfer  11
    support, web sites  2
    T
    troubleshooting
    ad-hoc mode  30
    communication block  24
    general wireless printing problems  31
    installation 24
    MAC filtering  33
    network settings  32
    weak radio signal  33
    wireless infrastructure mode  29
    wrong wireless profile  33
    W
    web-based support  2
    Wi-Fi Protected Access
    enterprise environment  15
    home/SOHO environment  15
    wired equivalent privacy (WEP)  6
    wireless local area network (WLAN)  3
    wireless network
    authentication 5
    communication modes  3
    encryption 6
    MAC address authentication  6
    security 5
    status 12
    wireless profiles  6
     
    						
    All HP manuals Comments (0)

    Related Manuals for HP LaserJet 1320 User Manual