HP LaserJet 1320 User Manual
Have a look at the manual HP LaserJet 1320 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 1114 HP manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
ENWWEnvironmental product stewardship program 45 If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young ([email protected])” The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. 4If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson ([email protected])” THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publicly available version or derivative of this code cannot be changed, i.e., this code cannot simply be copied and put under another distribution license [including the GNU Public Licence.]
ENWWGlossary 51 Glossary numbers a b c d e f g h i j l m n p r s t u w numbers 10/100 Base-T: A technical term for Ethernet. 10/100 refers to the speed at which the Ethernet network functions. 10 indicates 10 megabits per second (Mb/s) for normal Ethernet, and 100 indicates 100 Mb/s for Fast Ethernet. 802.11a: A type of wireless networking that provides up to 54 Mb/s transmission in the 5 GHz band. 802.11b: A type of wireless networking that provides up to 11 Mb/s transmission (with a fallback to 5.5, 2 and 1 Mb/s) in the 2.4 GHz band. 802.11g: A type of wireless networking that provides up to 54 Mb/s transmission in the 2.4 GHz band. a Ad-hoc network: A type of wireless network in which devices directly communicate with each other rather than through a Wireless Access Point (WAP). Ad-hoc networks are typically small and simple, for example, a wireless PC and a wireless printer. Ad-hoc networks are also known as peer-to-peer networks, independent basic service stations (IBSS), or direct-connect wireless networks. Authentication: Authentication is a wireless network security strategy. On a network with authentication, devices use a shared key as a password and communicate only with devices that know the key. Unlike WEP, authentication does not encrypt the data sent between wireless devices. However, authentication can be used in conjunction with WEP. Authentication keys and WEP keys can be identical. AutoIP: A process by which a device on a network automatically assigns an IP address to itself. b BOOTP: Bootstrap Protocol (BOOTP) is an Internet protocol that enables a device to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the device to boot without requiring a hard or floppy disk drive. Broadcast packet: A packet sent from one device on a network to all devices on the network. c Channel: One of several pre-set frequencies at which 802.11b/g-enabled devices communicate in order to reduce interference. The number of channels available varies by country/region.
52 B GlossaryENWW d DHCP (Dynamic Host Configuration Protocol): A protocol used to automatically assign an IP address to each device on a network. DHCP server: This server dynamically manages a pool of IP addresses for use on a network or the Internet. When a user logs in, the server “loans” the user an IP address for the duration of the network connection. When a user logs off, the IP address is returned to the pool for use by another device. Digital Certificate: An electronic means of proving the identity of a network user or device. Certificates contain detailed information about the users device in a standard format. Digital certificates are typically issued by a trusted third-party Certificate Authority (CA). Locally administered, or self-signed, certificates are valid in some instances. e EAP: Extensible Authentication Protocol (EAP) is a general protocol for authentication that also supports multiple authentication methods, such as token cards, one-time passwords, certificates, and public key authentication. Encryption: A network security that encodes the data sent across a wireless network making the data unintelligible to unauthorized users. The printer supports WEP and WPA. Encryption keys: A sequence of characters or digits that a wireless device uses to encode data. Encryption keys can be static (as they are in WEP) or dynamic (as they are in WPA). Ethernet: A popular form of wired computer networking for Local Area Networks. Ethernet cable: There are two types of Ethernet cables. A straight-through cable is the most common and is used to connect devices on a network to a hub or router. A crossover cable is used to connect two devices that have Ethernet ports but that are not hubs or routers. Use a CAT-5 straight-through cable with an RJ-45 plug to connect the printer to an Ethernet network. EWS (embedded Web server): A server that is completely contained within a device. An EWS provides management information about the device. This is helpful for managing single devices on a small network. By using a Web browser to access an EWS, network users can perform such operations as obtaining network printer status updates, simple troubleshooting, and changing device configuration setting. f Firewall: A combination of hardware and software tools that protects a network from unwanted entry. g Gateway: A dedicated device (router or computer) that connects two different networks. For example, a computer on an Ethernet network may act as a gateway between the network and the Internet. h Host Name: The name by which the printer identifies itself on the network. The printers host name appears on the network configuration page. Use the host name to open the printers embedded Web server (EWS). Hub: A simple device that acts as the center of an Ethernet network. Other devices on the network are connected to the hub.
ENWWGlossary 53 i ICS (Internet Connection Sharing): A Windows program that allows a computer to act as a gateway between the Internet and a network. ICS uses DHCP to assign IP addresses. See Windows documentation for more information about ICS. Internet Sharing: A Macintosh OSX program that allows a computer to act as a gateway between the Internet and a network. See Macintosh documentation for more information about Internet Sharing. IP address (Internet Protocol address): Each computer that connects to a network or the Internet, must have a unique address. A connection to the Internet provided by an Internet Service Provider (ISP) uses a standard protocol called Internet Protocol (IP). This protocol is also used on internal networks. IP address numbers are in the form x.x.x.x—for example, 169.254.100.2. Most networks use DHCP or AutoIP to dynamically assign IP addresses. However, a device can be manually assigned a static IP address. Infrastructure network: A type of wireless network in which devices communicate with each other through a Wireless Access Point (WAP), such as a wireless network hub, router, or gateway. j Jetdirect print server: The internal or external HP Jetdirect print server hardware developed by Hewlett-Packard that enables network-connected printing. l LAN (Local Area Network): A high-speed type of computer network that connects devices that are a relatively short distance from one another. An Ethernet network is one type of LAN. m MAC address (Media Access Control address): The hardware address for a device on a network. The printers MAC address appears on the network configuration page. Mb/s (megabits per second): The measure for the rate at which a network functions. For example, 1 Mb/s equals 1,000,000 bits per second (or 125,000 bytes per second). mDNS: As an alternative to a Domain Name Server, a device issues a Multicast Domain Name Server (mDNS) notification to provide information regarding its service. The notification includes the type of service (such as printing), the name of the service (such as “your printer”), IP and port addresses, and other necessary information. Each device on the network receives the notification and stores the information in a personal DNS server. n Network name: A network name is an alphanumeric, case-sensitive character string that provides basic access control to a wireless network. A network name is also known as a Service Set Identifier (SSID). Node: A network connection point, typically a computer.
54 B GlossaryENWW p Packet: A message sent from one device on a network to other devices on the network. Protocol: A language that devices on a network use to communicate with each other. A popular network protocol is TCP/IP. Proxy server: A proxy server acts as a security gate (such as a Web proxy) that restricts traffic going through a network. The proxy intercepts requests to the network to see if it can fulfill the requests itself. If not, it forwards the request to another server. Proxy servers have two main purposes: improve performance and filter requests. r RJ-45: The type of plug at the end of an Ethernet cable. Rendezvous: Apple’s configuration technology that automatically discovers and connects devices over Ethernet and wireless networks. Rendezvous is integrated into the Mac OS X version 10.2 operating system. Router: A complex networking device that directs packets from one network to another network. A router can act as a gateway between a LAN and the Internet. s Server: A computer on a network that manages network resources. A network might have a number of different server types. For example, a print server manages one or more printers, a file server stores and manages files, and a network server manages network traffic. SSID (Service Set Identifier): A unique identifier (up to 32 characters) attached to the header of packets sent over a wireless LAN. An SSID provides basic access control to a wireless network. It can also be used to logically segment a wireless subgroup of users and devices. An SSID prevents access by any client device that does not have the SSID. By default, an access point broadcasts its SSID in its beacon. An SSID is also referred to as a Network Name because it is a name that identifies a wireless network. Static IP address: An IP address that is manually assigned to a device on a network. A static IP address remains fixed until changed manually. Alternative methods for assigning IP addresses are DHCP and AutoIP. Subnet: A small network that acts as part of a large network. It is recommended that the printer and the computers that use the printer all be on the same subnet. Subnet mask: A number that identifies the IP addresses that belong to a subnet. Switch: A network device that manages network traffic in order to minimize collisions and maximize speed. t TCP/IP: Transmission Control Protocol/Internet Protocol (TCP/IP) is the network communication protocol used on the Internet. The printers built-in networking feature supports LANs that use TCP/IP. TKIP: See WPA. Temporal Key Integrity Protocol (TKIP). u Unicast packet: A packet sent from one device on a network to another device on the network.
ENWWGlossary 55 w WEP: Wired Equivalent Privacy (WEP) provides security by encrypting data sent over radio waves from one wireless device to another wireless device. WEP encodes the data sent across the network making the data unintelligible to unauthorized users. Only devices that share the same WEP settings as the printer will be able to communicate with the printer. WEP depends on encryption keys that are static and provides less security than WPA (TKIP). WEP key: A WEP key, or encryption key, is a sequence of alphanumeric characters or hexadecimal digits. After creating a WEP key, you must remember it or store it in a secure location. You may not be able to retrieve the WEP key if you lose it. A WEP key is either 64 or 128 bits long. The first 24 bits of the key are provided automatically. When creating the WEP key, the person creating the key provides the remaining bits (40 bits in the case of a 64-bit key, or 104 bits in the case of a 128-bit key). Wireless Access Point (WAP): A Wireless Access Point (WAP) is a device through which devices (for example, computers and printers) on an infrastructure wireless network communicate with one another. A WAP is also called a base station. Wireless profile: A wireless profile is a collection of wireless network settings that applies to a particular wireless network. For example, a wireless LAN card can have one profile for a home network and another profile for an office network. When installing a device on a network, be sure to select the appropriate profile. WiFi ( Wireless Fidelity): A term used generically when referring to any type of 802.11 network, whether 802.11b/g, 802.11a, dual-band, or other. Any products tested and approved as “Wi-Fi Certified” are certified as interoperable with each other, even if they are from different manufacturers. Typically, however, any Wi-Fi product using the same radio frequency (2.4GHz for 802.11b or 11g; 5GHz for 802.11a) will work with any other Wi-Fi product, even if not Wi-Fi Certified. Wireless network adapter: Each node (computer or device) on the WLAN uses a wireless network adapter into which a wireless transceiver, with a small, integrated antenna, is built. Wireless network adapters might be internal (inserted in a computer or device), external (housed in a separate case), or built-in. Common adapters include the following: ●USB adapter: An external device that connects to a USB port on the computer (typically has a PCMCIA card attached to one end). ●Notebook adapter: A PCMCIA card that plugs directly into one of the PCMCIA slots on your laptop or other portable computer. ●Desktop computer adapter: A dedicated ISA or PCI card, or a PCMCIA card with a special adapter, that plugs into your desktop computer. ●AirPort adapter: A wireless card that plugs directly into the AirPort slot on your Macintosh laptop or desktop computer. AirPort adapters eliminate the need for cable connections to the computer. WPA: WPA (Wi-Fi protected access) provides security by encrypting data sent over radio waves from one wireless device to another wireless device and by controlling access to network resources through authentication protocols. Only devices that share the same WPA settings as the printer will be able to communicate with the printer. WPA uses encryption keys that change frequently. WPA provides better security than WEP. WPA is also called TKIP.
ENWWIndex 53 Index A ad hoc mode 4 cannot find computer 30 advanced authentication protocols 26 C changing networks 21 checking wireless light 31 communication modes ad hoc 4 infrastructure 4 peer to peer 4 copyright and trademark information ii D data information 15 domain name server (DNS) IP address 11 multicast service name 11 dynamic encryption 26 E embedded Web server admin password 11 Energy Star 41 Environmental Product Stewardship Program 41 F FCC compliance 36 I information printer options 2 troubleshooting 2 infrastructure mode cannot find computer 30 cannot find WLAN 29 computer unable to find device 30 installation problems 24 authentication protocols not supported 26 cannot discover device 24 cannot find network name 25 device cannot connect 24 incorrectly set SSID or WEP key 26 no TCP/IP 24 printer not found 25 setup failed 27 signal not received by device 27 verification failure 26 wireless access card configuration 27 wrong WEP key 26 IP address 10 adding 10 DNS 11 L link speed 11 M media access control address 9 address authentication 6 filtering 33 Media Access Control (MAC) 9 multiple WEP keys 26 N network configuration page access point MAC address 13 authentication type 14 bad packets received 15 communication mode 12 configuration source 10 default gateway 10 device IP address 10 DNS server 11 encryption 14 EWS admin password 11 firmware revision code 10 firmware version 10 hardware address 9 host name 10 link speed 11 mDNS service name 11 network connection type 9 network status 9 printing 9 Service Set Identifier (SSID) 12 signal strength 13 subnet mask 10 TCP/IP name 10 total packets received 15 total packets transmitted 15 verification 31 Wi-Fi Protected Access 15 wireless communication channel 13 wireless network status 12 network settings general 9 troubleshooting 32 wireless 12 P Par t ii password for embedded Web server 11 personal software firewall 24 print cartridge where to send to recycle 42 printer IP address 10 unmatched network settings 32 printer drivers sites for download 2
54 IndexENWW R recycling HP Printing supplies returns and environmental program 42 where to send print cartridges 42 regulatory statements Canadian DOC regulations 37 declaration of conformity 39 laser safety statement 37 laser statement for Finland 40 S security authentication type 14 encryption 14 Wi-Fi Protected Access 15 wireless network 5 software sites for download 2 speed network transfer 11 support, web sites 2 T troubleshooting ad-hoc mode 30 communication block 24 general wireless printing problems 31 installation 24 MAC filtering 33 network settings 32 weak radio signal 33 wireless infrastructure mode 29 wrong wireless profile 33 W web-based support 2 Wi-Fi Protected Access enterprise environment 15 home/SOHO environment 15 wired equivalent privacy (WEP) 6 wireless local area network (WLAN) 3 wireless network authentication 5 communication modes 3 encryption 6 MAC address authentication 6 security 5 status 12 wireless profiles 6