Glossary
8-39
8
Appe
ndi
x
SSL
Secure Sockets Layer. A protocol that ensures security and privacy when transmitting
private documents over the Internet.
SSL encryption
SSL uses two keys to encrypt data: a public key, which is known to "everyone," and a
private or secret key, which is known only to the recipient of the message.
Stamp
Applies a stamp (about 1/8" (3 mm) in diameter) on the front side of originals after
they have been scanned, so that you can distinguish already scanned originals from
others.
Standard
Use this setting to send normal, typewritten, or printed documents containing only
text and no drawings, photographs, or illustrations. See Fine, Super Fine, and Ultra
Fine.
Startup time
If the machine is connected to a switching hub, it may not be able to connect to a
network when it is powering ON. This occurs because the spanning tree process,
performed between switching hubs, prevents them from communicating with each
other immediately after the machine connects to the network. A delay in the startup
time is necessary for the machine to connect to the network properly.
STP
Shielded Twisted Pair cable. A cable consisting of one or more twisted pairs of wires
and a sheath of foil and copper braid. The twists protect the wires from interference
from each other, and the shielding protects the wires from interference from the
outside. Therefore, an STP cable can be used for high-speed transmissions over long
distances.
Subaddress
Subaddress is the global telecommunications standard specified by the ITU-T
(International Telecommunication Union-Telecommunication Standardization Sector).
When the remote party's machine supports the same standard, confidential or
relayed communications are possible by attaching a subaddress and a password in
advance.
Subaddress Books
The main Address Book is subdivided into 10 smaller address books, which are
considered subaddress books.
Summary of Contents for image RUNNER 3045
Page 2: ......
Page 3: ...imageRUNNER 3045 3035 3030 3025 Network Guide 0 Ot ...
Page 16: ...xiv ...
Page 26: ...Checking Your Network Environment 1 10 1 Before You Start ...
Page 42: ...Communication Environment Setup 2 16 2 Settings Common to the Network Protocols ...
Page 100: ...Setting Up a Computer as a File Server 3 58 3 Using a TCP IP Network ...
Page 140: ...Setting Up a Computer as a File Server 5 24 5 Using a NetBIOS Network ...
Page 182: ...Confirming Settings 8 20 8 Appendix 08 24 2006 TUE 16 48 iR 3045 002 ...
Page 215: ......