210
Glossary
Resolution
The number of vertical and horizontal lines per inch.
S
Settings Tables
At-a-glance instructions that show all the settings and options that are available for setting up your machine.
Shared Key Cryptosystem
A Shared Key Cryptosystem is a branch of cryptography involving algorithms that use the same key for two different
steps of the algorithm (such as encryption and decryption).
SMTP-AUTH
SMTP Authentication (SMTP-AUTH) expands SMTP (the Internet email sending protocol) to include an
authentication method that ensures the true identity of the sender is known.
SMTP Client
Simple Mail Transfer Protocol (SMTP) client is used to send emails via the Internet or Intranet.
SNMP
The Simple Network Management Protocol (SNMP) is used to manage network devices including computers,
routers and Dell network-ready machines. The Dell print server supports SNMPv1, SNMPv2c and SNMPv3.
SNMPv3
Simple Network Management Protocol version 3 (SNMPv3) provides user authentication and data encryption to
manage network devices securely.
SNTP
The Simple Network Time Protocol (SNTP) is used to synchronize computer clocks on a TCP/IP network. You can
configure the SNTP settings using Web Based Management.
SSID
Each wireless network has its own unique network name and it is technically referred to as a Service Set Identifier
(SSID). The SSID is a 32-byte or less value and is assigned to the access point. The wireless network devices you
want to associate to the wireless network should match the access point. The access point and wireless network
devices regularly send wireless packets (referred to as beacons), which contain the SSID information. When your
wireless network device receives a beacon, you can identify the wireless network that is close enough for the radio
waves to reach your device.
Status Monitor
The Status Monitor utility is a configurable utility for Macintosh users to monitor the status of one or more devices,
allowing you to get immediate notification when there is a problem, for example, when the machine runs out of
paper or jams.
Subnet Mask
A subnet mask allows you to identify which part of an IP address is used as the network address and which part is
used as the host address.
In the following example, the last segment of the IP address is known as the host address and the first three
segments are the network address.
Example: Computer 1 can talk to Computer 2
• Computer
1
Summary of Contents for E310dw
Page 1: ...Dell Printer E310dw User s Guide Regulatory Model Dell E130dw ...
Page 2: ......
Page 12: ...12 Contents ...
Page 13: ...13 Before You Use Your Dell Machine 15 Definitions of Notes 15 Important Note 15 ...
Page 14: ...14 ...
Page 18: ...18 ...
Page 22: ...22 Introduction to Your Dell Machine ...
Page 24: ...24 ...
Page 36: ...36 Paper Handling ...
Page 38: ...38 ...
Page 78: ...78 ...
Page 114: ...114 Network ...
Page 116: ...116 ...
Page 122: ...122 Security ...
Page 124: ...124 ...
Page 152: ...152 Troubleshooting ...
Page 154: ...154 ...
Page 173: ...173 Machine Settings 175 General Settings 175 Menu Table 177 ...
Page 174: ...174 ...
Page 182: ...182 Machine Settings ...
Page 184: ...184 ...
Page 189: ...189 How to Enter Text on Your Dell Machine 191 ...
Page 190: ...190 ...
Page 192: ...192 How to Enter Text on Your Dell Machine ...
Page 193: ...193 Environmental Information Notice 195 ...
Page 194: ...194 ...
Page 196: ...196 Environmental Information Notice ...
Page 198: ...198 ...
Page 204: ...204 ...