72
L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n F i v e
submitting correct network keys. However, in case of
actual communications, the same network key must be
set. Open system authentication is sometimes called
Open key authentication.
PPPoE (Point to Point Protocol over Ethernet)
A method of allowing the authentication protocol
adopted in telephone line connection (PPP) to be used
over an Ethernet.
Protocol
A procedure or rule of delivering data among
computers. Ordered data communication is allowed by
making all conditions required for communication
including the method of data transmission/reception
and actions upon communication errors into proce-
dures.
Shared key authentication
One of the network authentication types for wireless
LAN. Upon authentication, the access point checks
whether the same network key is set to the client. If the
client uses a wrong network key or the network key itself
is not set, authentication is unsuccessful, allowing no
communications with the access point.
SSID (Security Set Identifier)
See “Network name”
Subnet mask
TCP-IP network is controlled by being divided into
multiple smaller networks (subnets). IP address consists
of the subnet address and the address of each computer.
Subnet mask defines how many bits of IP address
comprise the subnet address. The same value shall be set
among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet
Protocol)
A standard protocol of the Internet.
Wi-Fi
Indicates that the interconnectivity test of the organiza-
tion which guarantees the compatible connection of
wireless LAN (Wi-Fi Alliance) has been passed.
P5010.book Page 72 Monday, April 7, 2003 6:39 PM
Summary of Contents for FPCM11642 - LB T5010 C2D/2.4 13.3 2GB-160GB DVDR WLS CAM W7P
Page 2: ...L i f e B o o k P 5 0 0 0 N o t e b o o k ...
Page 6: ...L i f e B o o k P 5 0 0 0 N o t e b o o k ...
Page 7: ...1 Preface ...
Page 8: ...L i f e B o o k P 5 0 0 0 N o t e b o o k ...
Page 10: ...2 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n O n e ...
Page 11: ...3 2 Getting to Know Your LifeBook Notebook ...
Page 12: ...4 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n T w o ...
Page 28: ...20 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n T w o ...
Page 29: ...21 3 Getting Started ...
Page 30: ...22 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n T h r e e ...
Page 37: ...29 4 User Installable Features ...
Page 38: ...30 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n F o u r ...
Page 56: ...48 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n F o u r ...
Page 57: ...49 5 Using the Integrated Wireless LAN Optional device ...
Page 58: ...50 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n F I v e ...
Page 83: ...75 6 Troubleshooting ...
Page 84: ...76 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n S i x ...
Page 98: ...90 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n S i x ...
Page 99: ...91 7 Care and Maintenance ...
Page 100: ...92 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n S e v e n ...
Page 104: ...96 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n S e v e n ...
Page 105: ...97 8 Specifications ...
Page 106: ...98 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n E i g h t ...
Page 110: ...102 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n E i g h t ...
Page 114: ...106 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n E i g h t ...
Page 115: ...107 9 Glossary ...
Page 116: ...108 L i f e B o o k P 5 0 0 0 N o t e b o o k S e c t i o n N i n e ...