88
L i f e B o o k Q 2 0 0 0 S e r i e s U s e r ’ s G u i d e
Shared key authentication
802.11 network authentication method in which the AP
sends the client device a challenge text packet that the
client must then encrypt with the correct WEP key and
return to the AP. If the client has the wrong key or no
key, authentication will fail and the client will not be
allowed to associate with the AP. Shared key authentica-
tion is not considered secure, because a hacker who
detects both the clear-text challenge and the same chal-
lenge encrypted with a WEP key can decipher the WEP
key.
SSID (Service Set Identifier)
Service Set Identifier, a 32-character unique identifier
attached to the header of packets sent over a WLAN that
acts as a password when a mobile device tries to connect
to the BSS. The SSID differentiates one WLAN from
another, so all access points and all devices attempting to
connect to a specific WLAN must use the same SSID. A
device will not be permitted to join the BSS unless it can
provide the unique SSID. Because the SSID is broadcast
in plain text, it does not supply any security to the
network.
Subnet mask
TCP-IP network is controlled by being divided into
multiple smaller networks (subnets). IP address consists
of the subnet address and the address of each computer.
Subnet mask defines how many bits of IP address
comprise the subnet address. The same value shall be set
among computers communicating with each other.
TCP/IP (Transmission Control Protocol/Internet
Protocol)
A standard protocol of the Internet.
Wi-Fi
Wi-Fi, or Wireless Fidelity, is a set of standards for wire-
less local area networks (WLAN) based on the IEEE
802.11 specifications. Certified products can use the offi-
cial Wi-Fi logo, which indicates that the product is
interoperable with any other product also showing that
logo.
Q2010.book Page 88 Wednesday, May 24, 2006 1:36 PM
Summary of Contents for LifeBook Q2010
Page 2: ...C o p y r i g h t Q2010 book Page 2 Wednesday May 24 2006 1 36 PM ...
Page 9: ...1 1 Preface Q2010 book Page 1 Wednesday May 24 2006 1 36 PM ...
Page 13: ...5 2 Getting to Know Your LifeBook Notebook Q2010 book Page 5 Wednesday May 24 2006 1 36 PM ...
Page 29: ...21 3 Getting Started Q2010 book Page 21 Wednesday May 24 2006 1 36 PM ...
Page 37: ...29 4 User Installable Features Q2010 book Page 29 Wednesday May 24 2006 1 36 PM ...
Page 51: ...43 5 Troubleshooting Q2010 book Page 43 Wednesday May 24 2006 1 36 PM ...
Page 65: ...57 6 Care and Maintenance Q2010 book Page 57 Wednesday May 24 2006 1 36 PM ...
Page 71: ...63 7 System Specifications Q2010 book Page 63 Wednesday May 24 2006 1 36 PM ...
Page 77: ...69 8 Glossary Q2010 book Page 69 Wednesday May 24 2006 1 36 PM ...
Page 101: ...93 Appendix B Using the Fingerprint Sensor Q2010 book Page 93 Wednesday May 24 2006 1 36 PM ...
Page 111: ...103 Index Q2010 book Page 103 Wednesday May 24 2006 1 36 PM ...
Page 117: ...109 I n d e x Q2010 book Page 109 Wednesday May 24 2006 1 36 PM ...
Page 119: ...111 I n d e x Q2010 book Page 111 Wednesday May 24 2006 1 36 PM ...